🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Attacks

Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse

Go: Improving Example Visibility in pkgsite (pkg.go.dev)
matttproud.com·9h
🔄Reproducible Builds
Shackled Workers Threaten to Unravel Korea’s Wins With Trump
bloomberg.com·23h
📰SGML
California’s New Privacy Rules Are a National Signal
puri.sm·2d
🔐HSM Integration
From Proxmox, Opening Spice Console in Firefox
blog.raymond.burkholder.net·11h
🕸️WASM Archives
BBC: UFO hit by hellfire, no impact on vehicle & flying away
bbc.com·7h·
Discuss: Hacker News
🌐WARC Forensics
Nominees: The fastest legal way to lose your company
johnnydoe.is·2d·
Discuss: Hacker News
🏠Personal Archives
Memory Integrity Enforcement: A complete vision for memory safety in Apple devices
security.apple.com·1d·
Discuss: Lobsters, Hacker News, r/hardware
🏷️Memory Tagging
Linus: "Can we please stop this automated idiocy?"
lore.kernel.org·2d·
Discuss: Hacker News
🔌Operating system internals
I built a lightweight, ultra-fast, open-source Go service for scraping, crawling, screenshots, and page monitoring
reddit.com·11h·
Discuss: r/golang
📰Feed Readers
SAP Patchday September 2025 fixes more than twenty gaps – four HotNews
heise.de·13h
✅Archive Fixity
DoubleVerify Holdings, Inc. (DV) Presents At Goldman Sachs Communacopia + Technology Conference (Transcript)
seekingalpha.com·9h
⏱️SMPTE Timecode
Hijacking Windows Processes: A Step-By-Step Guide
infosecwriteups.com·22h
🛡️eBPF Security
Day 23: LLM Manager Service Layer Refactor - Consolidating Multi-Model AI Integration
dev.to·1h·
Discuss: DEV
⚙️TLA+
PYRAMID HACK SOLUTION // TRUSTED EXPERTS FOR FAST AND SECURE RECOVERY
dev.to·3d·
Discuss: DEV
🧬PostgreSQL Forensics
Codebuff: Generate Code from the Terminal
github.com·4h·
Discuss: Hacker News
🦀Rust Macros
Ban&Pick: Achieving Free Performance Gains and Inference Speedup via Smarter Routing in MoE-LLMs
arxiv.org·23h
💻Local LLMs
TryHackMe Anonymous Challenge Walkthrough: Medium-Level SMB, FTP Exploitation & Privilege…
infosecwriteups.com·2d
🎫Kerberos Exploitation
Integrating upstream and downstream reciprocity stabilizes cooperator-defector coexistence in N-player giving games
arxiv.org·1d
🔲Cellular Automata
DuckDB NPM packages 1.3.3 and 1.29.2 compromised with malware
github.com·17h·
Discuss: Hacker News
📦Package Managers
Threat Actors Refine Android Droppers to Stealthily Deploy Mobile Malware
zimperium.com·1d
📡Feed Security
Loading...Loading more...
AboutBlogChangelogRoadmap