๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” NTLM Forensics

Windows Authentication, Hash Analysis, Domain Investigation, Credential Recovery

Directory Opus
gpsoft.com.auยท2d
๐Ÿ”ŒOperating system internals
Filter smarter: A better way to investigate fraud with Search
fingerprint.comยท1d
๐Ÿ”BitFunnel
The Three Kinds of Phone Hacks to Watch Out For
lifehacker.comยท4h
๐Ÿ”“Hacking
[$] Supporting kernel development with large language models
lwn.netยท4h
๐Ÿ’ปLocal LLMs
Cosplaying as a Telco: VCF Southwest 2025
michaelwashere.netยท21h
๐Ÿ’พvintage computing
The Inefficiency in Digital Forensics
cyb3rops.medium.comยท3d
๐ŸšจIncident Response
Fixes for five Lix CVEs
lix.systemsยท2dยท
Discuss: Lobsters
โ„๏ธNix Adoption
Using LLMs in CI/CD for semantic testing of web content
plo.ugยท4hยท
Discuss: Hacker News
โšกProof Automation
AI is Hallucinating Package Names - And Hackers Are Ready
dev.toยท18hยท
Discuss: DEV
๐Ÿš€Indie Hacking
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
darkreading.comยท1d
๐ŸŽซKerberos Exploitation
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
forensicfocus.comยท2d
๐Ÿ”ฌArchive Forensics
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
arxiv.orgยท3d
๐Ÿ”’Language-based security
NewDay builds A Generative AI based Customer service Agent Assist with over 90% accuracy
aws.amazon.comยท2d
๐ŸŒ€Brotli Internals
Microsoft wants to avoid another disastrous CrowdStrike PR abomination and here's how it wants to do it
techradar.comยท3h
๐Ÿ”ŒOperating system internals
SSL and TLS Deployment Best Practices
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
Hello, Medium Family! Yamini Yadav Here, Sharing My OSCP Journey & Essential Port Insights!
infosecwriteups.comยท1d
๐ŸŒNetwork Security
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.comยท1d
๐Ÿฆ Malware Analysis
How to automatically decrypt a LUKS LVM setup on boot with a USB
dev.toยท1dยท
Discuss: DEV
๐Ÿ”’Hardware Attestation
Domain Password Audit Tool (DPAT)
dev.toยท3dยท
Discuss: DEV
๐ŸŽฏNTLM Attacks
Learning High-Quality Latent Representations for Anomaly Detection and Signal Integrity Enhancement in High-Speed Signals
arxiv.orgยท2d
๐Ÿง Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap