๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽซ Kerberos Exploitation

Golden Tickets, Domain Enumeration, Windows Authentication, Red Team Operations

The Mysterious Shortwave Radio Station Stoking US-Russia Nuclear Fears
wired.comยท1dยท
Discuss: r/technews
๐Ÿ‡ท๐Ÿ‡บSoviet Computing
About $2,500 worth of medication stolen from Los Gatos Safeway
mercurynews.comยท2h
๐ŸšจIncident Response
CLI Tools That Support Previews, Dry Runs or Non-Destructive Actions
nickjanetakis.comยท16h
๐Ÿ›ก๏ธCLI Security
Discussing the Open Source, Open Threats? paper with Behzad and Ali
opensourcesecurity.ioยท1d
๐Ÿ”“Open Source Software
FCC Bars over 1,200 Providers for Non-Compliance with Robocall Protections
docs.fcc.govยท1dยท
Discuss: Hacker News, r/privacy
๐Ÿ“ปHomebrew Protocols
2.5B Gmail users endangered after Google database hack
pcworld.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Lack of operational excellence threatens us, not AI
dzidas.comยท1dยท
Discuss: Hacker News
๐Ÿ’พPersistence Strategies
The Lobster Programming Language
strlen.comยท20hยท
Discuss: Hacker News
๐Ÿ”—Concatenative Programming
How to Test Proxies with Nstproxy: A Complete Guide
dev.toยท9hยท
Discuss: DEV
๐Ÿ Homelab Pentesting
Configurable Open Source Audio Spectrum Visualizer
github.comยท2dยท
Discuss: Hacker News, Hacker News
๐ŸŒˆSpectral Audio
Prepping the Front Line for MFA Social Engineering Attacks
darkreading.comยท5d
๐Ÿ•ต๏ธPenetration Testing
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comยท1d
๐Ÿ”Quantum Security
InfoSec News Nuggets 8/20/2025
aboutdfir.comยท6d
๐Ÿ”“Hacking
How I Make Claude Code Work for Me (Aug 2025)
craftingteams.substack.comยท14hยท
Discuss: Substack
๐Ÿ”ฉSystems Programming
Microsoft PC Manager: Critical gap allows privilege escalation
heise.deยท3d
๐Ÿ”ŒOperating system internals
The EUโ€™s Cyber Resilience Act: Redefining Secure Software Development
devops.comยท2h
๐Ÿ”“Open Source Software
Blockchain Security Expert AI Track
dev.toยท2dยท
Discuss: DEV
๐Ÿ”—Hash Chains
No,I am not having this!
aardvark.co.nzยท26m
๐Ÿ Personal Archives
Positional Embeddings in Transformers: A Math Guide to RoPE & ALiBi
towardsdatascience.comยท2h
๐Ÿ“Geometric Hashing
PipeMagic Backdoor Resurfaces as Part of Play Ransomware Attack Chain
darkreading.comยท6d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap