๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ LDAP Security

Directory Injection, Authentication Bypass, Enterprise Pentesting, AD Enumeration

MOST USEFUL TOOLS IN AD PENTESTING
infosecwriteups.comยท3d
๐ŸขActive Directory
Pre-Auth SQLi to RCE โ€“ Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
labs.watchtowr.comยท19hยท
Discuss: Hacker News
๐Ÿ›ก๏ธCBOR Security
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.comยท13h
๐Ÿฆ Malware Analysis
U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท2h
๐Ÿ”“Hacking
How PayU built a secure enterprise AI assistant using Amazon Bedrock
aws.amazon.comยท4h
๐ŸŒŠStreaming Systems
Windows Hello for Business โ€“ The Face Swap
insinuator.netยท13h
๐ŸŽฏNTLM Attacks
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgยท2d
๐ŸŒDNS Security
Attackers Abuse AWS Cloud to Target Southeast Asian Governments
darkreading.comยท9h
๐Ÿ‘๏ธObservatory Systems
You Canโ€™t Make This Stuff Up
irreal.orgยท10h
๐Ÿ”“Hacking
NixOS: Declarative Management, Imperative Privilege Escalation
labs.snyk.ioยท1hยท
Discuss: Lobsters
โ„๏ธNixpkgs
TREVORspray โ€“ Credential Spray Toolkit for Azure, Okta, OWA & More
darknet.org.ukยท2d
๐ŸŒDNS Security
MCP: A Practical Security Blueprint for Developers
thenewstack.ioยท5h
๐Ÿ”“Hacking
Does DNS Security Matter?
systemsapproach.orgยท1d
๐ŸŒDNS Security
Students, here are 5 key things to know when learning how to train large language models
techradar.comยท8h
๐Ÿ’ปLocal LLMs
Adversary Infrastructure and Indicators Behind the SAP NetWeaver 0-Day Exploitation
research.kudelskisecurity.comยท1d
๐ŸŽซKerberos Exploitation
A2A Protocol ADK guide โ€“ hands-on demo for building agents
a2aprotocol.aiยท17hยท
Discuss: Hacker News
๐Ÿค–Network Automation
From VPN Vulnerability to SASE Victory: How A Growing Fintech Firm Transformed Its Security Posture and Scalability in Under a Week
blog.checkpoint.comยท13h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
unit42.paloaltonetworks.comยท1d
๐ŸŽซKerberos Exploitation
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท2hยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
Universal ZTNA from Cisco Earns Coveted SE Labs AAA Rating
blogs.cisco.comยท14h
๐Ÿ•ต๏ธPenetration Testing
Loading...Loading more...
AboutBlogChangelogRoadmap