🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Exploitation

Golden Tickets, Domain Enumeration, Windows Authentication, Red Team Operations

Classic WTF: NoeTimeToken
thedailywtf.comΒ·12h
πŸ”“Hacking
SigNoz (YC W21, Open Source Datadog) Is Hiring DevRel Engineers (Remote)(US)
ycombinator.comΒ·16mΒ·
Discuss: Hacker News
πŸ”“Open Source Software
6 Key Security Risks in LLMs: A Platform Engineer’s Guide
thenewstack.ioΒ·1d
πŸ’»Local LLMs
Comparing the American and Chinese 0day Pipelines
news.risky.bizΒ·16h
πŸ”“Hacking
Butian Platform: Forging China's Next Generation of White Hat Hackers
nattothoughts.substack.comΒ·22hΒ·
Discuss: Substack
πŸ”“Hacking
C++ Seeding Surprises (2015)
pcg-random.orgΒ·1dΒ·
Discuss: Hacker News
πŸ”’Bitwise Algorithms
15 Critical Steps to Secure Your Linux Server: Complete Security Guide
dev.toΒ·2dΒ·
Discuss: DEV
🏠Homelab Security
Look right: Threat campaign fooling developers in GitHub repos – Programmer Zone
quiz.businessexplain.comΒ·1dΒ·
Discuss: Hacker News
πŸš€Indie Hacking
CVE-2025-32975 - Quest KACE SMA Authentication Bypass
seclists.orgΒ·2d
🎫Kerberos Attacks
China-Nexus 'LapDogs' Network Thrives on Backdoored SOHO Devices
darkreading.comΒ·1d
🎫Kerberos Attacks
This is how you build an AI Ransomware Worm
trufflesecurity.comΒ·2dΒ·
Discuss: Hacker News
πŸ•΅οΈVector Smuggling
How to find Aviatrix Controller on your network
runzero.comΒ·1d
πŸ”“Hacking
Exploring High Efficiency Web Analysis Results(1750904353002600οΌ‰
dev.toΒ·16hΒ·
Discuss: DEV
🌊Stream Processing
French cybercrime police arrest five suspected BreachForums admins
theregister.comΒ·1d
πŸ”“Hacking
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.comΒ·2d
πŸ’ΏOptical Forensics
Prometei botnet activity has surged since March 2025
securityaffairs.comΒ·1d
🎫Kerberos Attacks
AppSec as Glue: Building Partnerships to Scale Security
tldrsec.comΒ·4hΒ·
Discuss: Hacker News
πŸ”Capability Systems
rustzen-admin Series (Part 1): Authentication Security Upgrade - From bcrypt to Argon2
dev.toΒ·3dΒ·
Discuss: DEV
πŸ”“Password Cracking
Quantum computing: secure in the long term thanks to QKD
heise.deΒ·1d
πŸ”Quantum Security
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”Homomorphic Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap