🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Exploitation

Golden Tickets, Domain Enumeration, Windows Authentication, Red Team Operations

SigNoz (YC W21, Open Source Datadog) Is Hiring DevRel Engineers (Remote)(US)
ycombinator.comΒ·20hΒ·
Discuss: Hacker News
πŸ”“Open Source Software
Butian Platform: Forging China's Next Generation of White Hat Hackers
nattothoughts.substack.comΒ·1dΒ·
Discuss: Substack
πŸ”“Hacking
Show HN: Listed – An agentic platform to rank your business on AI
news.ycombinator.comΒ·14hΒ·
Discuss: Hacker News
πŸŒ€Brotli Internals
German prosecutors indict alleged helper in plot to attack Taylor Swift concerts in Vienna
the-independent.comΒ·5h
πŸ‘‚Audio Evidence
Look right: Threat campaign fooling developers in GitHub repos – Programmer Zone
quiz.businessexplain.comΒ·2dΒ·
Discuss: Hacker News
πŸš€Indie Hacking
This is how you build an AI Ransomware Worm
trufflesecurity.comΒ·3dΒ·
Discuss: Hacker News
πŸ•΅οΈVector Smuggling
Jailbroken AIs are helping cybercriminals to hone their craft
malwarebytes.comΒ·1d
πŸ”“Hacking
Sextortion: Inflation-hit fraudsters increase claims
heise.deΒ·23h
🎫Kerberos Attacks
Deadly Risks: 5 Crypto Entrepreneurs and Investors Who Paid the Ultimate Price
hackernoon.comΒ·1d
🎫Kerberos Attacks
Show HN: Self-Hosted OAuth Authentication Library for MCP Servers
github.comΒ·22hΒ·
Discuss: Hacker News
πŸ”ŒInterface Evolution
DigitalOcean Fundamentals: API
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”ŒInterface Evolution
From Manual to AI: My Journey with Keploy Chrome Extension
dev.toΒ·5hΒ·
Discuss: DEV
🎬WebCodecs API
Open-Source & Cyber Resilience Act - Differing opinions aside
dev.toΒ·23hΒ·
Discuss: DEV
πŸ”Capability Systems
How to find Aviatrix Controller on your network
runzero.comΒ·2d
πŸ”“Hacking
CSCPSUT MetaCTF25 Qualifications Writeups
infosecwriteups.comΒ·7h
πŸ”PKI Archaeology
Exploring High Efficiency Web Analysis Results(1750904353002600οΌ‰
dev.toΒ·1dΒ·
Discuss: DEV
🌊Stream Processing
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”’WASM Capabilities
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.orgΒ·3d
βš”οΈLean Tactics
Bypassing Filters via XML Encoding to Perform SQL Injection for Bug Hunting with BurpSuite
infosecwriteups.comΒ·4d
πŸ’£ZIP Vulnerabilities
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.comΒ·2d
🦠Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap