All articles

Cybersecurity

215 articles

Cybersecurity

Juumla: A Surgical Joomla Scanner for Red and Blue Teams

By Rob Ragan ★ 175 Python Apr 3, 2026
Cybersecurity

vulnx: Query 250,000+ CVEs Like You're Searching Your Email

By Rob Ragan ★ 2.4k Go Apr 3, 2026
Cybersecurity

PyRIT: Microsoft's Framework for Red Teaming AI Systems Before They Fail in Production

By Rob Ragan ★ 3.7k Python Apr 3, 2026
Cybersecurity

Navigating the Dark Side of Foundation Models: A Security Research Compendium

By Rob Ragan ★ 75 Unknown Apr 3, 2026
Cybersecurity

Building a Secret Scanning Arsenal: Inside GitHub's Custom Pattern Library

By Rob Ragan ★ 173 HTML Apr 3, 2026
Cybersecurity

CVE-2024-22026: How Unsigned RPM Installation Becomes Root-Level Compromise

By Rob Ragan ★ 15 Shell Apr 3, 2026
Cybersecurity

Kraken: The Security Testing Menu That Consolidates 18 Attack Vectors Into One CLI

By Rob Ragan ★ 1.1k Python Apr 3, 2026
Cybersecurity

Why This 403 Bypass Tool Deliberately Avoids Python's HTTP Libraries

By Rob Ragan ★ 1.1k Python Apr 3, 2026
Cybersecurity

Noir: Mining Your Codebase for Shadow APIs Before Attackers Do

By Rob Ragan ★ 1.2k Crystal Apr 3, 2026
Cybersecurity

CVE-Bench: Benchmarking AI Agents Against Real-World Web Vulnerabilities

By Rob Ragan ★ 187 Python Apr 2, 2026
Cybersecurity

Finding Leaked Secrets at Scale: A Deep Dive into GitHub Dorks

By Rob Ragan ★ 3.2k Python Mar 31, 2026
Cybersecurity

Open-Source Burp Suite Alternatives for Web Application Testing

By Rob Ragan ★ 0 Various Mar 29, 2026
Cybersecurity

Container Security Tools Compared: Trivy, Grype, and the 2026 Landscape

By Rob Ragan ★ 0 Various Mar 29, 2026
Cybersecurity

Best Open-Source SAST Tools in 2026: A Practitioner's Guide

By Rob Ragan ★ 0 Various Mar 29, 2026
Cybersecurity

Best Secret Scanning Tools in 2026: Gitleaks, TruffleHog, and Beyond

By Rob Ragan ★ 0 Various Mar 29, 2026
Cybersecurity

Semgrep vs Snyk Code: Head-to-Head for Developer Security

By Rob Ragan ★ 0 Various Mar 29, 2026
Cybersecurity

GodNS: Building a DNS Proxy for Red Team Operations

By Rob Ragan ★ 37 Go Mar 25, 2026
Cybersecurity

AIVSS: Quantifying AI Security Risks Beyond Traditional CVSS

By Rob Ragan ★ 38 Python Mar 25, 2026
Cybersecurity

A2P2V: Automating Attack Path Discovery from Vulnerability Scans to Metasploit Exploits

By Rob Ragan ★ 68 Python Mar 25, 2026
Cybersecurity

Autokaker: When LLMs Hunt for Vulnerabilities in Your C Code

By Rob Ragan ★ 68 Python Mar 25, 2026
Cybersecurity

HackBench: Testing Whether LLMs Can Exploit Real Security Vulnerabilities

By Rob Ragan ★ 69 Rich Text Format Mar 25, 2026
Cybersecurity

Auto Exploits: AI-Generated Proof-of-Concepts That Test Themselves

By Rob Ragan ★ 83 Python Mar 25, 2026
Cybersecurity

NB Defense: Catching Secrets and PII Before Your Jupyter Notebooks Hit Production

By Rob Ragan ★ 87 Python Mar 25, 2026
Cybersecurity

Omnispray: Building a Modular Password Spraying Framework That Won't Lock Out Your Targets

By Rob Ragan ★ 128 Python Mar 25, 2026