🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

A Standard for Human-Centered Investigation Playbooks
chrissanders.org·5h
🎯Threat Hunting
Hackers deploy fake SonicWall VPN App to steal corporate credentials
securityaffairs.com·6h
🎫Kerberos Exploitation
Program Execution, follow-up
windowsir.blogspot.com·12h·
Discuss: www.blogger.com
⚡Performance Tools
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔢Bitwise Algorithms
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·1d
🎫Kerberos Exploitation
Digital Forensics Round-Up, June 25 2025
forensicfocus.com·10h
🔬Archive Forensics
Networking for Systems Administrators
mwl.io·11h·
Discuss: Hacker News
🌐DNS over QUIC
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·12h
🦠Malware Analysis
How PC makers exploited BIOS copyright strings to unlock trial software during the Windows 95 era
techspot.com·5h
🔒Hardware Attestation
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.com·16h
🔍NTLM Forensics
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.com·2d
🔓Password Cracking
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.to·3h·
Discuss: DEV
🔗Data Provenance
How to Prove That An Email Was Received
metaspike.com·4h
📄Document Digitization
CVE Chaos, MCPs, and the Fight for Better Vulnerability Data: A Recap of runZero Hour 19
runzero.com·1d
🔓Hacking
North Korea - Cyber Threat Actor Profile
cstromblad.com·6h
🇸🇪Nordic Cryptography
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.com·10h
🕵️Penetration Testing
Modernizing eDiscovery: A Huge Strategic Win for Legal Operations Executives
blog.x1discovery.com·5h
🔗Data Provenance
Trusting the tech: using password managers and passkeys to help you stay secure online
ncsc.gov.uk·1d
🔓Password Cracking
Surfshark reaffirms its commitment to user privacy in independent audit
techradar.com·8h
🛡️eBPF Security
Microsoft Teams Security Attack Matrix
cyberdom.blog·1d·
Discuss: Hacker News
🎫Kerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap