🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” NTLM Forensics

Windows Authentication, Hash Analysis, Domain Investigation, Credential Recovery

ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comΒ·21h
πŸ’£ZIP Vulnerabilities
Win-DDoS Under the Microscope: Lab Insights into Potential Threat Behavior
corero.comΒ·20h
πŸ•΅οΈDomain Enumeration
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed
guptadeepak.comΒ·4hΒ·
Discuss: DEV, Hacker News
πŸ”Capability Systems
BW21-CBV-Kitβ€”β€”Home Video Monitoring and Playback System
hackster.ioΒ·4h
🎬Video Codecs
Researchers Discover a Cyber-Physical Bank Heist Powered by A 4G Raspberry Pi Implant
bastille.netΒ·19h
πŸ“‘Network Monitoring
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comΒ·18h
πŸ‘οΈSystem Observability
Intelligence Brief: UNC6040 Threat Assessment
cstromblad.comΒ·4h
🎫Kerberos History
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comΒ·1d
🎯Threat Hunting
PRISM: Robust VLM Alignment with Principled Reasoning for Integrated Safety in Multimodality
arxiv.orgΒ·6h
πŸ’»Local LLMs
Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy
sciencedirect.comΒ·20h
πŸ‘οΈPerceptual Hashing
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comΒ·3dΒ·
Discuss: www.blogger.com
🎯Threat Hunting
runZero Hour, ep. 21 recap: highlights from hacker summer camp
runzero.comΒ·20h
πŸ”eBPF
(繁中) The Art of PHP β€” My CTF Journey and Untold Stories!
blog.orange.twΒ·8h
πŸ‡¨πŸ‡³Chinese Computing
Techno Security & Digital Forensics Conference Returns To San Diego With Deep Dive Into AI, Cybercrime, And Justice
forensicfocus.comΒ·1d
🚨Incident Response
Exploits and vulnerabilities in Q2 2025
securelist.comΒ·40m
πŸ”“Hacking
I made a simple LAN scanner in Rust
github.comΒ·1hΒ·
Discuss: Hacker News
πŸ“»Homebrew Protocols
China linked Silk Typhoon targeted diplomats by hijacking web traffic
securityaffairs.comΒ·3h
πŸ”“Hacking
DropSum 1.2 is more flexible in handling text
eclecticlight.coΒ·4h
πŸ” Terminal Fonts
Job Posting: Systems and Security Administrator
citizenlab.caΒ·19h
🏠Homelab Security
Binary Exploitation 101 - Introduction
r1ru.github.ioΒ·19h
πŸ“ΌCassette Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap