Cybersecurity
215 articles
Cybersecurity
LunaTrace: Self-Hosted Dependency Scanning That Learned from Log4Shell
Cybersecurity
Building a Polyglot Dependency Scanner in Haskell: Inside FOSSA CLI
Cybersecurity
changeme: The Data-Driven Default Credential Scanner That Separates Code from Credentials
Cybersecurity
Subzy: How Fingerprint-Based Detection Makes Subdomain Takeover Scanning Actually Scalable
Cybersecurity
uro: How Pattern Matching Eliminates 90% of Reconnaissance Noise Without Making a Single HTTP Request
Cybersecurity
Notify: Streaming Security Tool Output to Team Communication Platforms
Cybersecurity
GitHacker: Weaponizing Exposed .git Folders to Recover Complete Repository History
Cybersecurity
NoPE Proxy: Breaking Out of Burp Suite's HTTP-Only Prison for Binary Protocol Testing
Cybersecurity
Metlo: Building an Open-Source API Security Platform That Actually Respects Your Data
Cybersecurity
Red Teaming Your LLM: Inside Agentic Security's Vulnerability Scanner
Cybersecurity
mimikittenz: Harvesting Plaintext Passwords from Process Memory Without Admin Rights
Cybersecurity
x8: Finding Hidden API Parameters Through Differential Response Analysis
Cybersecurity
Indirect Prompt Injection: Why LLM-Integrated Apps Are Vulnerable to Remote Code Execution
Cybersecurity
Cr3dOv3r: Automating Credential Reuse Attacks for Security Awareness
Cybersecurity
Snallygaster: Finding the Secrets Web Servers Accidentally Expose
Cybersecurity
Puredns: Building Accurate Subdomain Enumeration on Top of MassDNS's Speed
Cybersecurity
BurpGPT: When AI-Powered Vulnerability Scanning Met Reality
Cybersecurity
Building a YAML-Powered Vulnerability Scanner: Inside Jaeles' Signature Architecture
Cybersecurity
Modernizing Black Hat Python: What It Takes to Port Offensive Security Code to Python 3
Cybersecurity
vulnx: Query-Based Vulnerability Intelligence That Beats Scraping NVD
Cybersecurity
Inside tomnomnom/hacks: The Unglamorous Unix Tools Security Researchers Actually Use
Cybersecurity
Inside Hacking the Cloud: How a Community-Driven Encyclopedia Is Democratizing Cloud Security Knowledge
Cybersecurity
Vulnhuntr: The LLM-Powered Static Analysis Tool That Found Real 0-Days
Cybersecurity