🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ LDAP Enumeration

Directory Mining, Attack Vectors, Domain Investigation, Enterprise Security

Are Cyber Defenders Winning? – Lawfare
lawfaremedia.org·5h·
Discuss: Hacker News
🎯Threat Hunting
Machine Learning Fundamentals: k-nearest neighbors with python
dev.to·1d·
Discuss: DEV
🧠Learned Indexes
Hunting for Secrets in Plain Sight: Leveraging Internal Logging and Monitoring Services
praetorian.com·1d
🏺Kerberos Archaeology
Threat Analysis - Public Administration - May -> July of 2025
cstromblad.com·22h
🕵️Penetration Testing
IEPG at IETF 123
potaroo.net·1d
📡Network Protocol Design
Hack The Box Academy Writeup — PASSWORD ATTACKS — Writing Custom Wordlists and Rules
infosecwriteups.com·3h
🔓Password Cracking
Accelerating Offensive R&D with Large Language Models
outflank.nl·21h
🔒WASM Capabilities
Release Highlights: VMRay Platform 2025.3.0
vmray.com·9m
🎬WebCodecs
Launch HN: Gecko Security (YC F24) – AI That Finds Vulnerabilities in Code
news.ycombinator.com·15h·
Discuss: Hacker News
🧪Binary Fuzzing
6 Ways to prevent a man-in-the-middle (MitM) attack
fingerprint.com·9h
🎯NTLM Attacks
How HackerOne’s API Pentesting Delivers A Community-Powered Model
hackerone.com·2d
🧪Protocol Fuzzing
Stop Hardcoding Passwords
blog.nviso.eu·57m
🔐PKI Archaeology
Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations
research.checkpoint.com·13h
🌐DNS Security
Why we need better software identification
softwareheritage.org·17h
🔗Binary Similarity
DICOM De-Identification via Hybrid AI and Rule-Based Framework for Scalable, Uncertainty-Aware Redaction
arxiv.org·3h
🔄Archival Workflows
Challenges Facing Information Management in Emerging Countries’ Government Agencies
info.aiim.org·20h
🔄Archival Workflows
APT Explained: From Nation-State Actors to Naming Conventions
hackernoon.com·1d
🎫Kerberos History
Introducing Unit 42’s Attribution Framework
unit42.paloaltonetworks.com·21h
🎯Threat Hunting
Sophos Endpoint: Consistently AAA rated – Q2 2025 SE Labs Endpoint Protection Report
news.sophos.com·18h
🕵️Penetration Testing
Why build a domain-specific agent for front end tasks?
kombai.com·17h·
Discuss: Hacker News
🗣️Domain-Specific Languages
Loading...Loading more...
AboutBlogChangelogRoadmap