🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Attacks

Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse

This Convincing PayPal Email Is Actually a Scam
lifehacker.com·11h
🔐Certificate Analysis
The Ultimate Secure Code Review Checklist
boostsecurity.io·11h
🛡️WebAssembly Security
South Asian APT Hackers Deploy Novel Android Malware Against Military-Adjacent Phones
zimperium.com·1d
🛡Cybersecurity
ksmbd - Fuzzing Improvements and Vulnerability Discovery (2/3)
blog.doyensec.com·4d
🧪Binary Fuzzing
Error'd: Superfluous U's
thedailywtf.com·17h
🔓Hacking
FBI warns seniors are being targeted in three-phase Phantom Hacker scams
fortra.com·2d
🔓Hacking
GPT-4o-mini Falls for Psychological Manipulation
schneier.com·13h
📼Cassette Hacking
Someone could win $1.8B Powerball jackpot Saturday. Odds are their identity will remain a mystery
the-independent.com·2h
⚡HTMX
Real-Time M-Pesa STK Payments with Cloudflare Durable Objects
blog.devhooks.live·2d·
Discuss: Hacker News
🌊Streaming Systems
VulnHub CTF - Moria 1.1
infosecwriteups.com·18h
🔓Password Cracking
Why Everybody Is Losing Money On AI
wheresyoured.at·7h·
Discuss: Hacker News
🌀Brotli Internals
How to Recover Stolen Crypto: Hire a Genuine Recovery Expert META TECH RECOVERY PRO
dev.to·3d·
Discuss: DEV
🔗Hash Chains
Data leak through Salesloft: Cloudflare, Palo Alto, Zscaler affected
heise.de·2d
🔓Open Source Software
Ransomware hackers threaten to feed stolen art to AI companies
techspot.com·1d
🚀Indie Hacking
I have hacked to gather a software stack to take over the world
yetanotherprojecttosavetheworld.org·2d·
Discuss: Hacker News
🚀Indie Hacking
ActivityPub message rewrite facility (MRF) based on WASM
aumetra.xyz·17h·
Discuss: Hacker News
🔒WASM Capabilities
2FA Bypass via Request Handling Flaw
infosecwriteups.com·18h
🧪Binary Fuzzing
The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft
krebsonsecurity.com·4d·
Discuss: Hacker News
🛡Cybersecurity
Hunting GraphQL Gold: Uncovering Hidden Vulnerabilities in Modern APIs
infosecwriteups.com·18h
🧪Protocol Fuzzing
Show HN: A unified approach to compute sandboxes
computesdk.com·2d·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Loading...Loading more...
AboutBlogChangelogRoadmap