linx – Reveals invisible links within JavaScript files
submitted by /u/rjz4 [link] [comments]
Richard Melick: Finding the right pattern to solve the problem. [Threat reporting] [Career Notes]
Richard Melick, Director of Threat Reporting for Zimperium, talks about his journey, from working in the military to moving up to the big screens. He shares that he’s been in…
teler v2.0 RC releases: Real-time HTTP Intrusion Detection
teler teler is a real-time http intrusion detection and threat alert based on a weblog that runs in a terminal with resources that we collect and provide by the community. Features…
IPED Digital Forensic Tool v4.0 beta releases
IPED Digital Forensic Tool IPED is open-source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate…
pip-audit v2.3.4 releases: scanning Python environments for packages with known vulnerabilities
pip-audit pip-audit is a tool for scanning Python environments for packages with known vulnerabilities. It uses the Python Packaging Advisory Database via the PyPI JSON API as a source of vulnerability reports. This…
grype v0.40.1 releases: vulnerability scanner for container images and filesystems
grype A vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Features Scan the contents of a container image or filesystem to find known vulnerabilities. Find…
DNS tool v1.0.2 releases: display information about your domain
dt DNS tool that displays information about your domain. Features common records scanning (use -scan) validate DNSSEC chain (use -debug to see more info) change query speed for scanning (default…
safety v2.0b5 releases: checks your installed dependencies for known security vulnerabilities
Safety is a command-line tool. Use it to check your local virtual environment, your requirement files, or any input from stdin for dependencies with security issues. If you are using…
CDK v1.2 releases: open-sourced container penetration toolkit
CDK – Zero Dependency Container Penetration Toolkit CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS dependency. It comes with…
Mythic v2.3.9 releases: collaborative, multi-platform, red teaming framework
Mythic Mythic is a multiplayer, command, and control platform for red teaming operations. It is designed to facilitate a plug-n-play architecture where new agents, communication channels, and modifications can happen…