Author: ddos

execute complete pentesting

rekono: Execute complete pentesting processes

Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. The findings obtained during the executions will be sent to the user via email...

risky open-source software packages

packj: detect malicious/risky open-source software packages

Packj flags malicious/risky open-source packages Packj (pronounced package) is a command-line (CLI) tool to vet open-source software packages for “risky” attributes that make them vulnerable to supply chain attacks. This is the tool behind...

Tails OS

Tails 6.18 Unveiled: New WebTunnel Bridges Bypass Internet Censorship

The Tails project has released a new version of its security- and privacy-focused operating system. Update 6.18 introduces a significant enhancement that enables users to circumvent internet censorship—even in the most heavily monitored regions....

REST API fuzzing tool

restler-fuzzer: first stateful REST API fuzzing tool

RESTler What is RESTler? RESTler is the first stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services. For a given cloud service...