🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ LDAP Security

Directory Injection, Authentication Bypass, Enterprise Pentesting, AD Enumeration

BDFirewall: Towards Effective and Expeditiously Black-Box Backdoor Defense in MLaaS
arxiv.orgΒ·55m
πŸ›‘οΈeBPF Security
DNS at IETF 123
potaroo.netΒ·5h
🌐DNS Security
Project AK47: Uncovering a Link to the SharePoint Vulnerability Attacks
unit42.paloaltonetworks.comΒ·5h
🌐DNS Security
Authentication vs. authorization: What’s the difference?
proton.meΒ·18h
πŸ”Capability Systems
We trained LLM to find reentrancy vulnerabilities in smart contracts
blog.unvariant.ioΒ·14hΒ·
Discuss: Hacker News
πŸ§ͺBinary Fuzzing
Gotta Go Fast: Jobs, Emails and Cache with Rails
blog.codeminer42.comΒ·11h
πŸ”„Sync Engine
ssh/RDP to home PC
noip.comΒ·6hΒ·
Discuss: r/homelab
🌐DNS Security
Hack Smarter: Automate Security Testing with LLMs and the CAI Framework
infosecwriteups.comΒ·2d
🏠Homelab Pentesting
Hackers are stealing Microsoft 365 accounts by abusing link-wrapping services
techradar.comΒ·1d
🎫Kerberos Attacks
ELA-1492-1 python-setuptools security update
freexian.comΒ·18h
πŸ“¦Container Security
Akira Ransomware Exploits SonicWall SMA100 Vulnerabilities: What You Need to Know
bitsight.comΒ·10h
🌐DNS Security
Top 10 security threats to K-12 schools
jamf.comΒ·7h
πŸ”“Hacking
pdfRest Launches New Sign PDF API Tool for Legally Compliant Digital Signatures
pdfa.orgΒ·1d
πŸ“„PDF Archaeology
Rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration (CVSS v4.0 Score: 9.3 / Critical)
seclists.orgΒ·3d
πŸ’£ZIP Vulnerabilities
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.comΒ·15h
πŸ’ΏDAT Forensics
Security update: Phishing attacks on IBM Operational Decision Manager possible
heise.deΒ·1d
πŸ”“Hacking
In Cybersecurity, We Have to Work Together
tenable.comΒ·18h
πŸ”“Hacking
Amp Code: Arbitrary Command Execution via Prompt Injection Fixed
embracethered.comΒ·15h
πŸ›‘οΈCLI Security
Ranking the top threats and techniques for the first half of 2025
redcanary.comΒ·15h
🎯Threat Hunting
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.comΒ·1d
🦠Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap