๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฏ NTLM Attacks

Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

NTLM Explained in Under 5 Minutes (And Why You Should Care)
infosecwriteups.comยท2d
๐Ÿ”NTLM Forensics
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lolยท1dยท
Discuss: Hacker News
๐Ÿ”’Language-based security
Top Strategies for Preventing Domain Hijacking
securityscorecard.comยท18h
๐ŸŒBGP Security
Networking for Systems Administrators
mwl.ioยท1hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Domain Password Audit Tool (DPAT)
dev.toยท2dยท
Discuss: DEV
๐Ÿ”“Password Cracking
Microsoft Entra ID OAuth Phishing and Detections
elastic.coยท14h
๐ŸŽซKerberos Exploitation
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.orgยท1d
๐Ÿ’ฃZIP Vulnerabilities
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.comยท1h
๐ŸŽซKerberos Attacks
Beware of fake SonicWall VPN app that steals users' credentials
theregister.comยท21h
๐ŸŽซKerberos Exploitation
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comยท5h
๐ŸŽซKerberos Attacks
Encrypting identifiers in practice
sjoerdlangkemper.nlยท9h
๐ŸŒŠStream Ciphers
Cybercriminals Abuse Open-Source Tools To Target Africaโ€™s Financial Sector
unit42.paloaltonetworks.comยท16h
๐ŸŽซKerberos Exploitation
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.devยท21hยท
Discuss: Hacker News
๐Ÿ”“Hacking
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgยท1d
๐Ÿฆ Malware Analysis
Program Execution, follow-up
windowsir.blogspot.comยท2hยท
Discuss: www.blogger.com
โšกPerformance Tools
Microsoft Teams Security Attack Matrix
cyberdom.blogยท23hยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
SSL and TLS Deployment Best Practices
github.comยท15hยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
Building Passwordless Authentication with Stytch
encore.devยท14h
๐ŸŒNetworkProtocols
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.comยท1d
๐ŸŽซKerberos Exploitation
Trusting the tech: using password managers and passkeys to help you stay secure online
ncsc.gov.ukยท1d
๐Ÿ”“Password Cracking
Loading...Loading more...
AboutBlogChangelogRoadmap