๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ LDAP Security

Directory Injection, Authentication Bypass, Enterprise Pentesting, AD Enumeration

MOST USEFUL TOOLS IN AD PENTESTING
infosecwriteups.comยท13h
๐ŸขActive Directory
Kerberos vs. LDAP: Choosing the Right Enterprise Protocol
securityscorecard.comยท5d
๐ŸŽซKerberos History
Getting Started with NetExec: Streamlining Network Discovery and Access
blackhillsinfosec.comยท3d
๐Ÿ•ต๏ธDomain Enumeration
Show HN: I automated code security to help vibe coders from getting busted
elara-app.aiยท10hยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
My Journey into System Design: A Back-End Developer's Exploration
dev.toยท15hยท
Discuss: DEV
๐Ÿ’พPersistence Strategies
Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques
unit42.paloaltonetworks.comยท1d
๐Ÿ›ก๏ธRISC-V Security
Swapping space with a friend, for proxmox backups. Using IPSec tunnels. Time for a router upgrade.
i.redd.itยท22mยท
Discuss: r/homelab
๐Ÿ–ฅHome Lab Setup
BlackSuit: A Hybrid Approach with Data Exfiltration and Encryption
cybereason.comยท1d
๐ŸŽซKerberos Exploitation
This Week in Security: Bitchat, CitrixBleed Part 2, Opossum, and TSAs
hackaday.comยท1d
๐Ÿ”“Hacking
Stealthy PHP Malware Uses ZIP Archive to Redirect WordPress Visitors
blog.sucuri.netยท1d
๐Ÿฆ Malware Analysis
vanhauser-thc/thc-hydra
github.comยท1h
๐Ÿ›ก๏ธeBPF Security
PEN America shares 5 tips for bolstering your safety and privacy online
diff.wikimedia.orgยท13h
๐Ÿ Personal Archives
Dynamic Denial of Crawlers
overengineer.devยท2d
๐ŸŒWARC Forensics
Show HN: I made a private, portable, virtual LLM OS with JavaScript and Gemini
oopisos.neocities.orgยท2hยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
How to conduct a Password Audit in Active Directory (AD)
pentestpartners.comยท4d
๐ŸŽฏNTLM Attacks
A probability puzzle involving random fractions
mathematicaloddsandends.wordpress.comยท11h
๐ŸŽฏArithmetic Coding
U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท1d
๐ŸŒDNS Security
Down the DNS Funnel and into the Funnull Infrastructure
circleid.comยท11h
๐Ÿ“กDNS Archaeology
Unauthorized Data Exposure via Range Queries in ServiceNow ACLs โ€“ CVE-2025-3648
research.kudelskisecurity.comยท2d
๐Ÿ”“LDAP Injection
A Refreshing SQL Injection Discovery in Z-Push
xbow.comยท2dยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap