๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฏ NTLM Attacks

Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

Windows Hello for Business โ€“ The Face Swap
insinuator.netยท1d
๐ŸบKerberos Archaeology
Building Production-Grade Network Telemetry: A gRPC Journey Into the Heart of Network Monitoring
dev.toยท15hยท
Discuss: DEV
๐Ÿ“กNetwork Monitoring
GhostContainer backdoor: malware compromising Exchange servers of high-value organizations in Asia
securelist.comยท3h
๐ŸŒDNS Security
Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security
lmgsecurity.comยท13h
๐Ÿ”Cryptographic Archaeology
Code Execution Through Email: How I Used Claude to Hack Itself
pynt.ioยท5hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Blog - Hey Signal! Great Encryption Needs Great Authentication
sequoia-pgp.orgยท23h
๐Ÿ”‘Cryptographic Protocols
Hackers Are Finding New Ways to Hide Malware in DNS Records
wired.comยท27m
๐ŸŒDNS Security
Vulnerability Scanning with Nmap
blackhillsinfosec.comยท21h
๐Ÿ”NTLM Forensics
Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature
news.risky.bizยท1d
๐Ÿ”“Hacking
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.comยท21h
๐Ÿ”“Password Cracking
Next Gen TTPs in the Threat Actor's Playbook
cofense.comยท1d
๐Ÿ”“Hacking
Decrypting DPAPI Credentials Offline
infosecwriteups.comยท6h
๐Ÿ•ธ๏ธWebAssembly
Legal Ransomware
aardvark.co.nzยท19h
๐Ÿดโ€โ˜ ๏ธPiracy
TREVORspray โ€“ Credential Spray Toolkit for Azure, Okta, OWA & More
darknet.org.ukยท3d
๐ŸŒDNS Security
How Smart MSPs Sell with Compliance, Not Just Tools โ€“ With Dustin Bolander
heimdalsecurity.comยท1d
๐ŸŽฏThreat Hunting
How to protect your router from being hacked and becoming a residential proxy | Kaspersky official blog
kaspersky.comยท22h
๐Ÿ”“Hacking
Another critical vulnerability in Cisco's ISE
heise.deยท3h
๐Ÿ”“Hacking
Fully Patched SonicWall Gear Under Likely Zero-Day Attack
darkreading.comยท18h
๐Ÿ”“Hacking
Opening a Six-Lock Safe With One Key Using Brunnian Links
hackaday.comยท12h
๐Ÿ”“Password Cracking
SSH-Passkeys: Leveraging Web Authentication for Passwordless SSH
arxiv.orgยท2d
๐Ÿ”PKI Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap