🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Attacks

Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse

This Convincing PayPal Email Is Actually a Scam
lifehacker.comΒ·8h
πŸ”Certificate Analysis
The Ultimate Secure Code Review Checklist
boostsecurity.ioΒ·8h
πŸ›‘οΈWebAssembly Security
ksmbd - Fuzzing Improvements and Vulnerability Discovery (2/3)
blog.doyensec.comΒ·3d
πŸ§ͺBinary Fuzzing
Error'd: Superfluous U's
thedailywtf.comΒ·14h
πŸ”“Hacking
RSgoldfast RuneScape: How to Overcome Nex’s Wrath
dev.toΒ·12hΒ·
Discuss: DEV
🎫Kerberos History
GPT-4o-mini Falls for Psychological Manipulation
schneier.comΒ·10h
πŸ“ΌCassette Hacking
Two Exploited Vulnerabilities Patched in Android
securityweek.comΒ·8hΒ·
Discuss: Hacker News
πŸ”“Hacking
Sitecore Zero-Day Sparks New Round of ViewState Threats
darkreading.comΒ·7h
πŸ”“Hacking
Crooks turn HexStrike AI into a weapon for fresh vulnerabilities
securityaffairs.comΒ·2d
πŸ”“Hacking
β€œDay 27: The IDOR Epidemic β€” How Changing a Single Number Unlocked a Million User Profiles”
infosecwriteups.comΒ·15h
πŸ”“Hacking
Safe Sharing of Fast Kernel-Bypass I/O Among Nontrusting Applications
arxiv.orgΒ·1d
πŸ”eBPF
It looks like you’re ransoming data. Would you like some help?
theregister.comΒ·2d
πŸ•΅οΈVector Smuggling
Researchers describe how they took down a P2P illegal streaming VOD site that had almost 25,000 movies and series for more than 130,000 users
techradar.comΒ·51m
πŸ΄β€β˜ οΈPiracy
3 Real-World Crypto Paradises You Can Actually Live In
hackernoon.comΒ·17h
πŸ”“Hacking
HyPV-LEAD: Proactive Early-Warning of Cryptocurrency Anomalies through Data-Driven Structural-Temporal Modeling
arxiv.orgΒ·1d
πŸ”—Hash Chains
New Faceplant attack exposes serious flaw in Windows Hello at Black Hat
techspot.comΒ·4h
πŸ”“Hacking
The Aider Local Model Experience
hexeditreality.comΒ·5hΒ·
Discuss: Hacker News
⚑Proof Automation
How to Ruin Your Weekend: Building a DIY EDR
infosecwriteups.comΒ·15h
πŸ”eBPF
The 'Swiss army knife' of malware emerges - Hook v3 can do ransomware, keylogging, DDoS, screen capture, and far more
techradar.comΒ·1d
πŸ”“Hacking
VulnHub CTF - Moria 1.1
infosecwriteups.comΒ·15h
πŸ”“Password Cracking
Loading...Loading more...
AboutBlogChangelogRoadmap