🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Attacks

Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse

Rands Cheat Sheet on 1:1s
randsinrepose.com·2h·
Discuss: Hacker News
🌱Personal Wikis
Ukrainian Hackers Claim To Have Destroyed Major Russian Drone Maker's Entire Network
tech.slashdot.org·2d
🔓Hacking
Flux CD: D1 Reference Architecture (multi-cluster, multi-tenant)
control-plane.io·1d
🏠Homelab Orchestration
No record left behind: How Warpstream can withstand regional outages
warpstream.com·2d·
Discuss: Hacker News
🌐Edge Preservation
SonicWall customers hit by fresh, ongoing attacks targeting fully patched SMA 100 devices
cyberscoop.com·4d
🔓Hacking
🚀 Building a Shopify App Backend in a Weekend with Gadget
dev.to·3h·
Discuss: DEV
🚀Indie Hacking
CVE‑2025‑27210 & CVE‑2025‑27209: Two high‑severity vulnerabilities in Node.js
infosecwriteups.com·3d
🔓Hacking
Russian infostealer sends commands to public LLM to craft requests on the fly
bleepingcomputer.com·2d·
Discuss: Hacker News
🦠Malware Analysis
How to Block Tracking and Ads
hackernoon.com·1d
🚀Indie Hacking
Integrating Model Context Protocol with Gemini: The Definitive Guide to Modern Tool Calling (Agentic-AI)
dev.to·1d·
Discuss: DEV
🔌Interface Evolution
Malware found embedded in DNS, the system that makes the internet usable, except when it doesn't
tomshardware.com·4d·
Discuss: Hacker News
🌐DNS Security
AI: Introduction to Ollama for local LLM launch
dev.to·10h·
Discuss: DEV
🕸️WASM Archives
Ask HN: What's the worst part of web E2E testing?
news.ycombinator.com·4h·
Discuss: Hacker News
🐛Fuzzing
[P] Anyone interested in adding their fine-tuned / open source models to this benchmark?
reddit.com·3h·
Discuss: r/MachineLearning
🌀Brotli Internals
Now this is clever
aardvark.co.nz·3h
🗜️LZW Variants
Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
microsoft.com·4d
🏺Kerberos Archaeology
Complete Beginner's Guide to Building AI Agents with LangChain and LangGraph
dev.to·4h·
Discuss: DEV
🔗Constraint Handling
Google Spots Tailored Backdoor Malware Aimed At SonicWall Appliances
it.slashdot.org·2d
🔓Hacking
123456 Password Leads to McDonald’s Data Breach
heimdalsecurity.com·3d
🔓Hacking
What Happens When AI Starts Writing Your APIs?
devops.com·2d
⚙️TLA+
Loading...Loading more...
AboutBlogChangelogRoadmap