๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽซ Kerberos Exploitation

Golden Tickets, Domain Enumeration, Windows Authentication, Red Team Operations

Show HN: BypassGPT โ€“ A tool to humanize AI text to pass AI detectors
bypassgpt.appยท16hยท
Discuss: Hacker News
๐Ÿค–Paleography Automation
Linux Turns 34
linux.slashdot.orgยท1h
๐Ÿ”ŒOperating system internals
Unikernel Cronjobs on AWS
nanovms.comยท1dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Microsoft PC Manager: Critical gap allows privilege escalation
heise.deยท3d
๐Ÿ”ŒOperating system internals
Faith and Cyber: Protecting Today, Trusting Tomorrow
dev.toยท9hยท
Discuss: DEV
๐Ÿ›กCybersecurity
Study: Insider threats from AI are more dangerous than external cyberattacks
heise.deยท1d
๐Ÿ›กCybersecurity
PipeMagic Backdoor Resurfaces as Part of Play Ransomware Attack Chain
darkreading.comยท6d
๐Ÿ”“Hacking
Debugging the Instant Macropad
hackaday.comยท8h
๐Ÿ“บVT100
DCP-o-matic โ€ข Re: Veriying DCP on Synology NAS via CLI
dcpomatic.comยท15h
๐Ÿ› System administration
Iโ€™m creating an open-source application to manage deployment strategies for applications.
reddit.comยท2dยท
Discuss: r/kubernetes
๐Ÿ”“Open Source Software
Vulnerabilities in IT security solution IBM QRadar SIEM closed
heise.deยท16h
๐Ÿ”“Hacking
Colt confirms customer data stolen as Warlock ransomware crew auctions off details
techradar.comยท3d
๐ŸบKerberos Archaeology
LINUX CREDENTIAL HUNTING
infosecwriteups.comยท20h
๐Ÿ“ŸTerminal Forensics
How to Use DeepSeek-V3.1 API โ€” a practical developer tutorial
dev.toยท13hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Silk Typhoon Attacks North American Orgs in the Cloud
darkreading.comยท3d
๐Ÿ”“Hacking
Show HN: Open-Source Agentic AI for Company Research
github.comยท12hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
After SharePoint attacks, Microsoft stops sharing PoC exploit code with China
securityaffairs.comยท3d
๐Ÿ”“Hacking
The Pain of Building My Own Fully-Featured Locally Hosted ChatGPT Out of Open Source Tools And a Franken Laptop
dev.toยท1dยท
Discuss: DEV
๐Ÿ–ฅ๏ธTerminal Renaissance
A clever new Linux malware is breaking into systems - and then shutting the door behind it to avoid detection
techradar.comยท5d
๐Ÿ”“Hacking
Basic projector repair job turns into armed encounter at secret bunker
theregister.comยท3d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap