// LATEST
Developer Tools
BandSox: Running Firecracker MicroVMs from Docker Images in Milliseconds
Developer Tools
RedCode: The First Large-Scale Safety Benchmark That Actually Tests Code Agents in the Wild
Developer Tools
TTI: Teaching Web Agents to Learn from Their Own Mistakes at Test Time
Automation
urlwatch: Building a Personal Web Surveillance System with Python Filters
Developer Tools
Agenspy: Making DSPy Protocol-Native for the Agent-to-Agent Future
Developer Tools
Building an Autonomous Reverse Engineering Agent with Dual-LLM Verification Loops
Developer Tools
Auto-Exploits: When AI Writes Security Exploits For You
Developer Tools
Edgar: A Minimalist Python Gateway to SEC Financial Filings
Developer Tools
GhostLine: Building a Voice-Cloning Vishing Framework with FastAPI, Twilio, and LLMs
Developer Tools
Natural Language Playwright Tests with Anthropic's Computer Use API
Developer Tools
Azul: Building a Hundred-Million-Sample Malware Knowledge Base on Kubernetes
Developer Tools
CewlAI: Teaching Language Models to Think Like a Pentester
Developer Tools
Building Explainer Videos as Code: Inside Video Explainer's AI-Powered Pipeline
Developer Tools
Building a Browser Extension Threat Intelligence Feed with Flat Files and Local-First Scanning
Developer Tools
CyberStrike: Turning Your Claude or GPT Subscription Into an Autonomous Penetration Testing Agent
Developer Tools
Nightwire: Ship Production Code from Your Phone via Signal
Developer Tools
VulnBot: When AI Agents Learn to Think Like Penetration Testers
Developer Tools
ARTKIT: Building Multi-Turn Adversarial Testing Pipelines for Gen AI Systems
Developer Tools
CVE-Bench: Testing Whether AI Agents Can Exploit Real-World Vulnerabilities
Developer Tools
How Engine Simulator Synthesizes Authentic V8 Rumble from Physics, Not Samples
Automation
Testing Your Security Crawler Against Google's Maze: A Deep Dive into security-crawl-maze
Data & Knowledge
tlsx: How ProjectDiscovery Built a Multi-Protocol TLS Scanner for Offensive Reconnaissance
Data & Knowledge
Building a Universal Secrets Database: How secrets-patterns-db Centralizes Detection Across Security Tools
LLM Engineering