๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿบ Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

Volcanoes May Be Spewing Gold From Earthโ€™s Molten Heart
scitechdaily.comยท14h
๐Ÿ—๏ธPaleocryptography
[Podcast] Downloading the root
blog.apnic.netยท15h
๐Ÿ“กDNS Archaeology
Ultimate Lab Resource for VCF 9.0
williamlam.comยท14h
๐Ÿ HomeLab
Encrypting identifiers in practice
sjoerdlangkemper.nlยท1d
๐ŸŒŠStream Ciphers
Deploy Now, Explain Never? Why AI Needs Forensic Parity
muckypaws.comยท2d
๐Ÿ’พPersistence Strategies
RedirectionGuard: Mitigating unsafe junction traversal in Windows
msrc.microsoft.comยท1d
๐Ÿ’ฃZIP Vulnerabilities
The Inefficiency in Digital Forensics
cyb3rops.medium.comยท3d
๐ŸšจIncident Response
Digler: A modular file carving and disk analysis tool in Go (with FUSE mount support)
reddit.comยท23hยท
Discuss: r/golang
โ›๏ธFile Carving
Quick Password Brute Forcing Evolution Statistics, (Tue, Jun 24th)
isc.sans.eduยท1d
๐Ÿ”“Password Cracking
API again: Org Takeover
infosecwriteups.comยท3d
๐ŸบZIP Archaeology
rustzen-admin Series (Part 1): Authentication Security Upgrade - From bcrypt to Argon2
dev.toยท2dยท
Discuss: DEV
๐Ÿ”“Password Cracking
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
darkreading.comยท1d
๐ŸŽซKerberos Exploitation
๐Ÿ’Ž Bespoke Opportunity Forge: AI-Powered Job Concierge ๐Ÿ“ฌ
dev.toยท1hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Part 5: How to Become a Pentester in 2025: Certifications, Career Roadmap & Growth
infosecwriteups.comยท1h
๐Ÿ•ต๏ธPenetration Testing
5 huge stumbling blocks to legacy mainframe EOL
techradar.comยท1d
๐Ÿ›๏ธMainframe Archaeology
IP Sentry (Golang)
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธeBPF Security
U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท3h
๐Ÿ”“Hacking
Deadly Risks: 5 Crypto Entrepreneurs and Investors Who Paid the Ultimate Price
hackernoon.comยท3h
๐ŸŽซKerberos Attacks
Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis
arxiv.orgยท2d
๐Ÿ”—Hash Chains
Windows users warned of major security issue - here's why FileFix attack could be a big concern
techradar.comยท21h
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap