Cybersecurity
215 articles
Cybersecurity
Prowler: Building a Multi-Cloud Security Scanner That Maps 1000+ Checks to 40+ Compliance Frameworks
Cybersecurity
Gobuster: Go's Answer to Web Enumeration Performance Bottlenecks
Cybersecurity
dirsearch: How Smart Extension Handling Makes Path Discovery Actually Useful
Cybersecurity
Inside the 600+ Tool Catalog That Maps the Entire Static Analysis Ecosystem
Cybersecurity
Wifiphisher: Building a Rogue Access Point Framework for Wi-Fi Red Team Operations
Cybersecurity
lsd: How Rust Reimagined the 40-Year-Old ls Command with Icons and Performance
Cybersecurity
ffuf: How Go's Concurrency Model Makes Web Fuzzing 10x Faster
Cybersecurity
transfer.sh: Building a Command-Line File Sharing Service with Pluggable Storage
Cybersecurity
SpiderFoot: Building an OSINT Pipeline with 200+ Interconnected Intelligence Modules
Cybersecurity
Promptfoo: The Red Team Framework That Treats LLM Security Like Real Pentesting
Cybersecurity
SWE-agent: Teaching Language Models to Fix Their Own Code (And Why 100 Lines Now Beat 10,000)
Cybersecurity
Vulhub: How Docker Compose Became the Swiss Army Knife of Vulnerability Research
Cybersecurity
Jaeger: Building Production-Grade Distributed Tracing with OpenTelemetry
Cybersecurity
Glow: How Charm Built a Markdown Reader That Feels Like a Native Terminal App
Cybersecurity
TruffleHog: The Secrets Scanner That Actually Calls Your APIs
Cybersecurity
Nuclei: How YAML Templates Turned Vulnerability Scanning Into a Community Sport
Cybersecurity
Novu: Building Multi-Channel Notification Infrastructure Without the Vendor Lock-In
Cybersecurity
SecLists: The 69,000-Star Wordlist Repository That Ships with Kali Linux
Cybersecurity
Sherlock: How to Query 400+ Social Networks With a Single Command
Cybersecurity
PayloadsAllTheThings: The 76K-Star Penetration Testing Encyclopedia You're Already Using
Cybersecurity
nur: Privacy-Preserving Threat Intelligence Through Cryptographic Commitments
Cybersecurity
CyberStrike: Turning ChatGPT Into a Penetration Testing Framework
Cybersecurity
Building a Prompt-Injection-Proof AI Judge with Dual-LLM Privilege Separation
Cybersecurity