๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” NTLM Forensics

Windows Authentication, Hash Analysis, Domain Investigation, Credential Recovery

Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท2hยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
Windows Hello for Business โ€“ The Face Swap
insinuator.netยท13h
๐ŸŽฏNTLM Attacks
Forensic journey: Breaking down the UserAssist artifact structure
securelist.comยท1d
๐Ÿ”NTLM Archaeology
NEWS ROUNDUP โ€“ 14th July 2025
digitalforensicsmagazine.comยท1d
๐ŸšจIncident Response
Fileless DPAPI Credential Extraction With PowerShell
infosecwriteups.comยท1d
๐ŸŽฏNTLM Attacks
How to test LUKS passphrase on specific key slot
sleeplessbeastie.euยท1d
๐Ÿ”’Hardware Attestation
You Canโ€™t Make This Stuff Up
irreal.orgยท10h
๐Ÿ”“Hacking
Courts Favor Targeted eDiscovery Collections, but It Is Up to In-House Teams to Enable Such Cost Saving Proportional Efforts
blog.x1discovery.comยท7h
โš–๏ธLegal Compliance
SEALGuard: Safeguarding the Multilingual Conversations in Southeast Asian Languages for LLM Software Systems
arxiv.orgยท22h
๐Ÿ“ABNF Parsing
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.comยท13h
๐Ÿฆ Malware Analysis
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgยท2d
๐ŸŒDNS Security
Silent network authentication: What fraud teams need to know
fingerprint.comยท5h
๐ŸŽฏThreat Hunting
How I Doubled My Lookup Performance with a Bitwise Trick
maltsev.spaceยท5h
๐Ÿ”ขBitwise Algorithms
Trace Every Identity Action with Teleport Identity Security
goteleport.comยท1d
๐Ÿ”—Data Provenance
Week 28 โ€“ 2025
thisweekin4n6.comยท2d
๐ŸบKerberos Archaeology
TREVORspray โ€“ Credential Spray Toolkit for Azure, Okta, OWA & More
darknet.org.ukยท2d
๐ŸŒDNS Security
Reversing Google's New VM-Based Integrity Protection: PairIP
blog.byterialab.comยท3hยท
Discuss: Hacker News
๐ŸŒWASI
Ransomware Threat Landscape Analysis - May through July for 2025
cstromblad.comยท1d
๐Ÿฆ Malware Analysis
Repeater Strike: manual testing, amplified
portswigger.netยท12h
๐ŸงชProtocol Fuzzing
Critical UEFI vulnerabilities found in Gigabyte motherboards โ€” allow attackers to bypass Secure Boot and install firmware backdoors
tomshardware.comยท11h
๐Ÿ”’Secure Boot
Loading...Loading more...
AboutBlogChangelogRoadmap