🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Exploitation

Golden Tickets, Domain Enumeration, Windows Authentication, Red Team Operations

Does anyone here play ROBLOX?
forums.anandtech.com·1d
🕹️Retro Gaming
Running Go tools in a browser
popovicu.com·7h·
Discuss: r/golang
🕸️WebAssembly
Your mouse-free setups
lobste.rs·1d·
Discuss: Lobsters
🪟Awesome windows command-line
Show HN: What to Do with an Old iPad
odb.ar·1d·
Discuss: Hacker News, r/selfhosted
🏴‍☠️Piracy
ICE raid on Hyundai plant in Georgia swept up workers on visitor visas
bbc.com·21h
🛡Cybersecurity
‘It is a war of drones now’: the ever-evolving tech dominating the frontline in Ukraine
theguardian.com·18h·
Discuss: Hacker News
🇷🇺Russian Computing
Playzee Bonus: 100% deposit bonus up to £300, 100 free spins & 500 reward points
the-independent.com·1d
🏺Kerberos Archaeology
What is your competitive advantage?
growingfearless.substack.com·1d·
Discuss: Substack
🔐Capability Systems
Get a dog – or just a dog sign: 14 expert ways to protect your home
theguardian.com·2d
🏠Home Automation
This Android Malware Is Spreading Through Facebook Ads
lifehacker.com·2d
🕵️Vector Smuggling
EU fines Google $3.5B over adtech ‘abuse’
techcrunch.com·7h
🔍BitFunnel
Why Everybody Is Losing Money On AI
wheresyoured.at·1d·
Discuss: Hacker News
🌀Brotli Internals
[D] Performance overhead of running ML inference in hardware-isolated environments - production metrics
reddit.com·2d·
Discuss: r/MachineLearning
📊Performance Profiling
Evals are a scam. And we're being gaslit into believing they aren't
hacktrace.substack.com·21h·
Discuss: Substack
📏Code Metrics
SQL for Bug Bounty Hunters
infosecwriteups.com·1d
💾SQLite
Speech DF Arena: A Leaderboard for Speech DeepFake Detection Models
arxiv.org·2d
🔍FLAC Forensics
AI Idea #1757094704
dev.to·1d·
Discuss: DEV
🎛️Feed Filtering
Unlock the Black Box: AI-Powered Optimization for Any Problem
dev.to·1d·
Discuss: DEV
⚡Incremental Computation
Extracting Structured Data with LangExtract: A Deep Dive into LLM-Orchestrated Workflows
towardsdatascience.com·10h
🤖Archive Automation
North Korea’s APT37 deploys RokRAT in new phishing campaign against academics
securityaffairs.com·5d
🎫Kerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap