All articles

Cybersecurity

215 articles

Cybersecurity

MindAPI: The Interactive Mindmap Turning API Security Chaos Into Visual Order

By Rob Ragan ★ 866 Unknown Mar 23, 2026
Cybersecurity

Nebula: Embedding AI Models Directly Into Penetration Testing Workflows

By Rob Ragan ★ 909 Python Mar 23, 2026
Cybersecurity

Azure Network Security Repository: The Unofficial Automation Hub Microsoft Forgot to Advertise

By Rob Ragan ★ 924 Python Mar 23, 2026
Cybersecurity

The Security API Directory Every SOC Engineer Should Bookmark

By Rob Ragan ★ 967 Unknown Mar 23, 2026
Cybersecurity

Building Your Own Shodan: A Deep Dive into IVRE's Network Reconnaissance Architecture

By Rob Ragan ★ 4.0k Python Mar 23, 2026
Cybersecurity

MimiPenguin: Extracting Login Passwords from Linux Desktop Memory

By Rob Ragan ★ 4.1k C Mar 23, 2026
Cybersecurity

Building a Visual Recon Engine: How gowitness Tames Chrome Headless for Security Research

By Rob Ragan ★ 4.2k Go Mar 23, 2026
Cybersecurity

Axiom: Scaling Security Reconnaissance with Disposable Cloud Infrastructure

By Rob Ragan ★ 4.4k Shell Mar 23, 2026
Cybersecurity

Architecting Resilient Red Team Infrastructure: Lessons from 4,400 GitHub Stars

By Rob Ragan ★ 4.5k Unknown Mar 23, 2026
Cybersecurity

Building Real-Time Deepfakes for Security Testing: Inside the Deepfake Offensive Toolkit

By Rob Ragan ★ 4.5k Python Mar 23, 2026
Cybersecurity

AD-Attack-Defense: The Kill Chain Map for Active Directory Security Operations

By Rob Ragan ★ 4.8k Unknown Mar 23, 2026
Cybersecurity

gau: Mining Four Internet Archives at Once for Security Reconnaissance

By Rob Ragan ★ 4.9k Go Mar 23, 2026
Cybersecurity

Hakrawler: The Unix Philosophy Applied to Web Reconnaissance

By Rob Ragan ★ 5.0k Go Mar 23, 2026
Cybersecurity

Testing LLM Agents Before They Hallucinate in Production: Inside Giskard's Component-Level Evaluation

By Rob Ragan ★ 5.2k Python Mar 23, 2026
Cybersecurity

KingOfBugBountyTips: The Bug Hunter's Command Arsenal That's Not Actually Software

By Rob Ragan ★ 5.3k Python Mar 23, 2026
Cybersecurity

PMD: Building Multi-Language Static Analysis with AST Traversal and XPath Rules

By Rob Ragan ★ 5.4k Java Mar 23, 2026
Cybersecurity

Can I Take Over XYZ: The Crowdsourced Database Preventing Subdomain Takeover Blind Spots

By Rob Ragan ★ 5.6k Python Mar 23, 2026
Cybersecurity

Commix: Automating Command Injection Exploitation in Modern Web Applications

By Rob Ragan ★ 5.7k Python Mar 23, 2026
Cybersecurity

Hound: Why Trigram Indexing Makes Code Search 100x Faster Than grep

By Rob Ragan ★ 5.8k JavaScript Mar 23, 2026
Cybersecurity

Building Adversarially Robust ML Systems with ART: A Framework-Agnostic Security Toolkit

By Rob Ragan ★ 5.9k Python Mar 23, 2026
Cybersecurity

KeyHacks: The Bug Bounty Hunter's Cheat Sheet for API Key Validation

By Rob Ragan ★ 6.1k Unknown Mar 23, 2026
Cybersecurity

Inside K8tools: A Chinese Red Team's Arsenal of Windows Exploits and Web Attack Vectors

By Rob Ragan ★ 6.2k PowerShell Mar 23, 2026
Cybersecurity

MISP: Building a Distributed Threat Intelligence Platform with Automatic Correlation

By Rob Ragan ★ 6.2k PHP Mar 23, 2026
Cybersecurity

Faraday: Turning 80+ Security Scanners Into a Unified Vulnerability Intelligence System

By Rob Ragan ★ 6.3k Python Mar 23, 2026