🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

Software Bill of Materials (SBOM) for FreeBSD Project
freebsdfoundation.orgΒ·24m
πŸ“‹Format Specification
Stealth China-linked ORB network gaining footholds in US, East Asia
cyberscoop.comΒ·1d
🎫Kerberos Exploitation
Worth Reading 062425
rule11.techΒ·1d
🌐DNS over QUIC
How Foreign Scammers Use U.S. Banks to Fleece Americans
propublica.orgΒ·1dΒ·
Discuss: Hacker News
🎫Kerberos Attacks
Envoy Proxy Is a Swiss Army Knife
adityarohilla.comΒ·2dΒ·
Discuss: Hacker News
πŸ“¦Container Security
CVE Chaos, MCPs, and the Fight for Better Vulnerability Data: A Recap of runZero Hour 19
runzero.comΒ·2d
πŸ”“Hacking
AppSec as Glue: Building Partnerships to Scale Security
tldrsec.comΒ·2hΒ·
Discuss: Hacker News
πŸ”Capability Systems
API again: Org Takeover
infosecwriteups.comΒ·3d
🏺ZIP Archaeology
North Korea - Cyber Threat Actor Profile
cstromblad.comΒ·22h
πŸ‡ΈπŸ‡ͺNordic Cryptography
Cisco fixed critical ISE flaws allowing Root-level remote code execution
securityaffairs.comΒ·4h
πŸ”“Hacking
Sonicwall warns of fake NetExtender app infected with malicious code
heise.deΒ·1d
🎫Kerberos Exploitation
Part 5: How to Become a Pentester in 2025: Certifications, Career Roadmap & Growth
infosecwriteups.comΒ·6h
πŸ•΅οΈPenetration Testing
πŸ’Ž Bespoke Opportunity Forge: AI-Powered Job Concierge πŸ“¬
dev.toΒ·6hΒ·
Discuss: DEV
πŸŒ€Brotli Internals
Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis
arxiv.orgΒ·2d
πŸ”—Hash Chains
5 huge stumbling blocks to legacy mainframe EOL
techradar.comΒ·1d
πŸ›οΈMainframe Archaeology
Keylime: Pushing the Boundaries of Remote Attestation on the Edge - DevConf.CZ 2025
youtube.comΒ·8h
πŸ”’Hardware Attestation
IP Sentry (Golang)
dev.toΒ·2dΒ·
Discuss: DEV
πŸ›‘οΈeBPF Security
Microsoft dangles extended Windows 10 support in exchange for Reward Points
theregister.comΒ·1dΒ·
Discuss: Hacker News
πŸ•ΈοΈWASM Archives
Fighting logs with Log Detective - DevConf.CZ 2025
youtube.comΒ·8h
πŸ“Log Parsing
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.comΒ·1d
🎫Kerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap