🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” NTLM Forensics

Windows Authentication, Hash Analysis, Domain Investigation, Credential Recovery

ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comΒ·1d
πŸ’£ZIP Vulnerabilities
Win-DDoS Under the Microscope: Lab Insights into Potential Threat Behavior
corero.comΒ·23h
πŸ•΅οΈDomain Enumeration
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed
guptadeepak.comΒ·7hΒ·
Discuss: DEV, Hacker News
πŸ”Capability Systems
Phishing Kits Uncovered: Methods and Tactics Used to Evade SEGs, Sandboxes, and Analysts
cofense.comΒ·8h
🎫Kerberos Exploitation
BW21-CBV-Kitβ€”β€”Home Video Monitoring and Playback System
hackster.ioΒ·7h
🎬Video Codecs
The Humble Office Printer Could Take Down Your Network (Here's How to Prevent It)
hackernoon.comΒ·6h
πŸ’£ZIP Vulnerabilities
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comΒ·21h
πŸ‘οΈSystem Observability
Researchers Discover a Cyber-Physical Bank Heist Powered by A 4G Raspberry Pi Implant
bastille.netΒ·22h
πŸ“‘Network Monitoring
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comΒ·2d
🎯Threat Hunting
Intelligence Brief: UNC6040 Threat Assessment
cstromblad.comΒ·6h
🎫Kerberos History
Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy
sciencedirect.comΒ·23h
πŸ‘οΈPerceptual Hashing
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comΒ·3dΒ·
Discuss: www.blogger.com
🎯Threat Hunting
SOC-CERT: Automated Threat Intelligence System with n8n & AI
dev.toΒ·24mΒ·
Discuss: DEV
🏠Homelab Pentesting
Nx compromised: malware uses Claude code CLI to explore the filesystem
semgrep.devΒ·1hΒ·
Discuss: Lobsters, Hacker News
πŸ”Binary Forensics
Into the World of Passkeys: Practical Thoughts and Real-Life Use Cases
blog.compass-security.comΒ·1d
πŸ”’Hardware Attestation
(繁中) The Art of PHP β€” My CTF Journey and Untold Stories!
blog.orange.twΒ·11h
πŸ‡¨πŸ‡³Chinese Computing
Techno Security & Digital Forensics Conference Returns To San Diego With Deep Dive Into AI, Cybercrime, And Justice
forensicfocus.comΒ·1d
🚨Incident Response
runZero Hour, ep. 21 recap: highlights from hacker summer camp
runzero.comΒ·23h
πŸ”eBPF
Exploits and vulnerabilities in Q2 2025
securelist.comΒ·3h
πŸ”“Hacking
InfoSec News Nuggets 8/27/2025
aboutdfir.comΒ·32m
🎫Kerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap