All articles

Cybersecurity

215 articles

Cybersecurity

Kubebot: Building a Kubernetes-Native Security Testing Platform with Slack and PubSub

By Rob Ragan ★ 166 Python Mar 25, 2026
Cybersecurity

Inside NVIDIA's AI Blueprint for Container Vulnerability Analysis: LLM Agents Meet Security Scanning

By Rob Ragan ★ 196 Jupyter Notebook Mar 25, 2026
Cybersecurity

Inside the 211-Million-Entry Wordlist: How cujanovic/Content-Bruteforcing-Wordlist Approaches Web Directory Discovery

By Rob Ragan ★ 217 Python Mar 25, 2026
Cybersecurity

Running Burp Suite in CI/CD Pipelines with Headless Burp

By Rob Ragan ★ 233 Java Mar 25, 2026
Cybersecurity

Pentest Muse CLI: When Your Penetration Testing Assistant Can Execute Commands

By Rob Ragan ★ 236 Python Mar 25, 2026
Cybersecurity

CloudIntel: Hunting Cloud-Specific Threats With a Daily IOC Feed for AWS, Azure, and GCP

By Rob Ragan ★ 249 Unknown Mar 25, 2026
Cybersecurity

Building Self-Optimizing Red Team Attacks with DSPy: No Prompt Engineering Required

By Rob Ragan ★ 253 Python Mar 25, 2026
Cybersecurity

Mining CommonCrawl for Forgotten URLs: A Deep Dive into cc.py

By Rob Ragan ★ 275 Python Mar 25, 2026
Cybersecurity

The Nuclei Templates Repository: Security Research at the Edge of Chaos

By Rob Ragan ★ 297 Unknown Mar 25, 2026
Cybersecurity

Inside Crossfeed: How CISA Built a Serverless Attack Surface Monitor

By Rob Ragan ★ 421 TypeScript Mar 24, 2026
Cybersecurity

Finding the Gaps: How Missing CVE Templates Give Bug Bounty Hunters an Edge

By Rob Ragan ★ 427 Shell Mar 24, 2026
Cybersecurity

Inside the Awesome Attack Surface Monitoring Repository: A Curated Arsenal for Security Reconnaissance

By Rob Ragan ★ 463 Unknown Mar 24, 2026
Cybersecurity

WS-Attacker: The Academic Framework That Hacks SOAP Services at the XML Layer

By Rob Ragan ★ 491 Java Mar 24, 2026
Cybersecurity

Inside XBOW's Untainted Security Benchmark Suite: 104 CTF Challenges Built to Test AI Pentesting Agents

By Rob Ragan ★ 526 PHP Mar 24, 2026
Cybersecurity

TRAM: How MITRE Built a SciBERT-Powered Engine to Auto-Map Threat Intel to ATT&CK

By Rob Ragan ★ 555 Jupyter Notebook Mar 24, 2026
Cybersecurity

LLM Security & Privacy: A Curated Research Arsenal for the Adversarial Age

By Rob Ragan ★ 567 Python Mar 24, 2026
Cybersecurity

Scout: A Self-Contained Web Reconnaissance Tool Built for Portability

By Rob Ragan ★ 590 Go Mar 24, 2026
Cybersecurity

Inside the W3C WebAppSec Working Group: Where Browser Security Standards Are Born

By Rob Ragan ★ 655 HTML Mar 24, 2026
Cybersecurity

PCC: The Single-File Security Audit That Fits in Your Back Pocket

By Rob Ragan ★ 820 PHP Mar 24, 2026
Cybersecurity

WeirdAAL: The AWS Attack Library That Shows You What Hackers See in Your Cloud

By Rob Ragan ★ 838 Python Mar 24, 2026
Cybersecurity

CookieMonster: Brute-Forcing Weak Session Secrets Across Six Web Frameworks

By Rob Ragan ★ 969 Go Mar 24, 2026
Cybersecurity

Inside the SaaS Attack Matrix: A Framework for Cloud-Native Offensive Security

By Rob Ragan ★ 1.4k Unknown Mar 24, 2026
Cybersecurity

Inside Akto: How Traffic-Based API Discovery Outperforms Traditional Security Scanning

By Rob Ragan ★ 1.5k Java Mar 24, 2026
Cybersecurity

AWSBucketDump: How a 400-Line Python Script Became a Bug Bounty Hunter's Secret Weapon

By Rob Ragan ★ 1.5k Python Mar 24, 2026