Cybersecurity
215 articles
Cybersecurity
Python Pentest Tools: A Curated Arsenal for Security Research in the Python Ecosystem
Cybersecurity
Cockatrice: Building a Cheat-Resistant Card Game Simulator with Qt and Server Authority
Cybersecurity
SkypeDestroyer: Anatomy of a Client-Side HTML Injection Exploit
Cybersecurity
Cert Spotter: Building a Certificate Transparency Monitor Without a Database
Cybersecurity
Repokid: Netflix's Battle-Tested Approach to Taming AWS IAM Permission Creep
Cybersecurity
VHostScan: Fuzzy Logic and Virtual Host Discovery for Penetration Testing
Cybersecurity
Statistically Likely Usernames: Why Smart Pentesters Count Names Like Casinos Count Cards
Cybersecurity
Interlace: The Thread Pool Every Pentester Wishes Their Tools Had Built-In
Cybersecurity
Weaponizing Selenium Grid: How Browser Automation Becomes an SSRF Vector
Cybersecurity
Building Type-Safe Network Scanners in Go with Ullaakut/nmap
Cybersecurity
DNSGen: How Intelligent Permutations Beat Wordlists in Subdomain Discovery
Cybersecurity
Scraping GitHub's Trending Page: Why go-trending Exists and When It'll Break
Cybersecurity
Sudomy: The Bash Orchestrator That Weaponizes 22 APIs for Subdomain Reconnaissance
Cybersecurity
ShuffleDNS: How 10,000 Concurrent DNS Queries Reveal Hidden Subdomains
Cybersecurity
Building a GitHub Trending Bot in Go: Lessons from a Pre-API Era Project
Cybersecurity
Inside o365spray: How Attackers Enumerate and Spray Microsoft 365 Tenants
Cybersecurity
SecPipe: Building AI Security Agents That Orchestrate 185 Containerized Tools Through MCP
Cybersecurity
PowerZure: Post-Compromise Privilege Escalation in Azure Environments
Cybersecurity
Cloudlist: Building a Multi-Cloud Asset Inventory Without the CSPM Bloat
Cybersecurity
diodb: How a Flat JSON File Became the Security Researcher's Phone Book
Cybersecurity
Cent: Taming the Chaos of 500+ Community Nuclei Template Repositories
Cybersecurity
Offensive AI Compilation: A Taxonomy of Machine Learning Attack Vectors and Defensive Countermeasures
Cybersecurity
70,000 WordPress Vulnerabilities in One Command: Inside the Nuclei-Wordfence Pipeline
Cybersecurity