๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽซ Kerberos Exploitation

Golden Tickets, Domain Enumeration, Windows Authentication, Red Team Operations

US judge confirms shutdown of 'Alligator Alcatraz' that cost Florida $218M
lemonde.frยท7h
๐Ÿ›กCybersecurity
Why I Joined Hawcx
self-issued.infoยท1d
๐ŸบKerberos Archaeology
Enigma Crypto Transmission on Saturday August 30, 2025 @ 2000 GMT
radiomarine.orgยท3dยท
Discuss: Hacker News
๐Ÿ”Polish Cryptanalysis
Colombia's ombudswoman says 33 soldiers allegedly kidnapped under orders of a rebel group are freed
the-independent.comยท5h
๐Ÿ”Polish Cryptanalysis
Optimising for maintainability โ€“ Gleam in production at Strand
gleam.runยท17hยท
Discuss: Lobsters, Hacker News
๐Ÿฆ€Rust Macros
YouTuber draws attention to AI-powered mass vehicle surveillance in the U.S.
the-decoder.comยท17h
๐Ÿ•ต๏ธVector Smuggling
I've always wanted to be an open-source maintainer- now I regret it
joaomagfreitas.linkยท10hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
The Ultimate Guide to Buying Old Yahoo accounts
dev.toยท19hยท
Discuss: DEV
๐Ÿ”BitFunnel
How AWS averted an AI coding supply chain disaster
reversinglabs.comยท2d
โš™๏ธProof Engineering
Show HN: Open-source Go repo comparing DCA vs. Grid with reproducible backtests
github.comยท3dยท
Discuss: Hacker News, r/golang
๐Ÿ”—Hash Chains
BEST BITCOIN RECOVERY EXPERT; ETH AND USDT RECOVERY EXPERT HIRE. META TECH RECOVERY PRO
dev.toยท1dยท
Discuss: DEV
๐Ÿ”คEBCDIC Mining
Research, Review, Rebuild: Intelligent Modernisation with MCP and Strategic Prompting
martinfowler.comยท1d
๐Ÿฆ‹Format Metamorphosis
P2C: Path to Counterfactuals
arxiv.orgยท5h
๐Ÿ”BitFunnel
TransUnion discloses a data breach impacting over 4.4 million customers
securityaffairs.comยท20h
๐Ÿ›กCybersecurity
Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication
arxiv.orgยท1d
๐Ÿ›ก๏ธARM TrustZone
Threat report: How cybercriminals are abusing Claude from Anthropic
heise.deยท1d
๐Ÿ”“Hacking
ConspirED: A Dataset for Cognitive Traits of Conspiracy Theories and Large Language Model Safety
arxiv.orgยท5h
๐Ÿง Intelligence Compression
Beyond Optimization: Exploring Novelty Discovery in Autonomous Experiments
arxiv.orgยท5h
๐ŸบComputational Archaeology
FLAegis: A Two-Layer Defense Framework for Federated Learning Against Poisoning Attacks
arxiv.orgยท2d
๐ŸคSecure Multiparty
PRISM: Robust VLM Alignment with Principled Reasoning for Integrated Safety in Multimodality
arxiv.orgยท2d
๐Ÿ’ปLocal LLMs
Loading...Loading more...
AboutBlogChangelogRoadmap