🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ LDAP Enumeration

Directory Mining, Attack Vectors, Domain Investigation, Enterprise Security

Are Cyber Defenders Winning? – Lawfare
lawfaremedia.org·1d·
Discuss: Hacker News
🎯Threat Hunting
Observing and evaluating AI agentic workflows with Strands Agents SDK and Arize AX
aws.amazon.com·16h
🌊Stream Processing
Hunting for Secrets in Plain Sight: Leveraging Internal Logging and Monitoring Services
praetorian.com·2d
🏺Kerberos Archaeology
Threat Analysis - Public Administration - May -> July of 2025
cstromblad.com·1d
🕵️Penetration Testing
IEPG at IETF 123
potaroo.net·2d
📡Network Protocol Design
Hack The Box Academy Writeup — PASSWORD ATTACKS — Writing Custom Wordlists and Rules
infosecwriteups.com·1d
🔓Password Cracking
Show HN: AgentSmith-HUB – Real-time security data pipeline and detection engine
github.com·23h·
Discuss: Hacker News
🎯Threat Hunting
Rant - Homelab Creep and Increasing Complexity
reddit.com·19h·
Discuss: r/homelab
🏠Homelab Orchestration
Accelerating Offensive R&D with Large Language Models
outflank.nl·1d
🔒WASM Capabilities
GITEX GLOBAL 2025
darkreading.com·20h
🛡Cybersecurity
Turning ChatGPT Codex Into A ZombAI Agent
embracethered.com·1h
🎫Kerberos Exploitation
Understanding the KNN Algorithm: Finding Your Nearest Neighbors
dev.to·7h·
Discuss: DEV
🗂️Vector Search
Release Highlights: VMRay Platform 2025.3.0
vmray.com·1d
🎬WebCodecs
6 Ways to prevent a man-in-the-middle (MitM) attack
fingerprint.com·1d
🎯NTLM Attacks
Launch HN: Gecko Security (YC F24) – AI That Finds Vulnerabilities in Code
news.ycombinator.com·1d·
Discuss: Hacker News
🧪Binary Fuzzing
Cybersecurity Snapshot: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security
tenable.com·19h
🔓Hacking
How HackerOne’s API Pentesting Delivers A Community-Powered Model
hackerone.com·3d
🧪Protocol Fuzzing
Vulnerability disclosure on SSL for SaaS v1 (Managed CNAME)
blog.cloudflare.com·19h
🔓LDAP Injection
The Good, the Bad and the Ugly in Cybersecurity – Week 31
sentinelone.com·19h
🛡Cybersecurity
DICOM De-Identification via Hybrid AI and Rule-Based Framework for Scalable, Uncertainty-Aware Redaction
arxiv.org·1d
🔄Archival Workflows
Loading...Loading more...
AboutBlogChangelogRoadmap