All articles

Cybersecurity

215 articles

Cybersecurity

LunaTrace: Self-Hosted Dependency Scanning That Learned from Log4Shell

By Rob Ragan ★ 1.5k TypeScript Mar 24, 2026
Cybersecurity

Building a Polyglot Dependency Scanner in Haskell: Inside FOSSA CLI

By Rob Ragan ★ 1.5k Haskell Mar 24, 2026
Cybersecurity

changeme: The Data-Driven Default Credential Scanner That Separates Code from Credentials

By Rob Ragan ★ 1.5k Python Mar 24, 2026
Cybersecurity

Subzy: How Fingerprint-Based Detection Makes Subdomain Takeover Scanning Actually Scalable

By Rob Ragan ★ 1.5k Go Mar 24, 2026
Cybersecurity

uro: How Pattern Matching Eliminates 90% of Reconnaissance Noise Without Making a Single HTTP Request

By Rob Ragan ★ 1.5k Python Mar 24, 2026
Cybersecurity

Notify: Streaming Security Tool Output to Team Communication Platforms

By Rob Ragan ★ 1.6k Go Mar 24, 2026
Cybersecurity

GitHacker: Weaponizing Exposed .git Folders to Recover Complete Repository History

By Rob Ragan ★ 1.6k Python Mar 24, 2026
Cybersecurity

NoPE Proxy: Breaking Out of Burp Suite's HTTP-Only Prison for Binary Protocol Testing

By Rob Ragan ★ 1.7k Java Mar 24, 2026
Cybersecurity

Metlo: Building an Open-Source API Security Platform That Actually Respects Your Data

By Rob Ragan ★ 1.8k TypeScript Mar 24, 2026
Cybersecurity

Red Teaming Your LLM: Inside Agentic Security's Vulnerability Scanner

By Rob Ragan ★ 1.8k Python Mar 24, 2026
Cybersecurity

mimikittenz: Harvesting Plaintext Passwords from Process Memory Without Admin Rights

By Rob Ragan ★ 1.9k PowerShell Mar 24, 2026
Cybersecurity

x8: Finding Hidden API Parameters Through Differential Response Analysis

By Rob Ragan ★ 2.0k Rust Mar 24, 2026
Cybersecurity

Indirect Prompt Injection: Why LLM-Integrated Apps Are Vulnerable to Remote Code Execution

By Rob Ragan ★ 2.1k Jupyter Notebook Mar 24, 2026
Cybersecurity

Cr3dOv3r: Automating Credential Reuse Attacks for Security Awareness

By Rob Ragan ★ 2.1k Python Mar 24, 2026
Cybersecurity

Snallygaster: Finding the Secrets Web Servers Accidentally Expose

By Rob Ragan ★ 2.1k Python Mar 24, 2026
Cybersecurity

Puredns: Building Accurate Subdomain Enumeration on Top of MassDNS's Speed

By Rob Ragan ★ 2.1k Go Mar 24, 2026
Cybersecurity

BurpGPT: When AI-Powered Vulnerability Scanning Met Reality

By Rob Ragan ★ 2.3k Java Mar 24, 2026
Cybersecurity

Building a YAML-Powered Vulnerability Scanner: Inside Jaeles' Signature Architecture

By Rob Ragan ★ 2.3k Go Mar 24, 2026
Cybersecurity

Modernizing Black Hat Python: What It Takes to Port Offensive Security Code to Python 3

By Rob Ragan ★ 2.3k Python Mar 24, 2026
Cybersecurity

vulnx: Query-Based Vulnerability Intelligence That Beats Scraping NVD

By Rob Ragan ★ 2.4k Go Mar 24, 2026
Cybersecurity

Inside tomnomnom/hacks: The Unglamorous Unix Tools Security Researchers Actually Use

By Rob Ragan ★ 2.4k Go Mar 24, 2026
Cybersecurity

Inside Hacking the Cloud: How a Community-Driven Encyclopedia Is Democratizing Cloud Security Knowledge

By Rob Ragan ★ 2.6k Dockerfile Mar 24, 2026
Cybersecurity

Vulnhuntr: The LLM-Powered Static Analysis Tool That Found Real 0-Days

By Rob Ragan ★ 2.6k Python Mar 24, 2026
Cybersecurity

Bearer CLI: SAST That Actually Cares About Your Users' Privacy

By Rob Ragan ★ 2.6k Go Mar 24, 2026