🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

How Do You Perform an Effective Network Security Assessment?
securityscorecard.com·22h
🕵️Penetration Testing
What LLMs Know About Their Users
schneier.com·7h·
Discuss: Hacker News
💻Local LLMs
Cambridge Cybercrime Conference 2025 – Liveblog
lightbluetouchpaper.org·4h
🎯Threat Hunting
Stealth China-linked ORB network gaining footholds in US, East Asia
cyberscoop.com·4h
🎫Kerberos Exploitation
Which operating system was targeted by the first ever mobile phone virus?
techspot.com·17m
🔓Hacking
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.org·17h·
Discuss: Hacker News
🔐Homomorphic Encryption
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.com·1d
🎫Kerberos Exploitation
Cyber insurance premiums dropped for the first time in 2024
metacurity.com·5h
🔓Hacking
Week 25 – 2025
thisweekin4n6.com·3d
🌐WARC Forensics
Encrypting identifiers in practice
sjoerdlangkemper.nl·13h
🌊Stream Ciphers
Abusing copyright strings to trick software into thinking it’s running on your competitor’s PC
devblogs.microsoft.com·1d·
Discuss: Lobsters, Hacker News
🔒Secure Boot
The cryptoterrestrial hypothesis: a covert earthly explanation for UAP
researchgate.net·5h·
Discuss: Hacker News
🔎OSINT Techniques
Worth Reading 062425
rule11.tech·3h
🌐DNS over QUIC
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.com·1d
🌳Archive Merkle Trees
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.com·1d
🛡️eBPF Security
Microsoft Entra ID OAuth Phishing and Detections
elastic.co·18h
🎯NTLM Attacks
Deploy Now, Explain Never? Why AI Needs Forensic Parity
muckypaws.com·1d
💾Persistence Strategies
RedirectionGuard: Mitigating unsafe junction traversal in Windows
msrc.microsoft.com·11h
💣ZIP Vulnerabilities
How to (Almost) solve cybersecurity once and for all
adaptive.live·22h·
Discuss: Hacker News
🔐Systems Hardening
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lol·1d·
Discuss: Hacker News
🎯NTLM Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap