Cybersecurity
215 articles
Cybersecurity
Smap: How to Port Scan 200 Hosts Per Second Without Touching a Single Target
Cybersecurity
CloudGoat: Building Vulnerable AWS Infrastructure to Train Your Red Team
Cybersecurity
RED_HAWK: The PHP Pentester's Swiss Army Knife That Time Forgot
Cybersecurity
Mining Bug Bounty Scopes: How bounty-targets-data Automates Security Reconnaissance
Cybersecurity
Notify: Why Go's Multi-Platform Notification Library Chooses Simplicity Over Guarantees
Cybersecurity
Arsenal: A Command Injection Hack That Makes Penetration Testing Actually Manageable
Cybersecurity
shhgit: Real-Time Secret Detection Across Public Git Repositories
Cybersecurity
Ghauri: Building a Modern SQL Injection Framework with Session Management and Multi-Technique Detection
Cybersecurity
bbscope: Building a Multi-Platform Bug Bounty Scope Aggregator with PostgreSQL and LLM Normalization
Cybersecurity
Teaching AI Assistants to Hunt Bugs: Inside h1-brain's MCP Architecture
Cybersecurity
Open-CVDB: The Community-Driven Database Tracking Cloud Provider Security Failures
Cybersecurity
Gsec: The Open-Source Web Scanner That Automates What Burp Suite Makes You Test Manually
Cybersecurity
GSAN: Mining Subdomains from SSL Certificates Without Certificate Transparency Logs
Cybersecurity
Gorilla: A Unified Wordlist Generator That Replaces Your Entire Password Cracking Toolkit
Cybersecurity
Second Order: Finding Subdomain Takeovers Hidden in Plain Sight
Cybersecurity
ppfuzz: Hunting Client-Side Prototype Pollution with Headless Chrome and Rust
Cybersecurity
Puncia: When You Need Nation-State Exploit Intelligence Your CVE Database Doesn't Have
Cybersecurity
Finding Invisible Vulnerabilities: How Backslash-Powered Scanning Detects Unknown Injection Flaws
Cybersecurity
Ax Framework: Building Disposable Cloud Armies for Offensive Security
Cybersecurity
Recog: How Rapid7 Fingerprints the Internet with Regex and XML
Cybersecurity
osx-security-awesome: Your Forensic Roadmap Through the macOS Security Jungle
Cybersecurity
Confused: A Surgical Strike Tool for Dependency Confusion Detection
Cybersecurity
Inside Pedro Ribeiro's Exploit Arsenal: A Deep Dive into Real-World Vulnerability Research
Cybersecurity