🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏒 LDAP Forensics

Directory Investigation, Authentication Analysis, Enterprise Security, Schema Mining

Forensic journey: Breaking down the UserAssist artifact structure
securelist.comΒ·1d
πŸ”NTLM Archaeology
Courts Favor Targeted eDiscovery Collections, but It Is Up to In-House Teams to Enable Such Cost Saving Proportional Efforts
blog.x1discovery.comΒ·1h
βš–οΈLegal Compliance
On the Move: Fast Flux in the Modern Threat Landscape
bitsight.comΒ·7h
πŸ“‘BGP Archaeology
BURN: Backdoor Unlearning via Adversarial Boundary Analysis
arxiv.orgΒ·15h
πŸ•΅οΈVector Smuggling
MOST USEFUL TOOLS IN AD PENTESTING
infosecwriteups.comΒ·3d
πŸ”’LDAP Security
Week 28 – 2025
thisweekin4n6.comΒ·2d
🏺Kerberos Archaeology
Windows Hello for Business – The Face Swap
insinuator.netΒ·7h
🎯NTLM Attacks
A distributed systems reliability glossary
antithesis.comΒ·4hΒ·
Discuss: Lobsters, Hacker News
βœ…Archive Fixity
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.comΒ·6h
🦠Malware Analysis
Smarter AI for Critical Operations: Why Data Matters
thenewstack.ioΒ·2h
🌊Stream Processing
The Future of AI Agent Communication with ACP
towardsdatascience.comΒ·3h
πŸ”ŒInterface Evolution
How to Become an Integrity Sleuth in the Library | Katina Magazine
katinamagazine.orgΒ·1d
πŸ”¬Academic Search
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgΒ·2d
🌐DNS Security
Trace Every Identity Action with Teleport Identity Security
goteleport.comΒ·19h
πŸ”—Data Provenance
You Can’t Make This Stuff Up
irreal.orgΒ·4h
πŸ”“Hacking
Students, here are 5 key things to know when learning how to train large language models
techradar.comΒ·2h
πŸ’»Local LLMs
AI Shield: How Artificial Intelligence Protects Your Digital Life
blog.checkpoint.comΒ·1d
🎯Threat Hunting
TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More
darknet.org.ukΒ·1d
🌐DNS Security
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
unit42.paloaltonetworks.comΒ·1d
🎫Kerberos Exploitation
Ransomware Threat Landscape Analysis - May through July for 2025
cstromblad.comΒ·1d
🦠Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap