๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿบ Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

Project AK47: Uncovering a Link to the SharePoint Vulnerability Attacks
unit42.paloaltonetworks.comยท5h
๐ŸŒDNS Security
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs
arxiv.orgยท1d
โšกProof Automation
Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.comยท15h
๐Ÿ’ฟDAT Forensics
Black Hat 2025: Why We Built a Museum Instead of a Booth
lab.wallarm.comยท1d
๐Ÿ”Cryptographic Archaeology
Windows Authentication Monitoring
infosecwriteups.comยท1d
๐Ÿ”NTLM Archaeology
Searching for Artificial Memory Systems in ancient humans with spatial statistics
phys.orgยท15h
๐ŸฆดBinary Paleography
DNS at IETF 123
potaroo.netยท5h
๐ŸŒDNS Security
Welcoming Guardio to Have I Been Pwned's Partner Program
troyhunt.comยท8h
๐Ÿš€Indie Hacking
SonicWall investigates possible zero-day amid Akira ransomware surge
securityaffairs.comยท19h
๐Ÿ”“Hacking
Beneath the Belly of the Latest BlueNoroff Attack: A DNS Investigation
circleid.comยท1d
๐ŸŒDNS Security
CVE-2025-54136 โ€“ MCPoison Cursor IDE: Persistent Code Execution via MCP Trust Bypass
research.checkpoint.comยท15h
๐Ÿ›ก๏ธCLI Security
Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365
news.sophos.comยท16h
๐ŸŽซKerberos History
Axiom: Decentralized AI network that discovers, verifies, and archives truth
github.comยท3hยท
Discuss: Hacker News
๐ŸคDistributed Consensus
Project Ire autonomously identifies malware at scale
microsoft.comยท12hยท
Discuss: Hacker News
๐Ÿฆ Malware Analysis
Authentication vs. authorization: Whatโ€™s the difference?
proton.meยท18h
๐Ÿ”Capability Systems
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.comยท1d
๐Ÿฆ Malware Analysis
Hackers are stealing Microsoft 365 accounts by abusing link-wrapping services
techradar.comยท1d
๐ŸŽซKerberos Attacks
Google Chrome Enterprise: More Than an Access Point to the Web
darkreading.comยท21h
๐Ÿ”“Hacking
Elevate your protection with expanded Microsoft Defender Experts coverage
techcommunity.microsoft.comยท12h
๐Ÿ Homelab Security
Loading...Loading more...
AboutBlogChangelogRoadmap