🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ LDAP Security

Directory Injection, Authentication Bypass, Enterprise Pentesting, AD Enumeration

Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise Security
blackhillsinfosec.comΒ·7h
πŸ”“LDAP Injection
Win-DDoS Under the Microscope: Lab Insights into Potential Threat Behavior
corero.comΒ·1d
πŸ•΅οΈDomain Enumeration
OAuth Device Flow Vulnerabilities: Analysis of 2024-2025 Attack Wave
guptadeepak.comΒ·3hΒ·
Discuss: DEV, Hacker News
🎫Kerberos Attacks
The Humble Office Printer Could Take Down Your Network (Here's How to Prevent It)
hackernoon.comΒ·15h
πŸ’£ZIP Vulnerabilities
Phishing Kits Uncovered: Methods and Tactics Used to Evade SEGs, Sandboxes, and Analysts
cofense.comΒ·16h
🎫Kerberos Exploitation
The Power of Digital Twins in Cybersecurity
cacm.acm.orgΒ·5h
πŸ”Capability Systems
Exploits and vulnerabilities in Q2 2025
securelist.comΒ·11h
πŸ”“Hacking
AI Agents Can Talk, But Can We Trust Them?
thenewstack.ioΒ·51m
🌳Archive Merkle Trees
Storm-0501’s evolving techniques lead to cloud-based ransomware
microsoft.comΒ·5h
🎫Kerberos Exploitation
'ZipLine' Phishers Flip Script as Victims Email First
darkreading.comΒ·1h
πŸ”“Hacking
Proving You Are You, Again and Again
dev.toΒ·5hΒ·
Discuss: DEV
πŸ”PKI Archaeology
CVE-2025-7775: Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild
tenable.comΒ·1d
🏠Homelab Pentesting
Bun JS toolkit adds MySQL driver, secrets API, YAML, and more
theregister.comΒ·3h
πŸ”„Sync Engine
AzureStrike – Offensive Toolkit for Attacking Azure Active Directory Environments
darknet.org.ukΒ·2d
🎫Kerberos Exploitation
The hidden threat in enterprise security: why it’s time to rethink PDFs
techradar.comΒ·13h
πŸ“„PDF Archaeology
Best Practices for Securing Generative AI with SASE
blog.cloudflare.comΒ·1d
πŸ”Capability Systems
(繁中) The Art of PHP β€” My CTF Journey and Untold Stories!
blog.orange.twΒ·19h
πŸ‡¨πŸ‡³Chinese Computing
ESET warns of PromptLock, the first AI-driven ransomware
securityaffairs.comΒ·13h
πŸ›‘Cybersecurity
The risks of AI-powered tools: Lessons from the Comet prompt injection incident
fingerprint.comΒ·4h
🎫Kerberos Attacks
Binary Exploitation 101 - Introduction
r1ru.github.ioΒ·1d
πŸ“ΌCassette Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap