🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

Can You Crack the Roman Code?
thefiddler.substack.com·2d·
Discuss: Substack
🔐Cryptographic Archaeology
OpenAI and Microsoft are dueling over AGI. These real-world tests will prove when AI is really better than humans.
businessinsider.com·16h
🔲Cellular Automata
Microsoft Confirms Google Chrome Block After Windows 11 Users Complain
forbes.com·1d·
Discuss: Hacker News
🐧FOSS
Abusing copyright strings to trick software into thinking it’s running on your competitor’s PC
devblogs.microsoft.com·5d·
Discuss: Lobsters, Hacker News, Hacker News
🔒Secure Boot
AI coding tools are perhaps our new terminal emulators
ghuntley.com·4d·
Discuss: Hacker News
🏠Homelab Archaeology
How to (Almost) solve cybersecurity once and for all
adaptive.live·5d·
Discuss: Hacker News
🔐Systems Hardening
Matrix v1.15 release
matrix.org·3d·
Discuss: Lobsters, Hacker News
📋PREMIS Events
Ancient SoundBlaster Cards Just Got A Driver Update
hackaday.com·1d
🧲RISC-V Archaeology
We need a censorship-resistant truth protocol – I have the idea, not the skills
news.ycombinator.com·2d·
Discuss: Hacker News
🧲Magnetic Philosophy
Klirr: invoice automation tool written on Rust using Typst
reddit.com·8h·
Discuss: r/rust
🦀Rust Macros
[Closed] Call for In-person Workshop Participants: "Investigating
exposingtheinvisible.org·1d
📰Content Curation
RepuNet: A Reputation System for Mitigating Malicious Clients in DFL
arxiv.org·3d
🔍BitFunnel
GCP Fundamentals: Data Labeling API
dev.to·1d·
Discuss: DEV
🤖Archive Automation
CitrixBleed 2: The nightmare that echoes the ‘CitrixBleed’ flaw in Citrix NetScaler devices
securityaffairs.com·3d
🎫Kerberos Attacks
7 Python Caching Strategies That Boost Application Performance by 70%
dev.to·2d·
Discuss: DEV
⚡Redis Internals
Flame Graph Performance Truth Analysis(1751110891345100)
dev.to·1d·
Discuss: DEV
⚡Performance Tools
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.to·4d·
Discuss: DEV
🔒WASM Capabilities
North Korea - Cyber Threat Actor Profile
cstromblad.com·4d
🇸🇪Nordic Cryptography
Intelligent Book Discovery with Book Aura & MindsDB
dev.to·1d·
Discuss: DEV
🕸️Knowledge Graphs
HarmonyOS Development: Layout analysis ArkUI Inspector, which is really fragrant after use. Foreword
dev.to·1d·
Discuss: DEV
👁️System Observability
Loading...Loading more...
AboutBlogChangelogRoadmap