🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ LDAP Security

Directory Injection, Authentication Bypass, Enterprise Pentesting, AD Enumeration

Password-Derived Signature Authentication
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ”“Password Cracking
Top Strategies for Preventing Domain Hijacking
securityscorecard.comΒ·21h
🌐BGP Security
Multi user authentication with multi user access and multi role access
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”Capability Security
6 Key Security Risks in LLMs: A Platform Engineer’s Guide
thenewstack.ioΒ·23h
πŸ’»Local LLMs
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.orgΒ·1d
πŸ’£ZIP Vulnerabilities
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.comΒ·4h
πŸ•΅οΈPenetration Testing
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.comΒ·20h
🎫Kerberos Exploitation
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·13h
🌊Stream Ciphers
Does "XBOW AI Hacker" Deserve the Hype?
utkusen.substack.comΒ·2hΒ·
Discuss: Substack
πŸ”“Hacking
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·10h
πŸ”NTLM Forensics
The Dark Side of Azure Identity & Access Management – 5 IAM & Entra ID Security Risks You Can’t Ignore
blog.compass-security.comΒ·1d
πŸ”“LDAP Injection
Automatic Selection of Protections to Mitigate Risks Against Software Applications
arxiv.orgΒ·1d
πŸ”’WASM Capabilities
Microsoft Entra ID OAuth Phishing and Detections
elastic.coΒ·18h
🎯NTLM Attacks
CVE-2025-32975 - Quest KACE SMA Authentication Bypass
seclists.orgΒ·1d
🎫Kerberos Attacks
Hundreds of MCP Servers Expose AI Models to Abuse, RCE
darkreading.comΒ·3h
πŸ”“Hacking
Microsoft Teams Security Attack Matrix
cyberdom.blogΒ·1dΒ·
Discuss: Hacker News
🎫Kerberos Attacks
How to (Almost) solve cybersecurity once and for all
adaptive.liveΒ·21hΒ·
Discuss: Hacker News
πŸ”Systems Hardening
[$] Libxml2's "no security embargoes" policy
lwn.netΒ·2h
πŸ”“Free and open source
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comΒ·8h
🎯Threat Hunting
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·6h
🦠Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap