🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ LDAP Enumeration

Directory Mining, Attack Vectors, Domain Investigation, Enterprise Security

July 2025 Detection Highlights: 7 New VMRay Threat Identifiers, Config Extractors for 4 malware families, and 35+ fresh YARA rules.
vmray.com·10h
🦠Malware Analysis
Introducing the IDA Domain API
hex-rays.com·11h
🔌Interface Evolution
PyPI: Preventing Domain Resurrection Attacks
blog.pypi.org·6h·
Discuss: Lobsters, Hacker News
🌐DNS Security
Pushing the Limits of Frequency Analysis in Leakage Abuse Attacks
arxiv.org·18h
🌳Archive Merkle Trees
How Evolving RATs Are Redefining Enterprise Security Threats
darkreading.com·8h
🎯Threat Hunting
Best Attack Surface Monitoring Tools
circleid.com·3h
🕵️Penetration Testing
Sanity Check: Is my network traffic properly encrypted with this setup?
reddit.com·4h·
Discuss: r/homelab
🌐DNS over QUIC
FTP Security Risks, Vulnerabilities & Best Practices Guide
securityscorecard.com·3h
📡Feed Security
How To Tame Alert Fatigue With Time Series Databases
thenewstack.io·6h
📈Time Series
Automated Metadata Enrichment for Long-Tail Digital Archives via Knowledge Graph Fusion and Semantic Reasoning
dev.to·17h·
Discuss: DEV
🤖Archive Automation
Nexus: Securing MCP Tool Sprawl
grafbase.com·4h·
Discuss: Hacker News
🕸️Mesh Networking
yarrick/iodine
github.com·20h
🌐DNS over QUIC
A shocking amount of companies are knowingly shipping insecure code - and it might be hard to recover
techradar.com·6h
📏Code Metrics
18th August – Threat Intelligence Report
research.checkpoint.com·12h
🔓Hacking
Code Smell 308 - The Key to Safer, Cleaner, More Polymorphic Code
hackernoon.com·17h
🎯Gradual Typing
15.03 Life Admin System
johnnydecimal.com·7h
🏠Personal Archives
Show HN: Building a web search engine from scratch (a reply to Wilson Lin)
medium.com·7h·
Discuss: Hacker News
🗂️Vector Search
CTF Challenge Write Up : KYPO Locust 3302 Challenge of Blackcat
pixelstech.net·15h
🕵️Penetration Testing
Indirect Prompt Injections Exploit Context, Format, and Salience
fogel.dev·2h·
Discuss: Lobsters, Hacker News
🧪Protocol Fuzzing
Cache Me If You Can (2017)
queue.acm.org·1h·
Discuss: Hacker News
🌐IPFS
Loading...Loading more...
AboutBlogChangelogRoadmap