๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” NTLM Archaeology

Windows Authentication History, Domain Forensics, Hash Analysis, Legacy Protocols

Spring Boot Performance: Avoid Default Config Pitfalls
theperfparlor.comยท6hยท
Discuss: DEV, Hacker News
๐ŸŒŠStreaming Systems
Upcoming changes to the Bitnami catalog. Broadcom introduces Bitnami Secure Images for production-ready containerized applications
news.broadcom.comยท2d
โ„๏ธNix Adoption
In praise of Mission Creep (2022)
aam-us.orgยท5hยท
Discuss: Hacker News
โš–๏ธEmulation Ethics
How to create lightweight Windows 11 for unsupported PCs
neowin.netยท1dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Remote backup pod at a friend/family member's house
i.redd.itยท1dยท
Discuss: r/homelab
๐Ÿ’ฟBackup Strategies
Ruby 3.4.5 Released
ruby-lang.orgยท14hยท
Discuss: Hacker News
๐ŸงฌBitstream Evolution
The Big OOPs: Anatomy of a Thirty-Five Year Mistake
computerenhance.comยท2dยท
Discuss: Hacker News, Hacker News
๐Ÿ—๏ธCompiler Archaeology
Matt Layman: Enhancing Chatbot State Management with LangGraph
mattlayman.comยท2d
โšกProof Automation
My favorite use-case for AI is writing logs
newsletter.vickiboykis.comยท2dยท
Discuss: Lobsters, Hacker News
๐ŸŒณIncremental Parsing
No, phishers are not bypassing FIDO MFA, at least not yet. Hereโ€™s why.
arstechnica.comยท1dยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
How Shinobi Security gets access to apps with internal DNS names or redirect flows to run AI agents
dev.toยท1dยท
Discuss: DEV
๐Ÿ”“Hacking
Before Macintosh: The Story of the Apple Lisa
hackaday.comยท1d
๐Ÿ–ฅ๏ธVintage Macintosh
The State of Post-Quantum Cryptography in Kubernetes
kubernetes.devยท1dยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Generating Production-Ready MCP Servers
withcoherence.comยท2dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Refining Coarse-Grained Molecular Topologies: A Bayesian Optimization Approach
arxiv.orgยท1d
๐ŸŒComputational Topology
๐ŸŽฒ RandomiX: Is It Truly Random?
dev.toยท10hยท
Discuss: DEV
๐Ÿ“Mathematical Art
Tracking Activity on your App Turn data into smart decisions and valuable insights
blog.codeminer42.comยท2d
๐Ÿ“ŠFeed Optimization
Malware found embedded in DNS, the system that makes the internet usable, except when it doesn't
tomshardware.comยท3dยท
Discuss: Hacker News
๐ŸŒDNS Security
Transparency on Microsoft Defender for Office 365 email security effectiveness
microsoft.comยท2d
๐Ÿ•ต๏ธDomain Enumeration
Hacker using backdoor to exploit SonicWall Secure Mobile Access to steal credentials
techradar.comยท2d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap