// LATEST
LLM Engineering
ModelScan: Static Analysis for ML Model Security Attacks
Automation
J2EEScan: Expanding Burp Suite's Java Vulnerability Coverage with 80+ Enterprise-Specific Checks
LLM Engineering
Control Your LLM's Personality in Under 60 Seconds with Representation Engineering
Cybersecurity
Finding Invisible Vulnerabilities: How Backslash-Powered Scanning Detects Unknown Injection Flaws
Developer Tools
Brave Goggles: How User-Controlled Search Ranking Rules Challenge the Black Box
Automation
Nightwind: Auto-Generating Dark Mode for Tailwind Without Writing dark: Variants
Cybersecurity
Ax Framework: Building Disposable Cloud Armies for Offensive Security
Developer Tools
fingerprintx: Protocol Fingerprinting for the Modern Attack Surface
Developer Tools
Laika BOSS: Lockheed Martin's Recursive File Scanner That Hunts Malware Like Russian Space Dogs
Developer Tools
Latent Scope: Turning the Embed-Reduce-Cluster-Label Pipeline into a Scientific Instrument
Developer Tools
Demovfuscator: Recovering Control Flow from Single-Instruction Obfuscation
Data & Knowledge
EarlyBird: American Express's Pattern-Based Secret Scanner for Self-Hosted Security
AI Agents
Muscle Memory: Teaching AI Agents to Cache Their Own Behaviors
AI Dev Tools
Building Incident Response Plans as Code: The Counteractive Template Approach
Cybersecurity
Recog: How Rapid7 Fingerprints the Internet with Regex and XML
Developer Tools
SlackPirate: How a Single Stolen Cookie Can Compromise Every Workspace You Access
Cybersecurity
osx-security-awesome: Your Forensic Roadmap Through the macOS Security Jungle
Cybersecurity
Confused: A Surgical Strike Tool for Dependency Confusion Detection
AI Agents
Freysa: When an AI Guards $40k+ and Humans Pay Thousands to Hack Its Prompt
Data & Knowledge
PyExfil: The Messy, Brilliant Toolkit for Stress-Testing Your Data Loss Prevention
Infrastructure
ShadowClone: Weaponizing AWS Lambda's Free Tier for Massively Parallel Reconnaissance
Developer Tools
DomLink: Automating Domain Discovery Through WHOIS Pivoting
Developer Tools
Physical Bitcoin Attacks: A Sobering Database of Meatspace Crypto Crime
Cybersecurity