// LATEST

LLM Engineering

ModelScan: Static Analysis for ML Model Security Attacks

By Rob Ragan ★ 666 Python Mar 23, 2026
Automation

J2EEScan: Expanding Burp Suite's Java Vulnerability Coverage with 80+ Enterprise-Specific Checks

By Rob Ragan ★ 679 Java Mar 23, 2026
LLM Engineering

Control Your LLM's Personality in Under 60 Seconds with Representation Engineering

By Rob Ragan ★ 699 Jupyter Notebook Mar 23, 2026
Cybersecurity

Finding Invisible Vulnerabilities: How Backslash-Powered Scanning Detects Unknown Injection Flaws

By Rob Ragan ★ 709 Java Mar 23, 2026
Developer Tools

Brave Goggles: How User-Controlled Search Ranking Rules Challenge the Black Box

By Rob Ragan ★ 719 Unknown Mar 23, 2026
Automation

Nightwind: Auto-Generating Dark Mode for Tailwind Without Writing dark: Variants

By Rob Ragan ★ 732 JavaScript Mar 23, 2026
Cybersecurity

Ax Framework: Building Disposable Cloud Armies for Offensive Security

By Rob Ragan ★ 735 Shell Mar 23, 2026
Developer Tools

fingerprintx: Protocol Fingerprinting for the Modern Attack Surface

By Rob Ragan ★ 746 Go Mar 23, 2026
Developer Tools

Laika BOSS: Lockheed Martin's Recursive File Scanner That Hunts Malware Like Russian Space Dogs

By Rob Ragan ★ 751 Python Mar 23, 2026
Developer Tools

Latent Scope: Turning the Embed-Reduce-Cluster-Label Pipeline into a Scientific Instrument

By Rob Ragan ★ 753 JavaScript Mar 23, 2026
Developer Tools

Demovfuscator: Recovering Control Flow from Single-Instruction Obfuscation

By Rob Ragan ★ 758 C++ Mar 23, 2026
Data & Knowledge

EarlyBird: American Express's Pattern-Based Secret Scanner for Self-Hosted Security

By Rob Ragan ★ 758 Go Mar 23, 2026
AI Agents

Muscle Memory: Teaching AI Agents to Cache Their Own Behaviors

By Rob Ragan ★ 759 Python Mar 23, 2026
AI Dev Tools

Building Incident Response Plans as Code: The Counteractive Template Approach

By Rob Ragan ★ 764 Makefile Mar 23, 2026
Cybersecurity

Recog: How Rapid7 Fingerprints the Internet with Regex and XML

By Rob Ragan ★ 765 Ruby Mar 23, 2026
Developer Tools

SlackPirate: How a Single Stolen Cookie Can Compromise Every Workspace You Access

By Rob Ragan ★ 776 Python Mar 23, 2026
Cybersecurity

osx-security-awesome: Your Forensic Roadmap Through the macOS Security Jungle

By Rob Ragan ★ 778 Unknown Mar 23, 2026
Cybersecurity

Confused: A Surgical Strike Tool for Dependency Confusion Detection

By Rob Ragan ★ 779 Go Mar 23, 2026
AI Agents

Freysa: When an AI Guards $40k+ and Humans Pay Thousands to Hack Its Prompt

By Rob Ragan ★ 786 TypeScript Mar 23, 2026
Data & Knowledge

PyExfil: The Messy, Brilliant Toolkit for Stress-Testing Your Data Loss Prevention

By Rob Ragan ★ 805 Python Mar 23, 2026
Infrastructure

ShadowClone: Weaponizing AWS Lambda's Free Tier for Massively Parallel Reconnaissance

By Rob Ragan ★ 814 Python Mar 23, 2026
Developer Tools

DomLink: Automating Domain Discovery Through WHOIS Pivoting

By Rob Ragan ★ 845 Python Mar 23, 2026
Developer Tools

Physical Bitcoin Attacks: A Sobering Database of Meatspace Crypto Crime

By Rob Ragan ★ 853 Unknown Mar 23, 2026
Cybersecurity

Inside Pedro Ribeiro's Exploit Arsenal: A Deep Dive into Real-World Vulnerability Research

By Rob Ragan ★ 856 Ruby Mar 23, 2026