๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฏ NTLM Attacks

Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

Speedrunning the New York Subway
blog.trailofbits.comยท13h
๐Ÿ”ƒFeed Algorithms
Fremont woman got out of the shower and came face-to-face with iPhone camera
mercurynews.comยท8h
๐ŸšจIncident Response
Tearing Apart the Undetected (OSX)Coldroot RAT
objective-see.comยท4d
๐Ÿ“ŸTerminal Forensics
Phishing in the Classroom: 115,000 Emails Exploit Google Classroom to Target 13,500 Organizations
blog.checkpoint.comยท11h
๐ŸŽฏThreat Hunting
Beyond the Hype: Critical Takeaways From BlackHat and Defcon
thenewstack.ioยท3d
๐ŸŽฏThreat Hunting
Bacteria-based search for drugs against flu yields a potent channel blocker
pnas.orgยท7hยท
Discuss: Hacker News
๐ŸงฌCopy Number Variants
How I Approach Performance Investigations โ€“ By Rico Mariani
ricomariani.medium.comยท1dยท
Discuss: Hacker News
๐ŸŽฏPerformance Forensics
In 512(f), the "F" Stands for "Futility"โ€“Shaffer vs. Kavarnos
blog.ericgoldman.orgยท1dยท
Discuss: Hacker News
๐Ÿดโ€โ˜ ๏ธPiracy
Exhaustive Generation of Pattern-Avoiding s-Words
arxiv.orgยท20h
๐Ÿ’พBinary Linguistics
Builder Pattern in CDK
medium.comยท5hยท
Discuss: Hacker News
๐ŸงฑImmutable Infrastructure
Show HN: Implement BLAKE3 with Awk
github.comยท3dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
Canary Deployment and Traffic Shifting with Kubernetes and Istio
blog.devops.devยท10h
๐Ÿ“กNetwork Monitoring
Show HN: RAG-Guard: Zero-Trust Document AI
github.comยท3hยท
Discuss: Hacker News
๐Ÿค–Archive Automation
DAIQ: Auditing Demographic Attribute Inference from Question in LLMs
arxiv.orgยท20h
๐Ÿ’ปLocal LLMs
Advice on creating a custom web dashboard to run python scripts on the server
reddit.comยท13hยท
Discuss: r/homelab
๐Ÿ›ก๏ธCLI Security
Automate the Testing of Your LLM Prompts
dev.toยท1dยท
Discuss: DEV
โšกProof Automation
Clickjack attack steals password managers’ secrets
malwarebytes.comยท3d
๐Ÿ”“Hacking
Former developer jailed after deploying kill-switch malware at Ohio firm
securityaffairs.comยท3d
๐Ÿ”“Hacking
How U.S. Freelancers and Small Businesses Can Spot AI-Generated Phishing Emails in 2025
dev.toยท4hยท
Discuss: DEV
๐Ÿ“กFeed Security
China-linked Silk Typhoon APT targets North America
securityaffairs.comยท2d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap