Cybersecurity
215 articles
Cybersecurity
Kubebot: Building a Kubernetes-Native Security Testing Platform with Slack and PubSub
Cybersecurity
Inside NVIDIA's AI Blueprint for Container Vulnerability Analysis: LLM Agents Meet Security Scanning
Cybersecurity
Inside the 211-Million-Entry Wordlist: How cujanovic/Content-Bruteforcing-Wordlist Approaches Web Directory Discovery
Cybersecurity
Running Burp Suite in CI/CD Pipelines with Headless Burp
Cybersecurity
Pentest Muse CLI: When Your Penetration Testing Assistant Can Execute Commands
Cybersecurity
CloudIntel: Hunting Cloud-Specific Threats With a Daily IOC Feed for AWS, Azure, and GCP
Cybersecurity
Building Self-Optimizing Red Team Attacks with DSPy: No Prompt Engineering Required
Cybersecurity
Mining CommonCrawl for Forgotten URLs: A Deep Dive into cc.py
Cybersecurity
The Nuclei Templates Repository: Security Research at the Edge of Chaos
Cybersecurity
Inside Crossfeed: How CISA Built a Serverless Attack Surface Monitor
Cybersecurity
Finding the Gaps: How Missing CVE Templates Give Bug Bounty Hunters an Edge
Cybersecurity
Inside the Awesome Attack Surface Monitoring Repository: A Curated Arsenal for Security Reconnaissance
Cybersecurity
WS-Attacker: The Academic Framework That Hacks SOAP Services at the XML Layer
Cybersecurity
Inside XBOW's Untainted Security Benchmark Suite: 104 CTF Challenges Built to Test AI Pentesting Agents
Cybersecurity
TRAM: How MITRE Built a SciBERT-Powered Engine to Auto-Map Threat Intel to ATT&CK
Cybersecurity
LLM Security & Privacy: A Curated Research Arsenal for the Adversarial Age
Cybersecurity
Scout: A Self-Contained Web Reconnaissance Tool Built for Portability
Cybersecurity
Inside the W3C WebAppSec Working Group: Where Browser Security Standards Are Born
Cybersecurity
PCC: The Single-File Security Audit That Fits in Your Back Pocket
Cybersecurity
WeirdAAL: The AWS Attack Library That Shows You What Hackers See in Your Cloud
Cybersecurity
CookieMonster: Brute-Forcing Weak Session Secrets Across Six Web Frameworks
Cybersecurity
Inside the SaaS Attack Matrix: A Framework for Cloud-Native Offensive Security
Cybersecurity
Inside Akto: How Traffic-Based API Discovery Outperforms Traditional Security Scanning
Cybersecurity