๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽซ Kerberos Exploitation

Golden Tickets, Domain Enumeration, Windows Authentication, Red Team Operations

Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies
theregister.comยท10hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Windows Authentication Monitoring
infosecwriteups.comยท1d
๐Ÿ”NTLM Archaeology
Akira Ramps Up Assault on SonicWall Firewalls, Suggesting Zero-Day
darkreading.comยท14h
๐Ÿ”“Hacking
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs
arxiv.orgยท1h
โšกProof Automation
Security Affairs newsletter Round 535 by Pierluigi Paganini โ€“ INTERNATIONAL EDITION
securityaffairs.comยท1d
๐Ÿ›กCybersecurity
Beneath the Belly of the Latest BlueNoroff Attack: A DNS Investigation
circleid.comยท5h
๐ŸŒDNS Security
Hackers are stealing Microsoft 365 accounts by abusing link-wrapping services
techradar.comยท11h
๐ŸŽซKerberos Attacks
Rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration (CVSS v4.0 Score: 9.3 / Critical)
seclists.orgยท2d
๐Ÿ’ฃZIP Vulnerabilities
4th August โ€“ Threat Intelligence Report
research.checkpoint.comยท20h
๐Ÿ”“Hacking
How to detect and block malicious web crawlers in 2025
fingerprint.comยท11h
๐Ÿฆ Malware Analysis
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.comยท19h
๐Ÿฆ Malware Analysis
AI Clouds Are Flying Blind: The Illusion of Runtime Protection
thenewstack.ioยท10h
๐Ÿ”eBPF
Living Off the Cloud: Abusing Cloud Services for Red Teaming
infosecwriteups.comยท1d
๐Ÿ Homelab Pentesting
Securing OAuth: Best Practices for Safer Authorization Flows
dev.toยท17hยท
Discuss: DEV
๐ŸŽฏNTLM Attacks
Details emerge on BlackSuit ransomware takedown
cyberscoop.comยท11h
๐Ÿฆ Malware Analysis
Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132)
embracethered.comยท22hยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
Indexing Blockchain Events with Rust and Alloy
blog.bilinearlabs.ioยท7hยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
.NET Bounty Program now offers up to $40,000 in awards
github.comยท1dยท
Discuss: Hacker News, r/programming
๐Ÿ•ต๏ธDomain Enumeration
An AI data trap catches Perplexity impersonating Google
businessinsider.comยท4h
๐Ÿš€Indie Hacking
How to find SUSE Multi-Linux Manager installations on your network
runzero.comยท3d
๐Ÿ“ฆContainer Security
Loading...Loading more...
AboutBlogChangelogRoadmap