๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ LDAP Security

Directory Injection, Authentication Bypass, Enterprise Pentesting, AD Enumeration

MOST USEFUL TOOLS IN AD PENTESTING
infosecwriteups.comยท3d
๐ŸขActive Directory
MT4DP: Data Poisoning Attack Detection for DL-based Code Search Models via Metamorphic Testing
arxiv.orgยท7h
๐ŸงฎZ3 Solver
Pre-Auth SQLi to RCE โ€“ Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
labs.watchtowr.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธCBOR Security
Hackers exploit a blind spot by hiding malware inside DNS records
arstechnica.comยท18m
๐ŸŒDNS Security
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.comยท22h
๐Ÿฆ Malware Analysis
U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท11h
๐Ÿ”“Hacking
Windows Hello for Business โ€“ The Face Swap
insinuator.netยท22h
๐ŸŽฏNTLM Attacks
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgยท2d
๐ŸŒDNS Security
Attackers Abuse AWS Cloud to Target Southeast Asian Governments
darkreading.comยท18h
๐Ÿ‘๏ธObservatory Systems
APIs Are Eating the Internetโ€”And Hackers Are Eating APIs
hackernoon.comยท6h
๐Ÿ”“Hacking
You Canโ€™t Make This Stuff Up
irreal.orgยท19h
๐Ÿ”“Hacking
TREVORspray โ€“ Credential Spray Toolkit for Azure, Okta, OWA & More
darknet.org.ukยท2d
๐ŸŒDNS Security
LuCI on MGMT - Day 7
dev.toยท7hยท
Discuss: DEV
๐Ÿ“ปHomebrew Protocols
Students, here are 5 key things to know when learning how to train large language models
techradar.comยท18h
๐Ÿ’ปLocal LLMs
Does DNS Security Matter?
systemsapproach.orgยท2d
๐ŸŒDNS Security
MCP: A Practical Security Blueprint for Developers
thenewstack.ioยท15h
๐Ÿ”“Hacking
From VPN Vulnerability to SASE Victory: How A Growing Fintech Firm Transformed Its Security Posture and Scalability in Under a Week
blog.checkpoint.comยท22h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature
news.risky.bizยท7h
๐Ÿ”“Hacking
Adversary Infrastructure and Indicators Behind the SAP NetWeaver 0-Day Exploitation
research.kudelskisecurity.comยท2d
๐ŸŽซKerberos Exploitation
Checking data integrity
eclecticlight.coยท5h
โœ…Checksum Validation
Loading...Loading more...
AboutBlogChangelogRoadmap