๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” NTLM Archaeology

Windows Authentication History, Domain Forensics, Hash Analysis, Legacy Protocols

Saleae Analyzer for the BDM protocol
zetier.comยท2d
๐Ÿ”ฌBinary Analysis
My Zip Isn't Your Zip: Identifying and Exploiting Semantic Gaps Between Parsers
usenix.orgยท2dยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Memento: A Survival Guide for Building Real Software with a Forgetful Genius
dev.toยท1dยท
Discuss: DEV
๐Ÿง Memory Forensics
Get Back To WARP
binary.ninjaยท15h
๐ŸงชBinary Fuzzing
The Art of the Honeypot Account: Making the Unusual Look Normal
adsecurity.orgยท4d
๐ŸขActive Directory
My A-Z toolbox: dcfldd
rubenerd.comยท9h
๐Ÿ“‹DFDL
Digital Forensics Round-Up, August 20 2025
forensicfocus.comยท2d
๐Ÿ“ŸTerminal Forensics
Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure
lab.wallarm.comยท1d
๐Ÿ›ก๏ธCLI Security
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
hackaday.comยท19h
๐Ÿ”“Hacking
Learn every individual feature your CPU supports with SpecSeek
github.comยท14hยท
Discuss: Hacker News
โšกPerformance Tools
Peeking Under the Hood of Cursor's API Calls
proxymock.ioยท16hยท
Discuss: Hacker News
๐Ÿ”ŒArchive APIs
A brief history of SIP
eclecticlight.coยท2h
๐ŸŽApple Archive
Former developer jailed after deploying kill-switch malware at Ohio firm
securityaffairs.comยท1d
๐Ÿ”“Hacking
Beyond the Hype: Critical Takeaways From BlackHat and Defcon
thenewstack.ioยท17h
๐ŸŽฏThreat Hunting
From Transcripts to Descriptions: Using Consumer AI Tools for Audio Collection Metadata
saaers.wordpress.comยท2d
๐Ÿ”„Archival Workflows
Hacker and Physicist โ€“ A Tale of "Common Sense"
supasaf.comยท17hยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination
darkreading.comยท12h
๐Ÿ”“Hacking
IDA Debugger: New Register Subview and More Accurate Call Stacks
hex-rays.comยท1d
๐Ÿ“บVT100 Emulation
Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
unit42.paloaltonetworks.comยท1d
๐ŸŒDNS Security
InfoSec News Nuggets 8/21/2025
aboutdfir.comยท1d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap