🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” NTLM Forensics

Windows Authentication, Hash Analysis, Domain Investigation, Credential Recovery

To Hide Top-Secret Weapons, the Pentagon Planted Myths About UFOs at Area 51β€”Then Things Spun Out of Control
popularmechanics.comΒ·10h
🌑️Preservation Physics
Stop using your system Perl
perlhacks.comΒ·19h
πŸ”„Language Evolution
Sububy – A Modular Ruby Suite for Subdomain Enumeration
darknet.org.ukΒ·1d
πŸ•΅οΈDomain Enumeration
From Zero to Relevant: Solving the Cold Start User Problem
shaped.aiΒ·1d
πŸŽ›οΈFeed Filtering
Ultimate Lab Resource for VCF 9.0
williamlam.comΒ·2d
🏠HomeLab
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comΒ·2d
🎯Threat Hunting
Combinatorial Explosion of Versions 5 Years Later
worklifenotes.comΒ·15hΒ·
Discuss: Hacker News
πŸ¦‹Format Evolution
Flock Safety’s Feature Updates Cannot Make Automated License Plate Readers Safe
eff.orgΒ·7h
🎯Threat Hunting
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
darknet.org.ukΒ·3d
πŸ”Quantum Security
The Essential Guide to Web Security Scanning: Protecting Your Digital Assets
dev.toΒ·1dΒ·
Discuss: DEV
🌐WARC Forensics
gnuton/asuswrt-merlin.ng
github.comΒ·1d
πŸ”ŒOperating system internals
Microsoft is moving antivirus programs from running at kernel level
ghacks.netΒ·21h
πŸ›‘οΈeBPF Security
Flame Graph Performance Truth Analysis(1750991459477100οΌ‰
dev.toΒ·1dΒ·
Discuss: DEV
⚑Performance Tools
Taming Agentic AI Risks Requires Securing Non-Human Identities
darkreading.comΒ·1d
πŸ”Capability Systems
Microsoft wants to avoid another disastrous CrowdStrike PR abomination and here's how it wants to do it
techradar.comΒ·1d
πŸ”ŒOperating system internals
How to Build a Search Engine from Scratch in Python (No External Packages)
dev.toΒ·19hΒ·
Discuss: DEV
πŸ”Information Retrieval
AI Security Posture Management (AISPM): How to Handle AI Agent Security
hackernoon.comΒ·3d
🎯Threat Hunting
5 huge stumbling blocks to legacy mainframe EOL
techradar.comΒ·3d
πŸ›οΈMainframe Archaeology
Understanding Redis Key Expiration: How Temporary Data Stays Under Control
dev.toΒ·12hΒ·
Discuss: DEV
⚑Redis Internals
JavaScript UUID Generator: How to Create Unique Identifiers
dev.toΒ·14hΒ·
Discuss: DEV
πŸ”Hash Functions
Loading...Loading more...
AboutBlogChangelogRoadmap