🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ LDAP Enumeration

Directory Mining, Attack Vectors, Domain Investigation, Enterprise Security

Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations
research.checkpoint.com·1d
🌐DNS Security
This Week in Security: Spilling Tea, Rooting AIs, and Accusing of Backdoors
hackaday.com·10h
🔓Hacking
| Oligo Security
oligo.security·2h
📦Container Security
Why we need better software identification
softwareheritage.org·1d
🔗Binary Similarity
Challenges Facing Information Management in Emerging Countries’ Government Agencies
info.aiim.org·1d
🔄Archival Workflows
Encapsulation vs Fragmentation, Again
theprogrammersparadox.blogspot.com·3h·
Discuss: theprogrammersparadox.blogspot.com
🧠Program Logic
How Hackers Break AI Models: A Developer's Guide to Adversarial Threats
dev.to·12h·
Discuss: DEV
🕵️Vector Smuggling
Show HN: An API to extract structured data from any document without training
ninjadoc.ai·10h·
Discuss: Hacker News
📄Document AI
APT Explained: From Nation-State Actors to Naming Conventions
hackernoon.com·1d
🎫Kerberos History
Introducing Unit 42’s Attribution Framework
unit42.paloaltonetworks.com·1d
🎯Threat Hunting
Why build a domain-specific agent for front end tasks?
kombai.com·1d·
Discuss: Hacker News
🗣️Domain-Specific Languages
Expose and Circumvent SNI-Based QUIC Censorship of the Great Firewall of China
gfw.report·3h·
Discuss: Hacker News
🌐DNS over QUIC
Re: Multiple vulnerabilities in the web management interface of Intelbras routers
seclists.org·2d
🛣️BGP Hijacking
Leveraging OSINT from the Dark Web – A Practical How-To
darknet.org.uk·2d
🌐WARC Forensics
Still Up. Still Evil
vulncheck.com·1d·
Discuss: Hacker News
🌐DNS Security
The Big Oops in Type Systems: This Problem Extends to FP as Well
danieltan.weblog.lol·1d·
Discuss: Hacker News
💧Liquid Types
Measuring the Attack/Defense Balance
schneier.com·2d
🎯Threat Hunting
Comprehensive Overview of the Identity Management Ecosystem in 2025
guptadeepak.com·1d·
Discuss: DEV, Hacker News
🔐Capability Systems
How Judoscale's Utilization-Based Autoscaling Works
judoscale.com·1d·
Discuss: Hacker News
📊Performance Profiling
Russian group Turla impersonated Kaspersky to spy on embassies
metacurity.com·10h
🛡Cybersecurity
Loading...Loading more...
AboutBlogChangelogRoadmap