๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” NTLM Forensics

Windows Authentication, Hash Analysis, Domain Investigation, Credential Recovery

Microsoft Entra ID OAuth Phishing and Detections
elastic.coยท19h
๐ŸŽฏNTLM Attacks
Show HN: Laburity โ€“ Dark and Deep Web Monitoring
laburity.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.comยท1d
๐ŸŽซKerberos Exploitation
NTUSER.DAT Forensics Analysis 2025
cybertriage.comยท6d
๐Ÿ’พDisk Utilities
5 huge stumbling blocks to legacy mainframe EOL
techradar.comยท12h
๐Ÿ›๏ธMainframe Archaeology
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
darknet.org.ukยท18h
๐Ÿ”Quantum Security
Cybercriminals Abuse Open-Source Tools To Target Africaโ€™s Financial Sector
unit42.paloaltonetworks.comยท21h
๐ŸŽซKerberos Exploitation
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.comยท6h
๐Ÿฆ Malware Analysis
How do CAPTCHAs Work?
corero.comยท6h
โšกProof Automation
RedirectionGuard: Mitigating unsafe junction traversal in Windows
msrc.microsoft.comยท12h
๐Ÿ’ฃZIP Vulnerabilities
Directory Opus
gpsoft.com.auยท1d
๐Ÿ”ŒOperating system internals
Deploy Now, Explain Never? Why AI Needs Forensic Parity
muckypaws.comยท1d
๐Ÿ’พPersistence Strategies
Cambridge Cybercrime Conference 2025 โ€“ Liveblog
lightbluetouchpaper.orgยท4h
๐ŸŽฏThreat Hunting
North Korea - Cyber Threat Actor Profile
cstromblad.comยท1h
๐Ÿ‡ธ๐Ÿ‡ชNordic Cryptography
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comยท1d
๐Ÿ›ก๏ธeBPF Security
Practical tips to optimize documentation for LLMs, AI agents, and chatbots
biel.aiยท1dยท
Discuss: Hacker News
๐Ÿค–Archive Automation
Augmenting Penetration Testing Methodology with Artificial Intelligence โ€“ Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.comยท5h
๐Ÿ•ต๏ธPenetration Testing
Filter smarter: A better way to investigate fraud with Search
fingerprint.comยท21h
๐Ÿ”BitFunnel
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comยท9h
๐ŸŽฏThreat Hunting
Week 25 โ€“ 2025
thisweekin4n6.comยท3d
๐ŸŒWARC Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap