🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Exploitation

Golden Tickets, Domain Enumeration, Windows Authentication, Red Team Operations

Adversary Infrastructure and Indicators Behind the SAP NetWeaver 0-Day Exploitation
research.kudelskisecurity.comΒ·1d
🎫Kerberos Attacks
Windows Hello for Business – The Face Swap
insinuator.netΒ·13h
🎯NTLM Attacks
NixOS: Declarative Management, Imperative Privilege Escalation
labs.snyk.ioΒ·1hΒ·
Discuss: Lobsters, Hacker News
❄️Nixpkgs
W1seGuy | TryHackMe Walkthrough β€” XOR? BrUt3_F0rC3 iT
infosecwriteups.comΒ·1d
πŸ”Cryptographic Archaeology
Ransomware Threat Landscape Analysis - May through July for 2025
cstromblad.comΒ·1d
🦠Malware Analysis
U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.comΒ·2h
πŸ”“Hacking
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
unit42.paloaltonetworks.comΒ·1d
πŸ”“LDAP Injection
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.comΒ·13h
🦠Malware Analysis
We Built a Private Algorand Network to Crack the Code of Transaction Ordering
hackernoon.comΒ·9h
🀝Consensus Algorithms
AsyncRAT Spawns Concerning Labyrinth of Forks
darkreading.comΒ·6h
πŸ”“Hacking
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
thezdi.comΒ·11h
πŸ¦€Rust Verification
Hackers are abusing 'FileFix' technique to drop RATs during ransomware attacks
techradar.comΒ·12h
πŸ”“Hacking
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgΒ·2d
🌐DNS Security
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comΒ·2hΒ·
Discuss: Lobsters, Hacker News
πŸ›‘οΈeBPF Security
TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More
darknet.org.ukΒ·2d
🌐DNS Security
CitrixBleed 2 situation update β€” everybody already got owned
doublepulsar.comΒ·1d
🎫Kerberos Attacks
14th July – Threat Intelligence Report
research.checkpoint.comΒ·1d
πŸ”“Hacking
A defender’s guide to initial access techniques
redcanary.comΒ·1d
🎯Threat Hunting
Unmoved Centre - NixOS Secrets Management
unmovedcentre.comΒ·8h
❄Nix
Nvidia warns its GPUs – even Blackwells – need protection against Rowhammer attacks
theregister.comΒ·2d
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap