🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎯 NTLM Attacks

Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

WinRAR exploit enables attackers to run malicious code on your PC β€” critical vulnerability patched in latest beta update
tomshardware.comΒ·1d
πŸ’£ZIP Vulnerabilities
Global Call For Papers Now Open: Share Your Knowledge At Magnet User Summit & Magnet Virtual Summit
forensicfocus.comΒ·10h
πŸ”—Data Provenance
Mixed nuts #15
brycewray.comΒ·1h
πŸ“°RSS Reading Practices
The one-more-re-nightmare compiler (2021)
applied-langua.geΒ·2dΒ·
Discuss: Lobsters, Hacker News, r/programming
πŸ”RegEx Engines
First NetHack ascension, and insights into the AI capabilities it requires
mikaelhenaff.substack.comΒ·12hΒ·
Discuss: Substack
πŸ”²Cellular Automata
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”’WASM Capabilities
Cisco fixes two critical make-me-root bugs on Identity Services Engine components
theregister.comΒ·2h
πŸ§ͺCBOR Fuzzing
Meta Beats Copyright Suit From Authors Over AI Training on Books
tech.slashdot.orgΒ·18h
🏷️Metadata Standards
Cisco fixed critical ISE flaws allowing Root-level remote code execution
securityaffairs.comΒ·7h
πŸ”“Hacking
AI Agents Can Now Pay Autonomously Thanks to x402 and HTTP 402
hackernoon.comΒ·12h
πŸ”ŒInterface Evolution
Gabrl: Securing Commmuniction
gabrl.comΒ·2dΒ·
Discuss: Hacker News
πŸ”Quantum Security
IP Sentry (Golang)
dev.toΒ·2dΒ·
Discuss: DEV
πŸ›‘οΈeBPF Security
The Art of Discovery: A Comprehensive Guide to Windows Enumeration
infosecwriteups.comΒ·9h
πŸͺŸAwesome windows command-line
Windows users warned of major security issue - here's why FileFix attack could be a big concern
techradar.comΒ·1d
πŸ”“Hacking
Stealthy backdoor found hiding in SOHO devices running Linux
helpnetsecurity.comΒ·3dΒ·
Discuss: Hacker News
🎫Kerberos Exploitation
Playwright: Using Cognito to Log In for Your E2E Tests
dev.toΒ·6hΒ·
Discuss: DEV
⚑Proof Automation
China-Nexus 'LapDogs' Network Thrives on Backdoored SOHO Devices
darkreading.comΒ·1d
🎫Kerberos Attacks
OTP bypassed by using luck infused logical thinking bug report
infosecwriteups.comΒ·9h
πŸ”“Hacking
Practical tips to optimize documentation for LLMs, AI agents, and chatbots
biel.aiΒ·2dΒ·
Discuss: Hacker News
πŸ€–Archive Automation
Amal’s First Switch Equation: Clean FizzBuzz with Bitmask Logic
dev.toΒ·6hΒ·
Discuss: DEV
🌊Stream Ciphers
Loading...Loading more...
AboutBlogChangelogRoadmap