๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” NTLM Forensics

Windows Authentication, Hash Analysis, Domain Investigation, Credential Recovery

Windows Authentication Monitoring
infosecwriteups.comยท1d
๐Ÿ”NTLM Archaeology
Project AK47: Uncovering a Link to the SharePoint Vulnerability Attacks
unit42.paloaltonetworks.comยท5h
๐ŸŒDNS Security
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.comยท14h
๐Ÿ’ฟDAT Forensics
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs
arxiv.orgยท1d
โšกProof Automation
Project Ire autonomously identifies malware at scale
microsoft.comยท12hยท
Discuss: Hacker News
๐Ÿฆ Malware Analysis
Digital Forensics Jobs Round-Up, August 04 2025
forensicfocus.comยท1d
๐ŸšจIncident Response
Elevate your protection with expanded Microsoft Defender Experts coverage
techcommunity.microsoft.comยท12h
๐Ÿ Homelab Security
DNS at IETF 123
potaroo.netยท5h
๐ŸŒDNS Security
SonicWall investigating possible zero-day related to firewall attacks
cybersecuritydive.comยท13h
๐Ÿ”“Hacking
4 ways to prevent SIM swapping attacks
fingerprint.comยท6h
๐ŸŽฏNTLM Attacks
Navigating Todayโ€™s Retail Cybersecurity Challenges: Protecting Operations and Customer Data
lmgsecurity.comยท2h
๐Ÿ›กCybersecurity
Authentication vs. authorization: Whatโ€™s the difference?
proton.meยท18h
๐Ÿ”Capability Systems
Case study: enhancing SBOMs with cdsbom at the Linux Foundation
opensource.orgยท14h
๐Ÿ”“Open Source Software
Welcoming Guardio to Have I Been Pwned's Partner Program
troyhunt.comยท8h
๐ŸบKerberos Archaeology
MS-A2 VCF 9.0 Lab: Configuring VCF Automation
williamlam.comยท6h
๐Ÿ–ฅHome Lab Setup
Why identity is the definitive cyber defense for federal agencies
cyberscoop.comยท6h
๐Ÿ”Capability Security
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.comยท1d
๐Ÿฆ Malware Analysis
Bouncing on trampolines to run eBPF programs
bootlin.comยท21h
๐Ÿ”eBPF
Patch now: Millions of Dell PCs with Broadcom chips vulnerable to attack
theregister.comยท9h
๐Ÿ”HSM Integration
We trained LLM to find reentrancy vulnerabilities in smart contracts
blog.unvariant.ioยท13hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Loading...Loading more...
AboutBlogChangelogRoadmap