๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽซ Kerberos Attacks

Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse

original โ†—
daniel.haxx.seยท22h
๐ŸบZIP Archaeology
Why Your 'Free' Solution Could Cost You $251K
fusionauth.ioยท3dยท
Discuss: Hacker News
๐ŸŽซKerberos History
Rails API Throttling: Handling Multiple Endpoints with Different Limits
prateekcodes.devยท1dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Windows Privilege Escalation: The Hidden Danger of Unquoted Service Paths
infosecwriteups.comยท8h
๐ŸŽฏNTLM Attacks
Monitoring My Homelab, Simply
b.tuxes.ukยท2dยท
Discuss: Lobsters, Hacker News
๐Ÿ“ŠHomelab Monitoring
$AIN Expands To 7 DEXs As AI Network Activates Omnichain AI Economy
hackernoon.comยท1d
๐Ÿ Homelab Federation
Meta Superintelligence โ€“ Leadership Compute, Talent, and Data
semianalysis.comยท1dยท
Discuss: Hacker News, Hacker News
๐Ÿ‘๏ธObservatory Systems
June 2025 Malware Spotlight: Discord Exploits Lead to Rising Threats
blog.checkpoint.comยท3d
๐Ÿฆ Malware Analysis
So Microsoft Deleted Some of Our Packages from Nuget.org Without Notice
aaronstannard.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฆPackage Managers
How to Handle Log Spikes Like the Pros: How Top DevOps Teams Tame Bursty Workloads
hackernoon.comยท23h
๐ŸŒŠStream Processing
Pro basketball player and 4 youths arrested in connection to ransomware crimes
arstechnica.comยท2d
๐ŸŽซKerberos Exploitation
Browser Exploits Wane As Users Become The Attack Surface
darkreading.comยท3d
๐Ÿ”“Hacking
Fraud detection empowered by federated learning with the Flower framework on Amazon SageMaker AI
aws.amazon.comยท1d
๐Ÿ”—Data Provenance
Framing the AkiraBot Framework Under the DNS Lens
circleid.comยท1d
๐Ÿ“กDNS Archaeology
This open-source bot blocker shields your site from pesky AI scrapers
zdnet.comยท3dยท
Discuss: Hacker News, r/webdev
๐Ÿš€Indie Hacking
The Right Approach to Authorization in RAG
osohq.comยท2dยท
Discuss: Hacker News
๐ŸงฌPostgreSQL Forensics
CVE-2025-5777: CitrixBleed 2 Exploit Deep Dive
horizon3.aiยท5dยท
Discuss: Hacker News
๐ŸŒDNS Security
Jurisdiction Is Nearly Irrelevant to the Security of Encrypted Messaging Apps
soatok.blogยท3dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
ML/AI Pipelines: The "So What" of Crypto Data Ecosystems
davanti-research.medium.comยท55mยท
Discuss: Hacker News
๐ŸŒŠStream Processing
Decentralized Protocols Are Soft Targets for North Korean Hackers
coindesk.comยท5dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap