๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” NTLM Forensics

Windows Authentication, Hash Analysis, Domain Investigation, Credential Recovery

The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comยท6h
๐ŸŽฏThreat Hunting
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comยท2dยท
Discuss: www.blogger.com
๐ŸŽฏThreat Hunting
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
news.ycombinator.comยท2hยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Fixing my Old OS Assignment with Machine Code Hacks
gridbugs.orgยท4hยท
Discuss: r/programming
๐Ÿ“ŸTerminal Forensics
RomCom and TransferLoader IoCs in the Spotlight
circleid.comยท4h
๐Ÿ“กDNS Archaeology
Beyond the ban: A better way to secure generative AI applications
blog.cloudflare.comยท5h
๐Ÿ”’Language-based security
AWS, Cloudflare, Digital Ocean, and Google helped Feds investigate alleged Rapper Bot DDoS perp
theregister.comยท18h
๐Ÿ”“Hacking
Pyrat TryHackMe Walkthrough: Step-by-Step Beginnerโ€™s Guide to Easy Level CTF with Reverse Shell andโ€ฆ
infosecwriteups.comยท13h
๐Ÿ”“Password Cracking
Claude Code Gets a Second Opinion from GPT-5
proxymock.ioยท4hยท
Discuss: Hacker News
โšกProof Automation
What is ASPM? Everything You Need to Know
boostsecurity.ioยท1d
๐Ÿ›ก๏ธCLI Security
Can I possibly get some help with this design?
reddit.comยท32mยท
Discuss: r/homelab
๐Ÿ›ฃ๏ธBGP Hijacking
Wavelet-Enhanced PaDiM for Industrial Anomaly Detection
arxiv.orgยท15h
๐Ÿง Machine Learning
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comยท5h
๐Ÿ›กCybersecurity
The Limits of NTP Accuracy on Linux
scottstuff.netยท5hยท
Discuss: Lobsters, Hacker News
๐ŸŽฏEmulation Accuracy
FLINT: Fast Library for Number Theory
flintlib.orgยท51m
๐ŸงฎAlgebraic Datatypes
How a scam hunter got scammed (Lock and Code S06E17)
malwarebytes.comยท16h
๐Ÿฆ Malware Analysis
Hackers are looking to steal Microsoft logins using some devious new tricks - here's how to stay safe
techradar.comยท10h
๐ŸŽฏNTLM Attacks
ST4000NM0035 HDD Firmware Repair and Data Recovery Steps
dolphindatalab.comยท6h
๐Ÿ’พDisk Utilities
Certificate Transparency - Part 3 - Operations
ipng.chยท1d
๐Ÿ”’Hardware Attestation
Claude Code's 19 cent Parser
blogger.comยท6h
๐Ÿ”งBinary Parsers
Loading...Loading more...
AboutBlogChangelogRoadmap