All articles

Cybersecurity

215 articles

Cybersecurity

Python Pentest Tools: A Curated Arsenal for Security Research in the Python Ecosystem

By Rob Ragan ★ 2.9k Unknown Apr 6, 2026
Cybersecurity

Cockatrice: Building a Cheat-Resistant Card Game Simulator with Qt and Server Authority

By Rob Ragan ★ 1.8k C++ Apr 6, 2026
Cybersecurity

SkypeDestroyer: Anatomy of a Client-Side HTML Injection Exploit

By Rob Ragan ★ 19 JavaScript Apr 6, 2026
Cybersecurity

Cert Spotter: Building a Certificate Transparency Monitor Without a Database

By Rob Ragan ★ 1.1k Go Apr 5, 2026
Cybersecurity

Repokid: Netflix's Battle-Tested Approach to Taming AWS IAM Permission Creep

By Rob Ragan ★ 1.1k Python Apr 5, 2026
Cybersecurity

VHostScan: Fuzzy Logic and Virtual Host Discovery for Penetration Testing

By Rob Ragan ★ 1.3k Python Apr 4, 2026
Cybersecurity

Statistically Likely Usernames: Why Smart Pentesters Count Names Like Casinos Count Cards

By Rob Ragan ★ 1.3k Python Apr 4, 2026
Cybersecurity

Interlace: The Thread Pool Every Pentester Wishes Their Tools Had Built-In

By Rob Ragan ★ 1.3k Python Apr 4, 2026
Cybersecurity

Weaponizing Selenium Grid: How Browser Automation Becomes an SSRF Vector

By Rob Ragan ★ 7 Python Apr 4, 2026
Cybersecurity

Building Type-Safe Network Scanners in Go with Ullaakut/nmap

By Rob Ragan ★ 1.0k Go Apr 4, 2026
Cybersecurity

DNSGen: How Intelligent Permutations Beat Wordlists in Subdomain Discovery

By Rob Ragan ★ 1.1k Python Apr 4, 2026
Cybersecurity

Scraping GitHub's Trending Page: Why go-trending Exists and When It'll Break

By Rob Ragan ★ 146 Go Apr 4, 2026
Cybersecurity

Sudomy: The Bash Orchestrator That Weaponizes 22 APIs for Subdomain Reconnaissance

By Rob Ragan ★ 2.4k Shell Apr 3, 2026
Cybersecurity

ShuffleDNS: How 10,000 Concurrent DNS Queries Reveal Hidden Subdomains

By Rob Ragan ★ 1.6k Go Apr 3, 2026
Cybersecurity

Building a GitHub Trending Bot in Go: Lessons from a Pre-API Era Project

By Rob Ragan ★ 115 Go Apr 3, 2026
Cybersecurity

Inside o365spray: How Attackers Enumerate and Spray Microsoft 365 Tenants

By Rob Ragan ★ 986 Python Apr 3, 2026
Cybersecurity

SecPipe: Building AI Security Agents That Orchestrate 185 Containerized Tools Through MCP

By Rob Ragan ★ 780 Python Apr 3, 2026
Cybersecurity

PowerZure: Post-Compromise Privilege Escalation in Azure Environments

By Rob Ragan ★ 1.3k PowerShell Apr 3, 2026
Cybersecurity

Cloudlist: Building a Multi-Cloud Asset Inventory Without the CSPM Bloat

By Rob Ragan ★ 1.0k Go Apr 3, 2026
Cybersecurity

diodb: How a Flat JSON File Became the Security Researcher's Phone Book

By Rob Ragan ★ 1.1k Python Apr 3, 2026
Cybersecurity

Cent: Taming the Chaos of 500+ Community Nuclei Template Repositories

By Rob Ragan ★ 1.0k Go Apr 3, 2026
Cybersecurity

Offensive AI Compilation: A Taxonomy of Machine Learning Attack Vectors and Defensive Countermeasures

By Rob Ragan ★ 1.4k HTML Apr 3, 2026
Cybersecurity

70,000 WordPress Vulnerabilities in One Command: Inside the Nuclei-Wordfence Pipeline

By Rob Ragan ★ 1.2k Python Apr 3, 2026
Cybersecurity

wsrepl: The Interactive WebSocket REPL Built for Penetration Testing Workflows

By Rob Ragan ★ 235 Python Apr 3, 2026