🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Attacks

Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse

Microsoft Investors Prod Company Over Work With Israeli Military
bloomberg.com·2d
🎫Kerberos Exploitation
Google Chrome to Distrust Chunghwa & Netlock Certificates: How Qualys Certificate View Helps You Respond
blog.qualys.com·3d
🔐Certificate Analysis
Last Week on My Mac: Ghosts in the machine
eclecticlight.co·22h
🍎Apple Archive
Rust Language Cheat Sheet
cheats.rs·2d·
Discuss: Hacker News
🦀Rust Macros
Unauthorized Data Exposure via Range Queries in ServiceNow ACLs – CVE-2025-3648
research.kudelskisecurity.com·3d
🔓LDAP Injection
An OpenAI Acquisition Turns Into a Google 'Hackqusition'...
spyglass.org·1d·
Discuss: Hacker News
🚀Indie Hacking
Russian pro basketball player gets the cuffs for allegedly being a member of ransomware gang — lawyer claims client "sucks at computers and is not even able to ...
tomshardware.com·1d
🔓Hacking
Researcher tricks ChatGPT into revealing security keys - by saying "I give up"
techradar.com·2d
🔓Hacking
Circumventing Safety Alignment in Large Language Models Through Embedding Space Toxicity Attenuation
arxiv.org·1h
💻Local LLMs
Ruckus Networks security flaws left unpatched, putting thousands of devices at risk
techradar.com·2d
🔓Hacking
When AI Has Root: Lessons from the Supabase MCP Data Leak
pomerium.com·6d·
Discuss: Hacker News
🔓Hacking
🔌 Building Resilient Database Operations with Aiobreaker + Async SQLAlchemy + FastAPI
dev.to·48m·
Discuss: DEV
📝Database WAL
KL-001-2025-010: Schneider Electric EcoStruxure IT Data Center Expert Privilege Escalation
seclists.org·4d
🛡Cybersecurity
NK's fake tech workers targeting European employers with help from UK operatives
theregister.com·13h·
Discuss: Hacker News
🇨🇳Chinese Computing
"The Future of Live Poker Betting: Insights from Jaemon Jager Lee" CTO - NForce Systems Inc.
dev.to·7h·
Discuss: DEV
🖥️Modern Terminals
Why Recon Alone Won’t Make You a Top Bug Hunter (My 2025 Reality Check)
infosecwriteups.com·23h
🎯Threat Hunting
Higher Regional Court: Virtual theft of crypto assets remains unpunished
heise.de·2d·
Discuss: Hacker News
🔗Hash Chains
Tools using tools
cassidoo.co·1d·
Discuss: Hacker News
⚡Proof Automation
GoldMelody’s Hidden Chords: Initial Access Broker In-Memory IIS Modules Revealed
unit42.paloaltonetworks.com·5d
🎫Kerberos Exploitation
Phishing for Gemini: Google Gemini G-Suite Prompt Injection Vulnerability
0din.ai·3d·
Discuss: Hacker News
💣ZIP Vulnerabilities
Loading...Loading more...
AboutBlogChangelogRoadmap