๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฏ NTLM Attacks

Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

PowerDNS Authoritative Server 5.0 Released with BIND-Style Views
linuxiac.comยท1d
๐Ÿ“กDNS Archaeology
Speedrunning the New York Subway
blog.trailofbits.comยท10h
๐Ÿ”ƒFeed Algorithms
Fremont woman got out of the shower and came face-to-face with iPhone camera
mercurynews.comยท5h
๐ŸšจIncident Response
Tearing Apart the Undetected (OSX)Coldroot RAT
objective-see.comยท4d
๐Ÿ“ŸTerminal Forensics
Beyond the Hype: Critical Takeaways From BlackHat and Defcon
thenewstack.ioยท3d
๐ŸŽฏThreat Hunting
In 512(f), the "F" Stands for "Futility"โ€“Shaffer vs. Kavarnos
blog.ericgoldman.orgยท1dยท
Discuss: Hacker News
๐Ÿดโ€โ˜ ๏ธPiracy
How I Approach Performance Investigations โ€“ By Rico Mariani
ricomariani.medium.comยท1dยท
Discuss: Hacker News
๐ŸŽฏPerformance Forensics
Exhaustive Generation of Pattern-Avoiding s-Words
arxiv.orgยท17h
๐Ÿ’พBinary Linguistics
Use it or lose it โ€“ musings on LLMs
onoffswitch.netยท6hยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
Show HN: I made a WASI orchestration prototype
github.comยท17hยท
Discuss: Hacker News
๐ŸŒWASI
**Mastering HTTP/2 Server Performance Optimization in Go for High-Traffic Applications**
dev.toยท3dยท
Discuss: DEV
โšกgRPC
How to Use DeepSeek-V3.1 API โ€” a practical developer tutorial
dev.toยท10hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Malvertising campaign targets 300 companies with Atomic macOS Stealer
scworld.comยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Show HN: Implement BLAKE3 with Awk
github.comยท3dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
DAIQ: Auditing Demographic Attribute Inference from Question in LLMs
arxiv.orgยท17h
๐Ÿ’ปLocal LLMs
Advice on creating a custom web dashboard to run python scripts on the server
reddit.comยท10hยท
Discuss: r/homelab
๐Ÿ›ก๏ธCLI Security
Automate the Testing of Your LLM Prompts
dev.toยท22hยท
Discuss: DEV
โšกProof Automation
Clickjack attack steals password managers’ secrets
malwarebytes.comยท3d
๐Ÿ”“Hacking
Former developer jailed after deploying kill-switch malware at Ohio firm
securityaffairs.comยท3d
๐Ÿ”“Hacking
Canary Deployment and Traffic Shifting with Kubernetes and Istio
blog.devops.devยท8h
๐Ÿ“กNetwork Monitoring
Loading...Loading more...
AboutBlogChangelogRoadmap