Feeds to Scour
SubscribedAll
Scoured 9578 posts in 4.34 s
Bypass Windows user interface privilege isolation via the CTF input method proto
projectzero.googleยท1dยท
Discuss: Hacker News
๐Ÿ”NTLM Archaeology
Preview
Report Post
Fuzzing.in
fuzzing.inยท12m
๐Ÿ›Fuzzing
Preview
Report Post
LangChain core vulnerability allows prompt injection and data exposure
securityaffairs.comยท4h
๐ŸŒDNS Security
Preview
Report Post
BankGPT TryHackMe Writeup Walkthrough
infosecwriteups.com
ยท17h
๐ŸบKerberos Archaeology
Preview
Report Post
**Build Secure JWT Authentication and Session Management System in Go with Redis**
dev.toยท2dยท
Discuss: DEV
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Need help with understanding how to setup secure remote access and consolidating DNS
reddit.comยท14hยท
Discuss: r/selfhosted
๐ŸŒDNS Security
Preview
Report Post
The 3 a.m. Call That Changed The Way I Design APIs
thenewstack.ioยท4h
๐Ÿ‘๏ธObservatory Systems
Preview
Report Post
Fake MAS Windows Activation Domain Used To Spread PowerShell Malware
it.slashdot.orgยท2d
๐Ÿฆ Malware Analysis
Preview
Report Post
Evasive Panda APT poisons DNS requests to deliver MgBot
securelist.comยท3d
๐ŸŒDNS Security
Preview
Report Post
Cleartext Signatures Considered Harmful
gnupg.orgยท4hยท
Discuss: Hacker News
โœ…Checksum Validation
Preview
Report Post
Tackling Unmaintainable Complexity with Automation: Building a Multi-Tenant SaaS Solo
ko-chan.github.ioยท6hยท
Discuss: DEV
๐Ÿ”Capability Systems
Preview
Report Post
Digital Forensics: Registry Analysis for Beginners, Part 1 โ€“ Hives, Logs, and Acquisition โ€“ Hackers Arise
hackers-arise.comยท1d
๐Ÿ”NTLM Forensics
Preview
Report Post
Summary of the USA federal government's zero-trust memo
bastionzero.comยท9hยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
Preview
Report Post
From Email to Exfiltration: How Threat Actors Steal ADP Login and Personal Data
cofense.comยท4d
๐Ÿ”“Hacking
Preview
Report Post
Full Disclosure: Backdoor.Win32.ControlTotal.t / Insecure Credential Storage / MVID-2025-0702
seclists.orgยท4d
๐ŸŽซKerberos Exploitation
Preview
Report Post
The Frontend Auth Middleware: Cross-Origin Iframes Without Third-Party Cookies
seg6.spaceยท2dยท
Discuss: Hacker News
๐ŸŒWASI
Preview
Report Post
Network Programming
theworld.comยท1d
๐Ÿ“กNetwork Protocol Design
Preview
Report Post
A Practical Guide to SafeLine: Setting Up a WAF and Testing It With a Real SQL Injection Attack
infosecwriteups.com
ยท2d
๐ŸŒDNS Security
Preview
Report Post
Fake MAS Windows activation domain used to spread PowerShell malware that infect Windows systems with "Cosmali Loader"
bleepingcomputer.comยท3dยท
๐Ÿฆ Malware Analysis
Preview
Report Post