๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฏ NTLM Attacks

Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

NTLM Explained in Under 5 Minutes (And Why You Should Care)
infosecwriteups.comยท2d
๐Ÿ”NTLM Forensics
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lolยท1dยท
Discuss: Hacker News
๐Ÿ”’Language-based security
Top Strategies for Preventing Domain Hijacking
securityscorecard.comยท22h
๐ŸŒBGP Security
RedirectionGuard: Mitigating unsafe junction traversal in Windows
msrc.microsoft.comยท11h
๐Ÿ’ฃZIP Vulnerabilities
Networking for Systems Administrators
mwl.ioยท5hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Domain Password Audit Tool (DPAT)
dev.toยท2dยท
Discuss: DEV
๐Ÿ”“Password Cracking
Microsoft Entra ID OAuth Phishing and Detections
elastic.coยท18h
๐ŸŽซKerberos Exploitation
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.comยท5h
๐ŸŽซKerberos Attacks
SonicWall warns of fake VPN apps stealing user logins and putting businesses at risk - here's what we know
techradar.comยท2h
๐Ÿ”“Hacking
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.orgยท1d
๐Ÿ’ฃZIP Vulnerabilities
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comยท9h
๐ŸŽซKerberos Attacks
Encrypting identifiers in practice
sjoerdlangkemper.nlยท13h
๐ŸŒŠStream Ciphers
Cybercriminals Abuse Open-Source Tools To Target Africaโ€™s Financial Sector
unit42.paloaltonetworks.comยท20h
๐ŸŽซKerberos Exploitation
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.devยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgยท1d
๐Ÿฆ Malware Analysis
Program Execution, follow-up
windowsir.blogspot.comยท6hยท
Discuss: www.blogger.com
โšกPerformance Tools
Microsoft Teams Security Attack Matrix
cyberdom.blogยท1dยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
SSL and TLS Deployment Best Practices
github.comยท19hยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
Building Passwordless Authentication with Stytch
encore.devยท18h
๐ŸŒNetworkProtocols
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.comยท1d
๐ŸŽซKerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap