🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 NTLM Archaeology

Windows Authentication History, Domain Forensics, Hash Analysis, Legacy Protocols

Microsoft’s Horribly Misguided Greenwashing
joelx.com·13h
💿WORM Storage
Devlog: Blogging Tools — Category Fixer
lmika.org·3h
📰RSS Feed Discovery
FAQ: What's a KevlinHenney?
kevlinhenney.medium.com·23h·
Discuss: Lobsters, Hacker News
🚀Indie Hacking
Cresting the 0Caml Al Humps
anil.recoil.org·2d·
Discuss: Hacker News
🦀Rust Macros
Agent DB
agentdb.dev·2d·
Discuss: Hacker News
🗄️Database Internals
Trigon: exploiting coprocessors for fun and for profit (part 2)
alfiecg.uk·4d·
Discuss: Lobsters, Hacker News
🎮Switch Archaeology
Microsoft Names Threat Actors
learn.microsoft.com·2d·
Discuss: Hacker News
🎫Kerberos Exploitation
The power of the Unix philosophy for LLM agentic tools
blog.korny.info·3d·
Discuss: Hacker News
🐚Shell Calculus
A £3.93/mo Nomad‑backed learning lab: Next.js · .NET · Postgres on a budget
craig.banach.dev·2d·
Discuss: Hacker News, r/selfhosted
🖥️Self-hosted Infrastructure
🚀 Introducing 𝗗𝗲𝘃𝗗𝗶𝗮𝗿𝘆: The Easiest Project Tracker, for Developers
dev.to·1d·
Discuss: DEV
🚀Indie Hacking
Oppo A96 Was Accidentally Formatted
dolphindatalab.com·8h
🕵️Format Recovery
🛡️ Paladin-mini: Open-Source Grounding Model That Actually Works in Production
dev.to·3d·
Discuss: DEV
⚡Proof Automation
Episode 2: OS Command Injection — Talking Directly to the Server’s Brain
infosecwriteups.com·12h
🔓Hacking
How Our Team Bypassed YouTube Authorization and Uploaded Videos to ANY Channel — $6,337 Bounty
infosecwriteups.com·1d
🚀Indie Hacking
Newcomer looking for guidance on securing my homelab
reddit.com·2d·
Discuss: r/homelab
🏠HomeLab
Need help with Software solution and checking if I made a mistake or oversight in my build
reddit.com·1d·
Discuss: r/homelab
🔌Operating system internals
Why I'm Betting Against AI Agents in 2025 (Despite Building Them)
utkarshkanwat.com·20h·
Discuss: Hacker News, r/programming
💾Persistence Strategies
Before Macintosh: The Story of the Apple Lisa
hackaday.com·1d
🖥️Vintage Macintosh
Learn To Love the Command-Line Interface With Agentic LLMs
thenewstack.io·1d
🔩Systems Programming
Malware found embedded in DNS, the system that makes the internet usable, except when it doesn't
tomshardware.com·3d·
Discuss: Hacker News
🌐DNS Security
Loading...Loading more...
AboutBlogChangelogRoadmap