๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฏ NTLM Attacks

Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

Sububy โ€“ A Modular Ruby Suite for Subdomain Enumeration
darknet.org.ukยท22h
๐Ÿ•ต๏ธDomain Enumeration
The Three Kinds of Phone Hacks to Watch Out For
lifehacker.comยท1d
๐Ÿ”“Hacking
Inside the vLLM Inference Server: From Prompt to Response
thenewstack.ioยท10h
๐Ÿ’ปLocal LLMs
Testing in Production
blog.scottlogic.comยท1d
๐Ÿ‘๏ธSystem Observability
Augmenting Penetration Testing Methodology with Artificial Intelligence โ€“ Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.comยท2d
๐Ÿ•ต๏ธPenetration Testing
abhisheksr01/spring-boot-microservice-best-practices
github.comยท1d
๐ŸŒŠStreaming Systems
A composable pattern for pure state machines with effects
gist.github.comยท16hยท
Discuss: Hacker News
๐Ÿ”„Finite State Machines
The AI delegation dilemma
foxhound.systemsยท1hยท
Discuss: Hacker News, r/programming
๐Ÿ—บ๏ธCompetency Maps
Breaking Limits: Highly-Isolated and Low-Overhead Wasm Container - Soichiro Ueda & Ai Nozaki
youtube.comยท1d
โš™๏ธWASM Runtime
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.comยท2d
๐Ÿ”“Hacking
Show HN: AI-SDK-Cpp โ€“ Unified C++ SDK for OpenAI, Anthropic, and More
github.comยท1hยท
Discuss: Hacker News, r/cpp
๐Ÿ”ŒInterface Evolution
HarmonyOS5-NewsAPP-KnockShare
dev.toยท20hยท
Discuss: DEV
๐Ÿ”„Sync Engine
โญ DKIM and Its Setup - Explained Simply with Examples
dev.toยท3dยท
Discuss: DEV
๐ŸŒDNS over QUIC
AI-fueled fake IDs and identity theft: What you need to know
heimdalsecurity.comยท6h
๐ŸŽซKerberos Attacks
CVE-2025-32975 - Quest KACE SMA Authentication Bypass
seclists.orgยท3d
๐ŸŽซKerberos Attacks
Host Your Own Web Firewall with SafeLine โ€” No Cloud Needed
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธeBPF Security
Complete Tutorial: Building Your First React Component on Paseo Network with PAPI Simulator
dev.toยท2hยท
Discuss: DEV
โœ…Format Verification
How Ionos.com Forced Our Product to Rebrand: A Cautionary Tale
dev.toยท18hยท
Discuss: DEV
๐Ÿ“กDNS Archaeology
AI Agents Can Now Pay Autonomously Thanks to x402 and HTTP 402
hackernoon.comยท1d
๐Ÿ”ŒInterface Evolution
Patch now! DoS attacks on Citrix NetScaler ADC and Gateway observed
heise.deยท14h
๐Ÿ“ฆContainer Security
Loading...Loading more...
AboutBlogChangelogRoadmap