Cybersecurity
215 articles
Cybersecurity
Juumla: A Surgical Joomla Scanner for Red and Blue Teams
Cybersecurity
vulnx: Query 250,000+ CVEs Like You're Searching Your Email
Cybersecurity
PyRIT: Microsoft's Framework for Red Teaming AI Systems Before They Fail in Production
Cybersecurity
Navigating the Dark Side of Foundation Models: A Security Research Compendium
Cybersecurity
Building a Secret Scanning Arsenal: Inside GitHub's Custom Pattern Library
Cybersecurity
CVE-2024-22026: How Unsigned RPM Installation Becomes Root-Level Compromise
Cybersecurity
Kraken: The Security Testing Menu That Consolidates 18 Attack Vectors Into One CLI
Cybersecurity
Why This 403 Bypass Tool Deliberately Avoids Python's HTTP Libraries
Cybersecurity
Noir: Mining Your Codebase for Shadow APIs Before Attackers Do
Cybersecurity
CVE-Bench: Benchmarking AI Agents Against Real-World Web Vulnerabilities
Cybersecurity
Finding Leaked Secrets at Scale: A Deep Dive into GitHub Dorks
Cybersecurity
Open-Source Burp Suite Alternatives for Web Application Testing
Cybersecurity
Container Security Tools Compared: Trivy, Grype, and the 2026 Landscape
Cybersecurity
Best Open-Source SAST Tools in 2026: A Practitioner's Guide
Cybersecurity
Best Secret Scanning Tools in 2026: Gitleaks, TruffleHog, and Beyond
Cybersecurity
Semgrep vs Snyk Code: Head-to-Head for Developer Security
Cybersecurity
GodNS: Building a DNS Proxy for Red Team Operations
Cybersecurity
AIVSS: Quantifying AI Security Risks Beyond Traditional CVSS
Cybersecurity
A2P2V: Automating Attack Path Discovery from Vulnerability Scans to Metasploit Exploits
Cybersecurity
Autokaker: When LLMs Hunt for Vulnerabilities in Your C Code
Cybersecurity
HackBench: Testing Whether LLMs Can Exploit Real Security Vulnerabilities
Cybersecurity
Auto Exploits: AI-Generated Proof-of-Concepts That Test Themselves
Cybersecurity
NB Defense: Catching Secrets and PII Before Your Jupyter Notebooks Hit Production
Cybersecurity