
Introducting bruter - Customizable BruteForce Framework
Introducing bruter: 55 protocols, scan file auto-detection, embedded bad SSH keys, and a module interface so simple you can add a new protocol in 50 lines.

Introducing bruter: 55 protocols, scan file auto-detection, embedded bad SSH keys, and a module interface so simple you can add a new protocol in 50 lines.

Your AI assistant has access to your files, your messages, your shell. Here's how to make sure nobody else does.
Major update to leaker - from 2 to 9 sources, new search types, JSONL output, and many quality-of-life improvements.
Introducing a new tool to find and enumerate public leaks via passive sources.
My vision on describing and categorizing types of offensive security services with notes of when each category should be used.
Several considerations on market shift from classic security research to red teaming everything.
Exploring several ways to abuse NetNTLMv1 in corporate networks.

My thoughts about obtaining a bachelor's degree and my future plans.

Introducing a new tool to find and enumerate SMB shares in networks and Active Directory domains.
Alternative to scanning methods to achieve network, host and port identification. This post covers Active Directory domains and Kubernetes clusters.