Windows Authentication, Hash Analysis, Domain Investigation, Credential Recovery

Feeds to Scour
SubscribedAll
Scoured 15815 posts in 150.8 ms
Windows Networks: Google Mandiant Delivers the Coup de Grâce to Microsoft's NTLM
heise.de·2d·
Discuss: Hacker News
🎯NTLM Attacks
Preview
Report Post
Digital Forensics Round-Up, January 21 2026
forensicfocus.com·11h
🔍Audio Forensics
Preview
Report Post
Dissecting Digital Viruses: My First Steps in Malware Analysis
dev.to·1d·
Discuss: DEV
🦠Malware Analysis
Preview
Report Post
As Strong As Your Weakest Parameter: An AI Authorization Bypass
praetorian.com·11h
🎯Threat Hunting
Preview
Report Post
ArchAgent: Scalable Legacy Software Architecture Recovery with LLMs
arxiv.org·23h
🔗Archive Combinators
Preview
Report Post
Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes
rapid7.com·14h
🔐HSM Integration
Preview
Report Post
[Podcast] NITK Students at IETF: Fresh minds for standards development
blog.apnic.net·7h
📝ABNF Parsing
Preview
Report Post
InfoSec News Nuggets
aboutdfir.com·1d
🔓Hacking
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.com·16h
📊Static Analysis
Preview
Report Post
There's a secret computer inside your computer
xda-developers.com·7h
🔒Secure Boot
Preview
Report Post
LABScon25 Replay | How to Bug Hotel Rooms v2.0
sentinelone.com·14h
🏠Homelab Pentesting
Preview
Report Post
Can We Build an NX Bit for LLMs
bogdandeac.com·1d·
Discuss: Hacker News
🖥️Modern Terminals
Preview
Report Post
What is API Security?
securityscorecard.com·10h
📦Container Security
Preview
Report Post
Redacting Faces, People, Vehicles, and Plates with Amped Replay Assisted Redaction
blog.ampedsoftware.com·13h
🧪Archive Fuzzing
Preview
Report Post
PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion
securityaffairs.com·1d
🦠Malware Analysis
Preview
Report Post
Rubrik, Inc. (RBRK) Presents at Data Recovery Summit Transcript
seekingalpha.com·4h
🗄️Database Recovery
Preview
Report Post
Hackers exploit security testing apps to breach Fortune 500 firms
bleepingcomputer.com·14h
🕵️Penetration Testing
Preview
Report Post
Introducing VulHunt: A High-Level Look at Binary Vulnerability Detection
binarly.io·1d
🔬Binary Analysis
Preview
Report Post
jgmdev/ddos-deflate: Fork of DDoS Deflate with fixes, improvements and new features.
github.com·2h
🛡️eBPF Security
Preview
Report Post
How AI brings the OSCAR methodology to life in the SOC
intezer.com·13h
🌊Stream Processing
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help