๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿบ Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

Driver of destruction: How a legitimate driver is being used to take down AV processes
securelist.comยท11h
๐Ÿ›ก๏ธeBPF Security
Microsoft enabled Israeli spy agency's mass surveillance of Palestinians' mobile calls
metacurity.comยท7h
๐Ÿ”“Hacking
Crypto Recovery Specialist โ€“ Blockchain Investigator โ€“ Helping Victims Reclaim
news.ycombinator.comยท19mยท
Discuss: Hacker News
โ›๏ธFile Carving
External Network Penetration Testing and Best Practices
hackerone.comยท4h
๐Ÿ•ต๏ธPenetration Testing
Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource
blackhillsinfosec.comยท6h
๐Ÿ›กCybersecurity
Digital Forensics Round-Up, August 06 2025
forensicfocus.comยท5h
๐Ÿ”Archive Cryptanalysis
The Singularity Syndicate: Artifacts
hackernoon.comยท13h
โฐTime Crystals
Project AK47: Uncovering a Link to the SharePoint Vulnerability Attacks
unit42.paloaltonetworks.comยท22h
๐ŸŒDNS Security
Qualifiers on Hypertext Links (1991)
w3.orgยท2hยท
Discuss: Hacker News
๐Ÿ”—Hypertext Systems
Shared secret: EDR killer in the kill chain
news.sophos.comยท7h
๐ŸŽซKerberos Exploitation
Propagating Bonjour/Rendezvous to Normal DNS
taoofmac.comยท8h
๐ŸŒDNS Security
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.comยท2d
๐Ÿฆ Malware Analysis
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.comยท1d
๐Ÿ’ฟDAT Forensics
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs
arxiv.orgยท1d
โšกProof Automation
VexTrio Cybercrime Outfit Run by Legit Ad Tech Firms
darkreading.comยท1h
๐Ÿš€Indie Hacking
I Spent $500 To Test Devin For Prompt Injection So That You Don't Have To
embracethered.comยท13hยท
Discuss: Hacker News
๐ŸงฎZ3 Solver
Black Hat 2025: Why We Built a Museum Instead of a Booth
lab.wallarm.comยท2d
๐Ÿ”Cryptographic Archaeology
Securing the Unmanaged: Check Point Enterprise Browser Delivers Zero Trust to Any Device
blog.checkpoint.comยท8h
๐Ÿ”’WASM Capabilities
Quantum physics protects videos from prying eyes and tampering
space.comยท28m
โš›๏ธQuantum Tape
Welcoming Guardio to Have I Been Pwned's Partner Program
troyhunt.comยท1d
๐Ÿš€Indie Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap