🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos History

Authentication Evolution, MIT Athena, Domain Architecture, Ticket Forensics

Get Back To WARP
binary.ninja·1d
🧪Binary Fuzzing
NEWS ROUNDUP – 23rd August 2025
digitalforensicsmagazine.com·4h
🕵️Network Forensics
InfoSec News Nuggets 8/21/2025
aboutdfir.com·2d
🔓Hacking
Phishing in the Cloud: SendGrid Campaign Exploits Account Security
cofense.com·2d
🛡Cybersecurity
I Hacked Monster Energy and You Won't Believe What They Think You Look Like
bobdahacker.com·55m·
Discuss: Hacker News
🔓Hacking
AI Agents Need Data Integrity
schneier.com·1d·
Discuss: www.schneier.com
🛡️Preservation Proofs
Stop Calling It OSINT
dutchosintguy.com·1d
🔎OSINT Techniques
Azure's Weakest Link – Full Cross-Tenant Compromise
binarysecurity.no·2d·
Discuss: Hacker News
🎯NTLM Attacks
Scamlexity
guard.io·2d·
Discuss: Hacker News, Hacker News
🎫Kerberos Attacks
‘The Immutable Laws of Security’ at 25: 5 corollaries for a new era
reversinglabs.com·3d
🔒WASM Capabilities
How HackerOne Uses AI to Triage, Prioritize, and Validate Code Scanner Findings at Scale
hackerone.com·2d
⚡Proof Automation
Cracking the Density Code: Why MAF Flows Where KDE Stalls
towardsdatascience.com·1d
🔗Tailscale
The "impossibly small" Microdot web framework
lwn.net·7h·
Discuss: Hacker News
🌐Web Standards
A Deep Dive into OTA Update Support with KubeEdge for Edge Kubernetes
blog.devops.dev·1d
🌊Streaming Systems
Colt Technical Services gets ransomware’d via SharePoint initial access— some learning points
doublepulsar.com·1d
🔒Secure Boot
Money in Motion: Micro-Velocity and Usage of Ethereums Liquid Staking Tokens
arxiv.org·1d
📟Historical Protocols
Quick background and Demo on kagent - Cloud Native Agentic AI - with Christian Posta and Mike Petersen
youtube.com·1d
🏠Homelab Archaeology
Weaponizing image scaling against production AI systems
blog.trailofbits.com·2d·
Discuss: Hacker News, r/LocalLLaMA, r/programming
🕵️Vector Smuggling
Digest #177: AWS in 2025, HashiCorp Vault Zero-Day Flaws, Why No SRE, Docker-Compose Tricks
devopsbulletin.com·1d
📦Container Security
Introduction to Bluesky's AT Protocol
mackuba.eu·2d·
Discuss: Hacker News
🔌Interface Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap