🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

Program Execution, follow-up
windowsir.blogspot.com·2h·
Discuss: www.blogger.com
⚡Performance Tools
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·16h
🎫Kerberos Exploitation
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.com·1d
🔓Password Cracking
Networking for Systems Administrators
mwl.io·2h·
Discuss: Hacker News
🌐DNS over QUIC
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔢Bitwise Algorithms
Digital Forensics Round-Up, June 25 2025
forensicfocus.com·46m
🔬Archive Forensics
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·2h
🦠Malware Analysis
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.com·6h
🔍NTLM Forensics
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·5h
🎫Kerberos Attacks
CVE Chaos, MCPs, and the Fight for Better Vulnerability Data: A Recap of runZero Hour 19
runzero.com·1d
🔓Hacking
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.com·58m
🕵️Penetration Testing
Trusting the tech: using password managers and passkeys to help you stay secure online
ncsc.gov.uk·1d
🔓Password Cracking
Kafka Fundamentals: kafka retention.ms
dev.to·4h·
Discuss: DEV
🌊Streaming Systems
Microsoft Teams Security Attack Matrix
cyberdom.blog·23h·
Discuss: Hacker News
🎫Kerberos Attacks
Maturing your smart contracts beyond private key risk
blog.trailofbits.com·1d
🔐Quantum Security
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·1d
🦠Malware Analysis
Microsoft dangles extended Windows 10 support in exchange for Reward Points
theregister.com·1h
🕸️WASM Archives
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·1d
💣ZIP Vulnerabilities
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
darkreading.com·16h
🎫Kerberos Exploitation
How Do You Perform an Effective Network Security Assessment?
securityscorecard.com·18h
🕵️Penetration Testing
Loading...Loading more...
AboutBlogChangelogRoadmap