๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ LDAP Enumeration

Directory Mining, Attack Vectors, Domain Investigation, Enterprise Security

Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
unit42.paloaltonetworks.comยท5h
๐ŸŒDNS Security
Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure
lab.wallarm.comยท4h
๐Ÿ›ก๏ธCLI Security
The Art of the Honeypot Account: Making the Unusual Look Normal
adsecurity.orgยท2d
๐ŸขActive Directory
Phishing in the Cloud: SendGrid Campaign Exploits Account Security
cofense.comยท10h
๐Ÿ›กCybersecurity
AI coding tools gain security โ€” but the controls do not cut it
reversinglabs.comยท27m
๐Ÿ”“Hacking
My Zip Isn't Your Zip: Identifying and Exploiting Semantic Gaps Between Parsers
usenix.orgยท6hยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Tyson Foods elevates customer search experience with an AI-powered conversational assistant
aws.amazon.comยท17h
๐Ÿ“กRSS Automation
DNS at IETF 123
blog.apnic.netยท2d
๐ŸŒDNS Security
Prepping the Front Line for MFA Social Engineering Attacks
darkreading.comยท1h
๐Ÿ•ต๏ธPenetration Testing
July 2025 Detection Highlights: 7 New VMRay Threat Identifiers, Config Extractors for 4 malware families, and 35+ fresh YARA rules.
vmray.comยท3d
๐Ÿฆ Malware Analysis
Enumerating AWS the quiet way: CloudTrail-free discovery with Resource Explorer
securitylabs.datadoghq.comยท1dยท
Discuss: Hacker News
๐Ÿ•ต๏ธDomain Enumeration
Don't Forget The "-n" Command Line Switch, (Thu, Aug 21st)
isc.sans.eduยท9h
๐ŸŒDNS Security
Optimizing multiprecision LLL in FLINT
fredrikj.netยท15h
๐ŸงฎAlgebraic Datatypes
What Claude Code gets right
minusx.aiยท50mยท
Discuss: Hacker News
โšกProof Automation
Digital Forensics Round-Up, August 20 2025
forensicfocus.comยท23h
๐Ÿ“ŸTerminal Forensics
CodeSOD: Copy of a Copy of a
thedailywtf.comยท1d
๐ŸŒฒB-tree Forensics
We Found Zero Low-Severity Bugs in 165 AI Code Reports. Zero
shamans.devยท23hยท
Discuss: Hacker News, r/programming
๐Ÿ•ต๏ธDomain Enumeration
Finding links between fraudulent email domains using graph-based clustering
blog.castle.ioยท2dยท
Discuss: Hacker News
๐Ÿ“กDNS Archaeology
Is a new privacy protocol helping malicious actors more than Internet users?
techradar.comยท6h
๐Ÿ”Homomorphic Encryption
US CERT/CC warns of flaws in Workhorse Software accounting software used by hundreds of municipalities in Wisconsin
securityaffairs.comยท8h
๐Ÿ”CBOR
Loading...Loading more...
AboutBlogChangelogRoadmap