๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” NTLM Archaeology

Windows Authentication History, Domain Forensics, Hash Analysis, Legacy Protocols

Pharmacopsychiatry: Gut microbiome effect on psychotropic drugs&bipolar disorder
microbiologyresearch.orgยท5hยท
Discuss: Hacker News
๐Ÿ“ผDAT Preservation
Spring Boot Performance: Avoid Default Config Pitfalls
theperfparlor.comยท10hยท
Discuss: DEV, Hacker News
๐ŸŒŠStreaming Systems
How to create lightweight Windows 11 for unsupported PCs
neowin.netยท1dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Remote backup pod at a friend/family member's house
i.redd.itยท1dยท
Discuss: r/homelab
๐Ÿ’ฟBackup Strategies
Perl Versioning Scheme and Gentoo
wiki.gentoo.orgยท9hยท
Discuss: Hacker News
๐ŸงฌBitstream Evolution
A distributed systems reliability glossary
antithesis.comยท4dยท
Discuss: Lobsters, Hacker News, r/programming
โœ…Archive Fixity
API Auth Is Deeper Than It Looks
nango.devยท3dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Ruby 3.4.5 Released
ruby-lang.orgยท19hยท
Discuss: Hacker News
๐ŸงฌBitstream Evolution
Code Execution Through Email: How I Used Claude to Hack Itself
pynt.ioยท3dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Episode 2: OS Command Injection โ€” Talking Directly to the Serverโ€™s Brain
infosecwriteups.comยท2h
๐Ÿ”“Hacking
Day 4 of Learning System Design: Mastering Consistent Hashing
dev.toยท2dยท
Discuss: DEV
๐ŸŒDistributed Hash
How Shinobi Security gets access to apps with internal DNS names or redirect flows to run AI agents
dev.toยท1dยท
Discuss: DEV
๐Ÿ”“Hacking
How Our Team Bypassed YouTube Authorization and Uploaded Videos to ANY Channel โ€” $6,337 Bounty
infosecwriteups.comยท18h
๐Ÿš€Indie Hacking
No, phishers are not bypassing FIDO MFA, at least not yet. Hereโ€™s why.
arstechnica.comยท1dยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
Before Macintosh: The Story of the Apple Lisa
hackaday.comยท1d
๐Ÿ–ฅ๏ธVintage Macintosh
Generating Production-Ready MCP Servers
withcoherence.comยท2dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Malware found embedded in DNS, the system that makes the internet usable, except when it doesn't
tomshardware.comยท3dยท
Discuss: Hacker News
๐ŸŒDNS Security
Refining Coarse-Grained Molecular Topologies: A Bayesian Optimization Approach
arxiv.orgยท2d
๐ŸŒComputational Topology
Tracking Activity on your App Turn data into smart decisions and valuable insights
blog.codeminer42.comยท2d
๐Ÿ“ŠFeed Optimization
Transparency on Microsoft Defender for Office 365 email security effectiveness
microsoft.comยท2d
๐Ÿ•ต๏ธDomain Enumeration
Loading...Loading more...
AboutBlogChangelogRoadmap