๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฏ NTLM Attacks

Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

WinRAR exploit enables attackers to run malicious code on your PC โ€” critical vulnerability patched in latest beta update
tomshardware.comยท1d
๐Ÿ’ฃZIP Vulnerabilities
Mixed nuts #15
brycewray.comยท12h
๐Ÿ“ฐRSS Reading Practices
First NetHack ascension, and insights into the AI capabilities it requires
mikaelhenaff.substack.comยท23hยท
Discuss: Substack
๐Ÿ”ฒCellular Automata
Meta Beats Copyright Suit From Authors Over AI Training on Books
tech.slashdot.orgยท1d
๐Ÿท๏ธMetadata Standards
Gabrl: Securing Commmuniction
gabrl.comยท2dยท
Discuss: Hacker News
๐Ÿ”Quantum Security
The one-more-re-nightmare compiler (2021)
applied-langua.geยท2dยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ”RegEx Engines
Add Single-sign-on To Your Applications With Keycloak and Learn... Takashi Norimatsu & Marek Posolda
youtube.comยท9h
๐Ÿ”“Open Source Software
The Essential Guide to Web Security Scanning: Protecting Your Digital Assets
dev.toยท2hยท
Discuss: DEV
๐ŸŒWARC Forensics
Exploiting the Human Layer: Scattered Spiderโ€™s Identity-Centric Attack Chain (2022โ€“2025)
research.kudelskisecurity.comยท3d
๐ŸŽฏThreat Hunting
Palo Alto Wireshark Quiz โ€” January 2023
infosecwriteups.comยท3d
๐Ÿ“ŠPCAP Analysis
Managing Systemd Logs on Linux with Journalctl
dash0.comยท16hยท
Discuss: r/linux
๐Ÿ“Log Parsing
Program Execution, follow-up
windowsir.blogspot.comยท1dยท
Discuss: www.blogger.com
โšกPerformance Tools
"CitrixBleed 2": Citrix Netscaler gaps more serious
heise.deยท21h
๐Ÿ”“Hacking
Why โ€˜TRUST-NO-ONEโ€™ Is Your Strongest Defense
infosecwriteups.comยท1d
๐ŸŒNetwork Security
What is smishing?
proton.meยท10h
๐Ÿ”Hash Functions
esnet/iperf
github.comยท4h
๐Ÿ›ก๏ธeBPF Security
Compbolt: A lib with a hard to misuse API (based on Matt Godbolt)
github.comยท1dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
AI is Hallucinating Package Names - And Hackers Are Ready
dev.toยท1dยท
Discuss: DEV
๐Ÿš€Indie Hacking
Breaking Limits: Highly-Isolated and Low-Overhead Wasm Container - Soichiro Ueda & Ai Nozaki
youtube.comยท9h
โš™๏ธWASM Runtime
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.comยท1d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap