🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.com·54m
💣ZIP Vulnerabilities
Wayland Compositors – Why and How to Handle Privileged Clients (2014)
mupuf.org·1d·
Discuss: Hacker News
🔓Password Cracking
Techno Security & Digital Forensics Conference Returns To San Diego With Deep Dive Into AI, Cybercrime, And Justice
forensicfocus.com·3h
🚨Incident Response
HOW TO HIRE A HACKER TO RECOVER LOST OR STOLEN BITCOIN : GRAVOY TECH NETWORK
dev.to·2h·
Discuss: DEV
🔗Hash Chains
Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy
sciencedirect.com·51s
👁️Perceptual Hashing
InfoSec News Nuggets 8/25/2025
aboutdfir.com·1d
🔓Hacking
When AI meets ancient Rome
phys.org·28m
🏺Computational Archaeology
Securing FreeBSD Services with Lightweight Jails
discoverbsd.com·7h
🗄️File Systems
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.com·1h
✅Format Verification
Certificate Transparency - Part 3 - Operations
ipng.ch·2d
🔒Hardware Attestation
Hackers are looking to steal Microsoft logins using some devious new tricks - here's how to stay safe
techradar.com·1d
🎯NTLM Attacks
U.S. CISA adds Citrix Session Recording, and Git flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·5h
🎫Kerberos Exploitation
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.com·2d·
Discuss: www.blogger.com
🎯Threat Hunting
RomCom and TransferLoader IoCs in the Spotlight
circleid.com·22h
📡DNS Archaeology
L-XAIDS: A LIME-based eXplainable AI framework for Intrusion Detection Systems
arxiv.org·9h
🔍Vector Forensics
Hook Version 3: The Banking Trojan with The Most Advanced Capabilities
zimperium.com·1d
🛡️ARM TrustZone
ScreenConnect admins targeted by spear phishing attacks
heise.de·5h
🎫Kerberos Attacks
Beyond the ban: A better way to secure generative AI applications
blog.cloudflare.com·23h
🔒Language-based security
Pyrat TryHackMe Walkthrough: Step-by-Step Beginner’s Guide to Easy Level CTF with Reverse Shell and…
infosecwriteups.com·1d
🔓Password Cracking
Research Worth Reading Week 32/2025
pentesterlab.com·1d
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap