🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” NTLM Forensics

Windows Authentication, Hash Analysis, Domain Investigation, Credential Recovery

Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·6h
πŸ“ΊVT100
Networking for Systems Administrators
mwl.ioΒ·1hΒ·
Discuss: Hacker News
🌐DNS over QUIC
Digital Forensics Round-Up, June 25 2025
forensicfocus.comΒ·19m
πŸ”¬Archive Forensics
Program Execution, follow-up
windowsir.blogspot.comΒ·2hΒ·
Discuss: www.blogger.com
⚑Performance Tools
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.comΒ·1d
πŸ”“Password Cracking
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·2h
🦠Malware Analysis
NTLM Explained in Under 5 Minutes (And Why You Should Care)
infosecwriteups.comΒ·2d
🎯NTLM Attacks
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgΒ·1d
🦠Malware Analysis
Trusting the tech: using password managers and passkeys to help you stay secure online
ncsc.gov.ukΒ·1d
πŸ”“Password Cracking
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.toΒ·10hΒ·
Discuss: DEV
🎡Spectral Hashing
Building a unified homelab documentation & infrastructure management platform - looking for feedback from the community
reddit.comΒ·17hΒ·
Discuss: r/homelab
🏠Homelab Preservation
What Is Nmap and How Can It Help Identify Network Vulnerabilities?
securityscorecard.comΒ·18h
πŸ“‘Network Monitoring
Microsoft Entra ID OAuth Phishing and Detections
elastic.coΒ·14h
🎯NTLM Attacks
Semantic-Aware Parsing for Security Logs
arxiv.orgΒ·1d
πŸ“Log Parsing
How to Speed Up TPRM Approvals with Spectra Assure
reversinglabs.comΒ·2h
πŸ”’Hardware Attestation
Show HN: Laburity – Dark and Deep Web Monitoring
laburity.comΒ·1dΒ·
Discuss: Hacker News
πŸ”“Hacking
5 huge stumbling blocks to legacy mainframe EOL
techradar.comΒ·7h
πŸ›οΈMainframe Archaeology
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.comΒ·1d
🎫Kerberos Exploitation
NTUSER.DAT Forensics Analysis 2025
cybertriage.comΒ·6d
πŸ’ΎDisk Utilities
Deploy Now, Explain Never? Why AI Needs Forensic Parity
muckypaws.comΒ·1d
πŸ’ΎPersistence Strategies
Loading...Loading more...
AboutBlogChangelogRoadmap