Cybersecurity
215 articles
Cybersecurity
MindAPI: The Interactive Mindmap Turning API Security Chaos Into Visual Order
Cybersecurity
Nebula: Embedding AI Models Directly Into Penetration Testing Workflows
Cybersecurity
Azure Network Security Repository: The Unofficial Automation Hub Microsoft Forgot to Advertise
Cybersecurity
The Security API Directory Every SOC Engineer Should Bookmark
Cybersecurity
Building Your Own Shodan: A Deep Dive into IVRE's Network Reconnaissance Architecture
Cybersecurity
MimiPenguin: Extracting Login Passwords from Linux Desktop Memory
Cybersecurity
Building a Visual Recon Engine: How gowitness Tames Chrome Headless for Security Research
Cybersecurity
Axiom: Scaling Security Reconnaissance with Disposable Cloud Infrastructure
Cybersecurity
Architecting Resilient Red Team Infrastructure: Lessons from 4,400 GitHub Stars
Cybersecurity
Building Real-Time Deepfakes for Security Testing: Inside the Deepfake Offensive Toolkit
Cybersecurity
AD-Attack-Defense: The Kill Chain Map for Active Directory Security Operations
Cybersecurity
gau: Mining Four Internet Archives at Once for Security Reconnaissance
Cybersecurity
Hakrawler: The Unix Philosophy Applied to Web Reconnaissance
Cybersecurity
Testing LLM Agents Before They Hallucinate in Production: Inside Giskard's Component-Level Evaluation
Cybersecurity
KingOfBugBountyTips: The Bug Hunter's Command Arsenal That's Not Actually Software
Cybersecurity
PMD: Building Multi-Language Static Analysis with AST Traversal and XPath Rules
Cybersecurity
Can I Take Over XYZ: The Crowdsourced Database Preventing Subdomain Takeover Blind Spots
Cybersecurity
Commix: Automating Command Injection Exploitation in Modern Web Applications
Cybersecurity
Hound: Why Trigram Indexing Makes Code Search 100x Faster Than grep
Cybersecurity
Building Adversarially Robust ML Systems with ART: A Framework-Agnostic Security Toolkit
Cybersecurity
KeyHacks: The Bug Bounty Hunter's Cheat Sheet for API Key Validation
Cybersecurity
Inside K8tools: A Chinese Red Team's Arsenal of Windows Exploits and Web Attack Vectors
Cybersecurity
MISP: Building a Distributed Threat Intelligence Platform with Automatic Correlation
Cybersecurity