๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” NTLM Archaeology

Windows Authentication History, Domain Forensics, Hash Analysis, Legacy Protocols

Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comยท12hยท
Discuss: www.blogger.com
๐ŸŽฏThreat Hunting
Next-gen voice, video, and chat messaging using your domain name not your number
thunderbolt.comยท25mยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Saleae Analyzer for the BDM protocol
zetier.comยท3d
๐Ÿ”ฌBinary Analysis
Linux profiling with perf and performance counters โ€“ useful links
perfwiki.github.ioยท3hยท
Discuss: Hacker News
โšกPerformance Tools
Memento: A Survival Guide for Building Real Software with a Forgetful Genius
dev.toยท2dยท
Discuss: DEV
๐Ÿง Memory Forensics
Get Back To WARP
binary.ninjaยท1d
๐ŸงชBinary Fuzzing
My A-Z toolbox: dcfldd
rubenerd.comยท1d
๐Ÿ“‹DFDL
Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
unit42.paloaltonetworks.comยท2d
๐ŸŒDNS Security
Digital Forensics Round-Up, August 20 2025
forensicfocus.comยท3d
๐Ÿ“ŸTerminal Forensics
Tearing Apart the Undetected (OSX)Coldroot RAT
objective-see.comยท2d
๐Ÿ“ŸTerminal Forensics
APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
cloudsek.comยท22hยท
Discuss: r/linux
๐Ÿ’ฃZIP Vulnerabilities
Beyond the Hype: Critical Takeaways From BlackHat and Defcon
thenewstack.ioยท1d
๐ŸŽฏThreat Hunting
Peeking Under the Hood of Cursor's API Calls
proxymock.ioยท1dยท
Discuss: Hacker News
๐Ÿ”ŒArchive APIs
ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination
darkreading.comยท1d
๐Ÿ”“Hacking
ChromaLex
hackster.ioยท10h
๐Ÿ“ฑQR Archaeology
From Transcripts to Descriptions: Using Consumer AI Tools for Audio Collection Metadata
saaers.wordpress.comยท3d
๐Ÿ”„Archival Workflows
The Art of the Honeypot Account: Making the Unusual Look Normal
adsecurity.orgยท5d
๐ŸขActive Directory
Hacker and Physicist โ€“ A Tale of "Common Sense"
supasaf.comยท1dยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
hackaday.comยท1d
๐Ÿ”“Hacking
Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure
lab.wallarm.comยท2d
๐Ÿ›ก๏ธCLI Security
Loading...Loading more...
AboutBlogChangelogRoadmap