๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” NTLM Archaeology

Windows Authentication History, Domain Forensics, Hash Analysis, Legacy Protocols

Week 28 โ€“ 2025
thisweekin4n6.comยท1h
๐ŸบKerberos Archaeology
Micropatches Released for "WSPCoerce" Coerced Authentication via Windows Search Protocol (NO CVE/WONTFIX)
blog.0patch.comยท2dยท
Discuss: blog.0patch.com
๐ŸŽฏNTLM Attacks
Down the DNS Funnel and into the Funnull Infrastructure
circleid.comยท21h
๐Ÿ“กDNS Archaeology
Hiding in plain sight (part 3) - Mount namespaces
haxrob.netยท6h
๐Ÿ’ฃZIP Vulnerabilities
.NET: From Zero to Hero
dotnetz2h.comยท1hยท
Discuss: Hacker News
๐ŸšNordic Shell
Windows Threat Detection on TryHackMe: Complete Walkthrough & Cybersecurity Insights
infosecwriteups.comยท6h
๐ŸŽซKerberos Exploitation
vanhauser-thc/thc-hydra
github.comยท10h
๐Ÿ›ก๏ธeBPF Security
Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques
unit42.paloaltonetworks.comยท2d
๐Ÿ›ก๏ธRISC-V Security
How to conduct a Password Audit in Active Directory (AD)
pentestpartners.comยท5d
๐ŸŽฏNTLM Attacks
A closer look at the Model Context Protocol
jan.scheffczyk.pageยท19hยท
Discuss: r/programming
โšกgRPC
TLS fingerprinting: What it is and how it works
fingerprint.comยท2d
๐ŸŒNetworkProtocols
History of the browser user-agent, and why โ€œMozillaโ€
brajeshwar.comยท12h
๐Ÿ“กDNS Archaeology
sca-fuzzer: Revizor - a fuzzer to search for microarchitectural leaks in CPUs
github.comยท13hยท
Discuss: Lobsters, Hacker News
๐ŸŽฎSwitch Archaeology
Swapping space with a friend, for proxmox backups. Using IPSec tunnels. Time for a router upgrade.
i.redd.itยท9hยท
Discuss: r/homelab
๐Ÿ–ฅHome Lab Setup
ESP32 Bus Pirate
hackster.ioยท22h
๐Ÿ“ปHomebrew Protocols
BlackSuit: A Hybrid Approach with Data Exfiltration and Encryption
cybereason.comยท1d
๐ŸŽซKerberos Exploitation
macOS Malware Analysis and Assessment
cstromblad.comยท1d
๐ŸŽฏThreat Hunting
ATC/OSDIโ€™25 Technical Sessions
muratbuffalo.blogspot.comยท2dยท
Discuss: www.blogger.com
๐Ÿ”ŒInterface Evolution
Rex: Closing the language-verifier gap with safe and usable kernel extensions
usenix.orgยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Researcher tricks ChatGPT into revealing security keys - by saying "I give up"
techradar.comยท1d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap