🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.com·8h
🔓Password Cracking
SmartDocs AI - Intelligent Documentation Search with Algolia MCP Server
dev.to·7h·
Discuss: DEV
🌀Brotli Internals
Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
microsoft.com·5h
🎫Kerberos History
Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security
lmgsecurity.com·16m
🔐Cryptographic Archaeology
Windows Hello for Business – The Face Swap
insinuator.net·1d
🎯NTLM Attacks
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·23h·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
Elite 'Matanbuchus 3.0' Loader Spruces Up Ransomware Infections
darkreading.com·2h
🔓Hacking
Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature
news.risky.biz·18h
🔓Hacking
Legal Ransomware
aardvark.co.nz·6h
🏴‍☠️Piracy
Intent, Not Tools, Defines the Discipline
brettshavers.com·1h
🕳️Information Leakage
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.com·1d
🦠Malware Analysis
Forensic journey: Breaking down the UserAssist artifact structure
securelist.com·2d
🔍NTLM Archaeology
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.be·9h
📡Bluetooth Archaeology
Welcoming Aura to Have I Been Pwned's Partner Program
troyhunt.com·1h
🛡Cybersecurity
How Smart MSPs Sell with Compliance, Not Just Tools – With Dustin Bolander
heimdalsecurity.com·12h
🎯Threat Hunting
Jaya Klara Brekke: ‘Know who runs your infrastructure’
blog.okfn.org·2h
🌐Network Security
Vulnerability Scanning with Nmap
blackhillsinfosec.com·8h
🎯NTLM Attacks
Looking for Daybooks in the Archives
flickr.org·7h
🌳B-tree Archaeology
Unmoved Centre - NixOS Secrets Management
unmovedcentre.com·1d
❄Nix
US Army soldier pleads guilty to hacking telcos, extortion, wire fraud, identity theft
techradar.com·5h
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap