<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>security</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/11/feed"/>
    <updated>2026-05-23T17:29:55+00:00</updated>
    <id>https://links.biapy.com/guest/tags/11/feed</id>
            <entry>
            <id>https://links.biapy.com/links/12804</id>
            <title type="text"><![CDATA[DockSec]]></title>
            <link rel="alternate" href="https://github.com/OWASP/DockSec" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12804"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AI-Powered Docker Security Analyzer.

AI-powered Docker security scanner that explains vulnerabilities in plain English]]>
            </summary>
            <updated>2026-05-21T11:59:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12803</id>
            <title type="text"><![CDATA[EventHawk]]></title>
            <link rel="alternate" href="https://github.com/Mihir-Choudhary/EventHawk" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12803"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Windows EVTX log analysis for DFIR — fast parsing, ATT&amp;amp;CK mapping, IOC extraction, and Sentinel anomaly detection. Normal + Juggernaut Mode (Arrow/DuckDB) for 10M+ events.]]>
            </summary>
            <updated>2026-05-21T11:58:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12802</id>
            <title type="text"><![CDATA[VanGuard]]></title>
            <link rel="alternate" href="https://github.com/ridgelinecyberdefence/vanguard" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12802"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Enterprise Incident Response Toolkit.

 Cross-platform incident response toolkit. 28 pre-built use cases, single binary, zero install. Memory, disk, network, and cloud collection with automated timeline generation. 

Cross-platform DFIR toolkit for enterprise incident response. Velociraptor-native, air-gap compatible, portable — no installation required.

VanGuard is a self-contained incident response toolkit built in Go that gives DFIR teams a single binary for triage, threat hunting, memory forensics, disk collection, remote operations, and Velociraptor management — on both Windows and Linux, with or without network access.]]>
            </summary>
            <updated>2026-05-21T11:57:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12800</id>
            <title type="text"><![CDATA[🧿 Entra CA Insight]]></title>
            <link rel="alternate" href="https://github.com/emiliensocchi/entra-ca-insight" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12800"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Discover gaps in Entra Conditional Access policies before attackers do.]]>
            </summary>
            <updated>2026-05-21T11:53:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12794</id>
            <title type="text"><![CDATA[ShadowBroker]]></title>
            <link rel="alternate" href="https://github.com/BigBodyCobain/Shadowbroker" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12794"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Global Threat Intercept — Real-Time Geospatial Intelligence Platform.

 Open-source intelligence for the global theater. Track everything from the corporate/private jets of the wealthy, and spy satellites, to seismic events in one unified interface. Hook an AI agent up to have it parse through data and find previously unseen correlations. The knowledge is available to all but rarely aggregated in the open, until now. 

Related contents:

- [ShadowBroker - Une salle de crise OSINT mondiale chez vous @ Korben :fr:](https://korben.info/shadowbroker-osint-temps-reel.html).]]>
            </summary>
            <updated>2026-05-20T06:52:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12785</id>
            <title type="text"><![CDATA[ModuleJail]]></title>
            <link rel="alternate" href="https://github.com/jnuyens/modulejail/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12785"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Proactively shrink a Linux host&amp;#039;s kernel-module attack surface by blacklisting every module not currently in use. 

A single POSIX shell script that shrinks a Linux host&amp;#039;s kernel-module attack surface by writing a modprobe.d blacklist for every kernel module not currently in use, minus a built-in baseline and an optional sysadmin whitelist. No daemons, no initramfs changes, no AI inside the tool. One script, one run, one blacklist file.

Related contents:

- [ModuleJail - Bloquer les modules kernel Linux inutilisés @ Korben :fr:](https://korben.info/modulejail-blacklist-modules-kernel-linux-inutilises.html).]]>
            </summary>
            <updated>2026-05-18T10:23:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12779</id>
            <title type="text"><![CDATA[RedAI]]></title>
            <link rel="alternate" href="https://github.com/kpolley/redai" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12779"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AI-driven vulnerability discovery and live validation.

A terminal workbench for AI-driven vulnerability discovery and live validation.]]>
            </summary>
            <updated>2026-05-15T15:26:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12776</id>
            <title type="text"><![CDATA[Superserve]]></title>
            <link rel="alternate" href="https://www.superserve.ai/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12776"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Persistent &amp;amp; Secure sandboxes for AI agents.

Give your agents lightning-fast sandboxes with persistent state and versioned filesystems.

- [Superserve @ GitHub](https://github.com/superserve-ai/superserve).]]>
            </summary>
            <updated>2026-05-15T15:14:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12765</id>
            <title type="text"><![CDATA[Sn1per]]></title>
            <link rel="alternate" href="https://sn1persecurity.com/wordpress/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12765"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The offensive-security platform for modern teams.

Recon, scanning, exploitation, and reporting in a single workspace — whether you&amp;#039;re a solo pentester or a global SOC. 

- [Sn1per @ GitHub](https://github.com/1N3/Sn1per).]]>
            </summary>
            <updated>2026-05-15T13:24:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12735</id>
            <title type="text"><![CDATA[azure-iam-enum]]></title>
            <link rel="alternate" href="https://github.com/ReversecLabs/azure-iam-enum" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12735"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Enumerate Azure RBAC and Microsoft Entra ID permissions for Entra ID groups, service principals, and users.]]>
            </summary>
            <updated>2026-05-14T21:21:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12724</id>
            <title type="text"><![CDATA[Project Hummingbird]]></title>
            <link rel="alternate" href="https://gitlab.com/redhat/hummingbird/containers" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12724"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Project Hummingbird builds a collection of minimal, hardened, and secure container images with a significantly reduced attack surface. This strong focus on security combined with a highly automated update workflow aims to minimize CVE counts, targeting near-zero vulnerabilities. All images support amd64 and arm64 architectures.

Related contents:

- [Fedora Hummingbird brings the container security model to a Linux host OS @ Help Net Security](https://www.helpnetsecurity.com/2026/05/13/fedora-hummingbird-linux/).]]>
            </summary>
            <updated>2026-05-14T20:05:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12721</id>
            <title type="text"><![CDATA[Deepsec]]></title>
            <link rel="alternate" href="https://github.com/vercel-labs/deepsec/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12721"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Deepsec is a security harness for finding vulnerabilities in your codebase powered by coding agents.

deepsec an agent-powered vulnerability scanner that you can run in your own infrastructure, optimized to perform on-demand review of all code in existing large-scale repos.

Related contents:

- [Introducing deepsec: The security harness for finding vulnerabilities in your codebase @ Vercel](https://vercel.com/blog/introducing-deepsec-find-and-fix-vulnerabilities-in-your-code-base).
- [Vercel’s deepsec Brings AI-Powered Security Scanning Into the Development Workflow @ devops.com](https://devops.com/vercels-deepsec-brings-ai-powered-security-scanning-into-the-development-workflow/).]]>
            </summary>
            <updated>2026-05-15T08:00:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12705</id>
            <title type="text"><![CDATA[Rustinel]]></title>
            <link rel="alternate" href="https://karib0u.github.io/rustinel/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12705"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Rustinel is an open-source endpoint detection project for Windows and Linux.

It collects native host telemetry using ETW on Windows and eBPF on Linux, normalizes events into a shared model, evaluates Sigma, YARA, and IOC detections, and writes alerts as ECS NDJSON.

Rustinel is designed for blue teams, detection engineers, researchers, and anyone who wants a transparent endpoint detection engine they can inspect, run, test, and extend.

- [Rustinel @ GitHub](https://github.com/Karib0u/rustinel).]]>
            </summary>
            <updated>2026-05-14T14:18:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12703</id>
            <title type="text"><![CDATA[Dependency Cooldowns]]></title>
            <link rel="alternate" href="https://cooldowns.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12703"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🛡️ Dependency cooldowns are cool! 

- [Dependency Cooldowns @ GitHub](https://github.com/mprpic/cooldowns).]]>
            </summary>
            <updated>2026-05-14T14:15:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12699</id>
            <title type="text"><![CDATA[Pipelock]]></title>
            <link rel="alternate" href="https://pipelab.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12699"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open-source agent firewall for MCP and AI agent egress

Pipelock enforces MCP, HTTP, and WebSocket egress at the network boundary and produces verifiable audit evidence for every inspected action.

- [Pipelock @ GitHub](https://github.com/luckyPipewrench/pipelock).

Related contents:

- [Pipelock: Open-source AI agent firewall @ Help Net Security](https://www.helpnetsecurity.com/2026/05/04/pipelock-open-source-ai-agent-firewall/).]]>
            </summary>
            <updated>2026-05-14T10:37:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12689</id>
            <title type="text"><![CDATA[GTFOBins]]></title>
            <link rel="alternate" href="https://gtfobins.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12689"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.

The project collects legitimate functions of Unix-like executables that can be abused to get the f**k break out restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate other post-exploitation tasks.

- [GTFOBins @ GitHub](https://github.com/GTFOBins/GTFOBins.github.io).

Related contents:

- [GTFOBins - 478 binaires Unix qui font tomber root @ Korben :fr:](https://korben.info/gtfobins-binaires-unix-escalade-privileges.html).]]>
            </summary>
            <updated>2026-05-14T09:09:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12662</id>
            <title type="text"><![CDATA[MSSQLHound]]></title>
            <link rel="alternate" href="https://github.com/SpecterOps/MSSQLHound" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12662"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Go (formerly PowerShell) collector for adding MSSQL attack paths to BloodHound with OpenGraph.

A collector for adding MSSQL attack paths to BloodHound with OpenGraph by Chris Thompson at SpecterOps. Available as both a PowerShell script and a cross-platform Go binary (with concurrent collection, SOCKS5 proxy support, and streaming output).

Related contents:

- [MSSQLHound Now Available in Go @ SpecterOps](https://specterops.io/blog/2026/04/23/mssqlhound-now-available-in-go/).]]>
            </summary>
            <updated>2026-04-30T11:27:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12658</id>
            <title type="text"><![CDATA[claude-red]]></title>
            <link rel="alternate" href="https://github.com/SnailSploit/Claude-Red" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12658"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a specific attack surface — from SQLi to shellcode, EDR evasion to exploit development.]]>
            </summary>
            <updated>2026-04-30T11:21:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12657</id>
            <title type="text"><![CDATA[SmokedMeat]]></title>
            <link rel="alternate" href="https://github.com/boostsecurityio/smokedmeat" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12657"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A CI/CD Red Team Framework for demonstrating Build Pipeline security risks. 

SmokedMeat is a post-exploitation framework for CI/CD pipelines. Point it at a GitHub organization, let it find vulnerable workflows, deploy an implant to a compromised runner, then pivot through cloud providers, extract secrets, and map the blast radius - all from a terminal UI.

Related contents:

- [SmokedMeat: A Red Team Tool to Hack Your Pipelines First @ Boost Security Labs](https://labs.boostsecurity.io/articles/introducing-smokedmeat/).]]>
            </summary>
            <updated>2026-04-30T11:21:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12656</id>
            <title type="text"><![CDATA[Fork Commit Detector]]></title>
            <link rel="alternate" href="https://ramimac.me/imposter/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12656"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Detect potential imposter commits in GitHub repositories]]>
            </summary>
            <updated>2026-04-30T11:19:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12655</id>
            <title type="text"><![CDATA[GitHub Token Tester]]></title>
            <link rel="alternate" href="https://github.com/thomaspreece/GitHub-Token-Tester" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12655"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Got a GitHub token (PAT, App, OAuth) and want to figure out what permissions it has? This repo solves this by allowing you to test and validate the different types of GitHub token..]]>
            </summary>
            <updated>2026-04-30T11:18:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12654</id>
            <title type="text"><![CDATA[Pike Agent]]></title>
            <link rel="alternate" href="https://github.com/synacktiv/pike-agent" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12654"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Experimental Linux strace LLM agent.

pike-agent records and analyzes how programs behave on Linux. It traces a program&amp;#039;s activity, indexes it into a database, and lets you chat with an LLM agent about it in a TUI.

Related contents:

- [Dites bonjour à Pike! @ Synacktiv :fr:](https://www.synacktiv.com/publications/dites-bonjour-a-pike).]]>
            </summary>
            <updated>2026-04-30T11:18:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12649</id>
            <title type="text"><![CDATA[Package Manager Guard (PMG)]]></title>
            <link rel="alternate" href="https://github.com/safedep/pmg" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12649"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PMG protects developers, AI agents from malicious open source packages using proxy, sandbox and SafeDep&amp;#039;s threat intelligence feed. 

PMG intercepts every package install and checks it for malware before code executes. Install it once, and every npm install, pip install, and poetry add is protected automatically.]]>
            </summary>
            <updated>2026-04-29T14:21:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12648</id>
            <title type="text"><![CDATA[ClawSec]]></title>
            <link rel="alternate" href="https://prompt.security/clawsec" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12648"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A complete security skill suite for OpenClaw&amp;#039;s and NanoClaw agents (and variants). Protect your SOUL.md (etc&amp;#039;) with drift detection, live security recommendations, automated audits, and skill integrity verification. All from one installable suite. 

- [ClawSec @ GitHub](https://github.com/prompt-security/clawsec).]]>
            </summary>
            <updated>2026-04-29T14:19:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12620</id>
            <title type="text"><![CDATA[CrabTrap]]></title>
            <link rel="alternate" href="https://www.brex.com/crabtrap" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12620"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An LLM-as-a-judge HTTP proxy to secure agents in production .

Deploy agents. Safely.
CrabTrap is an LLM-as-a-judge HTTP proxy to secure agents in production. It intercepts every request your AI agent makes, evaluates it against a policy, and allows or blocks it in real time.

- [CrabTrap @ GitHub](https://github.com/brexhq/CrabTrap).]]>
            </summary>
            <updated>2026-04-24T13:42:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12611</id>
            <title type="text"><![CDATA[HasAIbeenPwned]]></title>
            <link rel="alternate" href="https://hasaibeenpwned.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12611"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AI Model Security Database.

Track jailbreaks, prompt injections, and security incidents across all major AI models. The question is not if - it&amp;#039;s when.]]>
            </summary>
            <updated>2026-04-23T13:56:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12609</id>
            <title type="text"><![CDATA[YARA Rule Skill (Community Edition)]]></title>
            <link rel="alternate" href="https://github.com/YARAHQ/yara-rule-skill" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12609"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[LLM Agent Skill for YARA rule authoring and review.

An LLM Agent Skill for expert YARA rule authoring, review, and optimization. Embeds industry best practices from the creator of YARA-Forge and yaraQA into your AI assistant&amp;#039;s context.]]>
            </summary>
            <updated>2026-04-23T13:54:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12608</id>
            <title type="text"><![CDATA[Clauditor]]></title>
            <link rel="alternate" href="https://github.com/gabrielsoltz/clauditor" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12608"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security configuration scanner for Claude Code.

Clauditor audits your Claude Code settings and repository configuration to detect security misconfigurations.]]>
            </summary>
            <updated>2026-04-23T13:53:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12601</id>
            <title type="text"><![CDATA[SignPath Foundation]]></title>
            <link rel="alternate" href="https://signpath.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12601"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free Code Signing for Open Source software

No more installation warnings. SignPath Foundation provides you with a code signing certificate that provides a clear link between your repository and the published binary.]]>
            </summary>
            <updated>2026-04-22T13:49:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12557</id>
            <title type="text"><![CDATA[malware-check]]></title>
            <link rel="alternate" href="https://github.com/momenbasel/malware-check" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12557"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Static and dynamic analysis tool for detecting malicious code, suspicious binaries, and privacy violations.

Static and dynamic analysis tool for detecting malicious code, suspicious binaries, and privacy violations. Analyzes source code, compiled executables (.exe, .dll, .elf), macOS bundles (.app, .dmg, .pkg), mobile apps (.apk, .ipa), and application packages with YARA rules, Docker behavioral sandboxing, MobSF mobile analysis, payload deobfuscation, and multi-format reporting (JSON, HTML, SARIF).

Related contents:

- [\#72 - Microsoft et Adobe corrigent une vulnérabilité déjà exploitée @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-72-microsoft-et-adobe-corrigent-une-vuln-rabilit-d-j-exploit-e).]]>
            </summary>
            <updated>2026-04-16T11:43:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12555</id>
            <title type="text"><![CDATA[Dev Machine Guard]]></title>
            <link rel="alternate" href="https://github.com/step-security/dev-machine-guard" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12555"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Scan your dev machine for AI agents, MCP servers, IDE extensions, and suspicious packages - in seconds. 

Developer machines are the new attack surface. They hold high-value assets — GitHub tokens, cloud credentials, SSH keys — and routinely execute untrusted code through dependencies and AI-powered tools. Recent supply chain attacks have shown that malicious VS Code extensions can steal credentials, rogue MCP servers can access your codebase, and compromised npm packages can exfiltrate secrets.

Related contents:

- [\#72 - Microsoft et Adobe corrigent une vulnérabilité déjà exploitée @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-72-microsoft-et-adobe-corrigent-une-vuln-rabilit-d-j-exploit-e).]]>
            </summary>
            <updated>2026-04-16T11:40:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12554</id>
            <title type="text"><![CDATA[Supply Chain Monitor]]></title>
            <link rel="alternate" href="https://github.com/elastic/supply-chain-monitor" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12554"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automated monitoring of the top PyPI and npm packages for supply chain compromise. Polls both registries for new releases, diffs each release against its predecessor, and uses an LLM (via Cursor Agent CLI) to classify diffs as benign or malicious. Malicious findings trigger a Slack alert.

Related contents:

- [\#72 - Microsoft et Adobe corrigent une vulnérabilité déjà exploitée @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-72-microsoft-et-adobe-corrigent-une-vuln-rabilit-d-j-exploit-e).]]>
            </summary>
            <updated>2026-04-16T11:38:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12552</id>
            <title type="text"><![CDATA[aws-preflight]]></title>
            <link rel="alternate" href="https://github.com/gabrielPav/aws-preflight" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12552"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Check your AWS CLI commands for security risks before you run them. 

Security linter for AWS CLI commands. Catches misconfigurations before they hit your cloud.

703 security checks across 91 AWS services. Findings include severity ratings and a remediated command.

Related contents:

- [\#72 - Microsoft et Adobe corrigent une vulnérabilité déjà exploitée @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-72-microsoft-et-adobe-corrigent-une-vuln-rabilit-d-j-exploit-e).]]>
            </summary>
            <updated>2026-04-16T11:35:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12551</id>
            <title type="text"><![CDATA[MITRE Fight Fraud Framework™ (F3)]]></title>
            <link rel="alternate" href="https://ctid.mitre.org/fraud#/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12551"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The MITRE Fight Fraud Framework™ (F3) is a curated knowledge base of tactics and techniques used by financial fraud actors, derived from real-world observations of cyber fraud incidents. The framework includes behaviors that characterize known fraud TTPs and references existing MITRE ATT&amp;amp;CK® cyber techniques as applicable to financial fraud. F3 provides a common structure and taxonomy to consistently describe and enumerate the material events of a cyber fraud incident, enabling stronger collaboration on fraud prevention, detection, and response across organizational teams. The knowledge base is globally accessible, open, and available at no charge to any person or organization.

Related contents:

- [\#72 - Microsoft et Adobe corrigent une vulnérabilité déjà exploitée @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-72-microsoft-et-adobe-corrigent-une-vuln-rabilit-d-j-exploit-e).]]>
            </summary>
            <updated>2026-04-16T11:31:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12550</id>
            <title type="text"><![CDATA[Disable JavaScript]]></title>
            <link rel="alternate" href="https://disable-javascript.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12550"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[How to disable JavaScript in your browser.

Nowadays almost all web pages contain JavaScript, a scripting programming language that runs arbitrary code, through the web browser, on the visitor&amp;#039;s computer. It is supposed to make web pages functional for specific purposes but it has proven its potential to cause significant harm to users time and time again:]]>
            </summary>
            <updated>2026-04-16T08:58:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12533</id>
            <title type="text"><![CDATA[Datadog SAIST]]></title>
            <link rel="alternate" href="https://github.com/dataDog/datadog-saist" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12533"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Datadog Static AI Security Testing (SAIST) tool.

Code Security scans your first-party code and open source libraries used in your applications in both your repositories and running services, providing end-to-end visibility from development to production. 

Related contents:

- [Introducing our open source AI-native SAST @ Datadog](https://www.datadoghq.com/blog/open-source-ai-sast/).]]>
            </summary>
            <updated>2026-04-13T11:51:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12525</id>
            <title type="text"><![CDATA[Awesome npm Security Best Practices]]></title>
            <link rel="alternate" href="https://github.com/lirantal/npm-security-best-practices" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12525"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Collection of npm package manager Security Best Practices.

 Shai-Hulud, Nx and other incidents are a growing concern of supply chain security attacks and compromised npm packages. Follow these developer security best practices around npm, package maintenance and secure local development to mitigate security risks.]]>
            </summary>
            <updated>2026-04-13T04:08:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12512</id>
            <title type="text"><![CDATA[hadrian]]></title>
            <link rel="alternate" href="https://github.com/praetorian-inc/hadrian" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12512"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open-Source API Security Testing Framework.

API security testing framework for REST, GraphQL, and gRPC that validates authorization logic using role-based testing and YAML-driven templates.

Hadrian is an open-source API security testing framework that detects OWASP API Top 10 vulnerabilities in REST, GraphQL, and gRPC APIs. It uses role-based authorization testing and YAML-driven templates to automatically find broken object-level authorization (BOLA), broken function-level authorization (BFLA), broken authentication, and other critical API security flaws — without writing custom test code.]]>
            </summary>
            <updated>2026-04-10T11:34:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12480</id>
            <title type="text"><![CDATA[Agent Governance Toolkit]]></title>
            <link rel="alternate" href="https://github.com/microsoft/agent-governance-toolkit" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12480"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AI Agent Governance Toolkit — Policy enforcement, zero-trust identity, execution sandboxing, and reliability engineering for autonomous AI agents. Covers 10/10 OWASP Agentic Top 10. 

Runtime governance for AI agents — the only toolkit covering all 10 OWASP Agentic risks with 9,500+ tests. Governs what agents do, not just what they say — deterministic policy enforcement, zero-trust identity, execution sandboxing, and SRE — Python · TypeScript · .NET · Rust · Go

Related contents:

- [Introducing the Agent Governance Toolkit: Open-source runtime security for AI agents @ Microsoft Open Source Blog](https://opensource.microsoft.com/blog/2026/04/02/introducing-the-agent-governance-toolkit-open-source-runtime-security-for-ai-agents/).
- [Microsoft&amp;#039;s Newest Open-Source Project: Runtime Security For AI Agents @ Phoronix](https://www.phoronix.com/news/Microsoft-AI-Agent-Governance).
- [Episode 661: Sink Your Claws In @ Linux Unplugged](https://linuxunplugged.com/661).]]>
            </summary>
            <updated>2026-04-09T06:18:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12465</id>
            <title type="text"><![CDATA[gVisor]]></title>
            <link rel="alternate" href="https://gvisor.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12465"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Container Security Platform.
 Application Kernel for Containers.

gVisor provides a strong layer of isolation between running applications and the host operating system. It is an application kernel that implements a Linux-like interface. Unlike Linux, it is written in a memory-safe language (Go) and runs in userspace.

gVisor includes an Open Container Initiative (OCI) runtime called runsc that makes it easy to work with existing container tooling. The runsc runtime integrates with Docker and Kubernetes, making it simple to run sandboxed containers.

- [gVisor @ GitHub](https://github.com/google/gvisor).]]>
            </summary>
            <updated>2026-04-08T14:31:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12461</id>
            <title type="text"><![CDATA[Hazmat]]></title>
            <link rel="alternate" href="https://github.com/dredozubov/hazmat" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12461"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Full autonomy. Controlled environment.
OS-level containment for AI coding agents on macOS.

 macOS containment for AI agents — user isolation, kernel sandbox, pf firewall, DNS blocklist, backup/rollback. TLA+ verified.

AI coding agents are most useful when you let them work autonomously. But full autonomy means the agent runs with your full privileges, your credentials, your files.

Hazmat makes that safe.

Related contents:

- [Hazmat - Vos agents IA en cage sous macOS @ Korben :fr:](https://korben.info/hazmat-sandbox-macos-agents-ia.html).]]>
            </summary>
            <updated>2026-04-13T09:17:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12458</id>
            <title type="text"><![CDATA[Open Cybersecurity Schema Framework (OCSF)]]></title>
            <link rel="alternate" href="https://ocsf.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12458"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Open Cybersecurity Schema Framework (OCSF) is an open standard for cybersecurity event logging and data normalization. The framework is made up of a set of categories, event classes, data types, and an attribute dictionary. It is not restricted to cybersecurity nor to events, however the initial focus of the framework has been a schema for cybersecurity events.

- [Open Cybersecurity Schema Framework @ GitHub](https://github.com/ocsf/ocsf-schema).

Related contents:

- [OCSF explained: The shared data language security teams have been missing @ Venture Beat](https://venturebeat.com/security/ocsf-explained-the-shared-data-language-security-teams-have-been-missing).
- [What is OCSF and How Do You Implement It? @ Datadog](https://www.datadoghq.com/knowledge-center/ocsf/).]]>
            </summary>
            <updated>2026-04-08T06:10:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12396</id>
            <title type="text"><![CDATA[JamfHound]]></title>
            <link rel="alternate" href="https://github.com/SpecterOps/JamfHound" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12396"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by outputting data as JSON for ingestion into BloodHound. 

Related contents:

- [JamfHound v1.1 Update: SSO Attack Paths and Okta Additions @ Specter OPS](https://specterops.io/blog/2026/03/31/jamfhound-v1-1-update-sso-attack-paths-and-okta-additions/).]]>
            </summary>
            <updated>2026-04-03T13:50:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12394</id>
            <title type="text"><![CDATA[IAMTrail]]></title>
            <link rel="alternate" href="https://iamtrail.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12394"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AWS silently updates Managed IAM policies all the time.
We catch every single change.

- [IAMTrail @ GitHub](https://github.com/zoph-io/IAMTrail).]]>
            </summary>
            <updated>2026-04-03T13:28:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12393</id>
            <title type="text"><![CDATA[VICE]]></title>
            <link rel="alternate" href="https://github.com/Webba-Creative-Technologies/vice" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12393"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security auditing CLI for web applications.

VICE is a security auditing CLI tool that finds vulnerabilities in your web applications. It has two modes:

Remote scan gives it a URL. It crawls your site with a real browser, extracts secrets from JS bundles, tests your login for brute force and SQL injection, scans your VPS ports, checks your Supabase RLS, and more. Like an attacker would, but on your own systems.

Local audit points it at your project directory. It reads your source code, checks your .env files, runs npm audit, analyzes your Supabase migrations for missing RLS, finds SQL injections and XSS in your code, and tells you exactly what to fix.]]>
            </summary>
            <updated>2026-04-03T13:26:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12392</id>
            <title type="text"><![CDATA[DefenseClaw]]></title>
            <link rel="alternate" href="https://cisco-ai-defense.github.io/docs/defenseclaw" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12392"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Enterprise governance for AI agents — scan, enforce, and audit every skill, MCP server, and plugin before it runs.

DefenseClaw is the enterprise governance layer for OpenClaw. It sits between your AI agents and the infrastructure they run on, enforcing a simple principle: nothing runs until it&amp;#039;s scanned, and anything dangerous is blocked automatically.

 - [DefenseClaw @ GitHub](https://github.com/cisco-ai-defense/defenseclaw).]]>
            </summary>
            <updated>2026-04-03T13:25:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12381</id>
            <title type="text"><![CDATA[FFLSLS — Fédération Française de lecture sportive de logs serveurs]]></title>
            <link rel="alternate" href="https://fflsls.fr/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12381"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Organisation fédérant les pratiquants de la lecture sportive de journaux serveurs bruts, dans l&amp;#039;optique d&amp;#039;inscrire le sport comme discipline officielle aux Jeux Olympiques.

Organization uniting practitioners of sportive reading of raw server logs, with a view to registering the sport as an official discipline to the Olympic Games.]]>
            </summary>
            <updated>2026-03-30T19:30:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12377</id>
            <title type="text"><![CDATA[jai]]></title>
            <link rel="alternate" href="https://jai.scs.stanford.edu/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12377"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Go hard on agents, not on your filesystem.
easy containment for AI agents.

Use jai for effortless containment of AI agents on Linux.
jai strives to be the easiest container in the world to configure--so easy that you never again need to run a code assistant without protection. It&amp;#039;s not a substitute for docker or podman when you need better isolation. But if you regularly do risky things like run an AI CLI with your own privileges in your home directory on a computer that you care about, then jai could reduce the damage when things go wrong.

- [jai @ GitHub](https://github.com/stanford-scs/jai).]]>
            </summary>
            <updated>2026-03-30T18:50:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12356</id>
            <title type="text"><![CDATA[Heddle]]></title>
            <link rel="alternate" href="https://github.com/goweft/heddle" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12356"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The policy-and-trust layer for MCP tool servers. Turn YAML configs into validated, policy-enforced MCP tools. 

 Heddle turns declarative configs into Model Context Protocol servers
with trust enforcement, credential brokering, and tamper-evident audit logging built in.]]>
            </summary>
            <updated>2026-03-29T15:26:41+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12353</id>
            <title type="text"><![CDATA[layerleak]]></title>
            <link rel="alternate" href="https://github.com/Brumbelow/layerleak" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12353"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[layerleak the Docker Hub Secret Scanner.

Traditional secret scanners often treat a container image as a flat blob or depend on a local Docker daemon. This project is designed around OCI image internals]]>
            </summary>
            <updated>2026-03-28T18:07:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12335</id>
            <title type="text"><![CDATA[Anthropic Cybersecurity Skills]]></title>
            <link rel="alternate" href="https://www.mahipal.engineer/Anthropic-Cybersecurity-Skills/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12335"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[734 Cybersecurity Skills for AI Agents.
734+ AI-Ready Skills for Claude Code &amp;amp; More.

The largest open-source library of structured cybersecurity skills following the agentskills.io standard. Deploy instantly to Claude Code, GitHub Copilot, Cursor, and 26+ platforms. 

- [Anthropic Cybersecurity Skills @ GitHub](https://github.com/mukul975/Anthropic-Cybersecurity-Skills).]]>
            </summary>
            <updated>2026-03-28T11:55:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12309</id>
            <title type="text"><![CDATA[endlessh-go]]></title>
            <link rel="alternate" href="https://github.com/shizunge/endlessh-go" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12309"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A golang implementation of endlessh (SSH tarpit) exporting Prometheus metrics, visualized by a Grafana dashboard.]]>
            </summary>
            <updated>2026-03-27T21:01:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12300</id>
            <title type="text"><![CDATA[Betterleaks]]></title>
            <link rel="alternate" href="https://betterleaks.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12300"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Better Secrets Scanner. Detect Leaked API Keys &amp;amp; Credentials.
 A Better Secrets Scanner built for configurability and speed.

Betterleaks is a tool for detecting secrets like passwords, API keys, and tokens in git repos, files, and whatever else you wanna throw at it via stdin. If you wanna learn more about how the detection engine works check out this blog: [Regex is (almost) all you need](https://lookingatcomputer.substack.com/p/regex-is-almost-all-you-need).

- [Betterleaks @ GitHub](https://github.com/betterleaks/betterleaks).

Related contents:

- [Introducing Betterleaks, an open source secrets scanner by the author of Gitleaks @ aikido](https://www.aikido.dev/blog/betterleaks-gitleaks-successor).]]>
            </summary>
            <updated>2026-03-26T13:38:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12298</id>
            <title type="text"><![CDATA[CPE guesser]]></title>
            <link rel="alternate" href="https://vulnerability-lookup.github.io/cpe-guesser/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12298"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tool to guess CPE name based on common software name.

CPE Guesser is a command-line tool or web service designed to guess the CPE name based on one or more keywords. The resulting CPE can then be used with tools like cve-search or vulnerability-lookup to perform actual searches using CPE names.

- [CPE guesser @ GitHub](https://github.com/vulnerability-lookup/cpe-guesser).

Related contents:

- [cpe-guesser 2.0 released - Multi-Source CPE Imports, Better Ranking, and Greater Autonomy Beyond NVD @ Vulnerability-Lookup](https://www.vulnerability-lookup.org/2026/03/22/cpe-guesser-2.0-released/).]]>
            </summary>
            <updated>2026-03-26T13:30:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12234</id>
            <title type="text"><![CDATA[Qevlar AI]]></title>
            <link rel="alternate" href="https://www.qevlar.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12234"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Turn SOC Noise into Real Signals. Autonomous SOC Platform.

Qevlar AI investigates every alert like your top analyst would. So your SOC focuses on real threats, not alert firefighting.

Related contents:

- [Episode \#536 consacré à l’automatisation des investigations du SOC @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/automatisation-des-investigations-du-soc/).]]>
            </summary>
            <updated>2026-03-23T13:28:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12185</id>
            <title type="text"><![CDATA[Bromure]]></title>
            <link rel="alternate" href="https://github.com/rderaison/bromure" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12185"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure, ephemeral browsing in a disposable VM (macOS only).

Bromure is a native macOS app that runs every browser session inside a lightweight, disposable Linux virtual machine using Apple&amp;#039;s Virtualization.framework. The browser and your Mac don&amp;#039;t share an operating system, a filesystem, or even a kernel. When you close the window, the VM is destroyed -- cookies, history, malware, trackers, all of it. Gone.]]>
            </summary>
            <updated>2026-03-19T14:32:36+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12158</id>
            <title type="text"><![CDATA[bagel]]></title>
            <link rel="alternate" href="https://boostsecurityio.github.io/bagel/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12158"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Bagel is a cross-platform CLI that inspects developer workstations and produces a structured report of security findings. It allows developers to understand their attack surface and what could be of interest to a malicious actor.

- [bagel @ GitHub](https://github.com/boostsecurityio/bagel).

Related contents:

- [Bagel : scanner la posture sécurité de votre poste développeur @ DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/outils/bagel/).]]>
            </summary>
            <updated>2026-03-17T07:24:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12134</id>
            <title type="text"><![CDATA[Aegis]]></title>
            <link rel="alternate" href="https://aegisprotect.vercel.app/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12134"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open-source EDR for AI agents.
Monitor processes, files, network, and behavior of autonomous AI agents. 
 
Aegis is an open-source endpoint detection and response (EDR) tool that monitors AI agent processes, file access, network activity, and behavioral anomalies in real time. Built with Electron 33, Svelte 5, and TypeScript, it provides the same class of oversight for autonomous AI agents that CrowdStrike provides for traditional endpoints. No telemetry. No cloud. Everything stays local.

- [AEGIS @ GitHub](https://github.com/antropos17/Aegis).]]>
            </summary>
            <updated>2026-03-16T07:49:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12129</id>
            <title type="text"><![CDATA[Dependabot]]></title>
            <link rel="alternate" href="https://github.com/dependabot/dependabot-core" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12129"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🤖 Dependabot&amp;#039;s core logic for creating update PRs. 

Related contents:

- [Turn Dependabot Off @ Filippo Valsorda](https://words.filippo.io/dependabot/).]]>
            </summary>
            <updated>2026-03-16T07:33:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12097</id>
            <title type="text"><![CDATA[enject]]></title>
            <link rel="alternate" href="https://github.com/GreatScott/enject" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12097"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Hide .env secrets from prAIng eyes.

secrets live in local encrypted stores (per project) and are injected directly into apps at runtime, never touching disk as plaintext. 

Related contents:

- [Don’t let A.I. read your .env files @ Filip Hric](https://filiphric.com/dont-let-ai-read-your-env-files).]]>
            </summary>
            <updated>2026-03-12T11:16:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12096</id>
            <title type="text"><![CDATA[AI Best Practices — Semgrep Rules]]></title>
            <link rel="alternate" href="https://github.com/semgrep/ai-best-practices" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12096"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Semgrep Pro Rules to ensure code using LLMs is following best practices.

Semgrep rules that catch common trust &amp;amp; safety mistakes in LLM-powered applications. Scan any codebase in seconds to find hardcoded API keys, missing safety checks, prompt injection risks, and unhandled errors across all major AI providers.]]>
            </summary>
            <updated>2026-03-12T11:15:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12095</id>
            <title type="text"><![CDATA[PrivHound]]></title>
            <link rel="alternate" href="https://github.com/dazzyddos/PrivHound" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12095"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Local Privilege Escalation, as a Graph.

A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.]]>
            </summary>
            <updated>2026-03-12T11:13:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12068</id>
            <title type="text"><![CDATA[Lade]]></title>
            <link rel="alternate" href="https://github.com/zifeo/lade" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12068"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automatically load secrets from your preferred vault as environment variables or files, and clear them once your shell command is over. 

Lade (/leɪd/) is a tool allowing you to automatically load secrets from your preferred vault into environment variables or files. It limits the exposure of secrets to the time the command requiring the secrets lives.

Related contents:

- [Lade : injecter les secrets automatiquement avec des hooks shell @ DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/secrets/lade/).]]>
            </summary>
            <updated>2026-03-09T10:26:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12050</id>
            <title type="text"><![CDATA[Aikido Safe Chain]]></title>
            <link rel="alternate" href="https://www.aikido.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12050"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Unified Security Platform from Code to Runtime.

 Protect against malicious code installed via npm, yarn, pnpm, npx, and pnpx with Aikido Safe Chain. Free to use, no tokens required. 

- [Aikido Safe Chain @ GitHub](https://github.com/AikidoSec/safe-chain).]]>
            </summary>
            <updated>2026-03-09T07:21:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12049</id>
            <title type="text"><![CDATA[Threat Designer]]></title>
            <link rel="alternate" href="https://github.com/awslabs/threat-designer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12049"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design. 

Threat Designer is an AI-driven agent that automates and streamlines the threat modeling process for secure system design. Harnessing the power of large language models (LLMs), it analyzes system architectures, identifies potential security threats, and generates detailed threat models—empowering developers and security professionals to incorporate security from the earliest stages of development.]]>
            </summary>
            <updated>2026-03-09T07:19:41+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12039</id>
            <title type="text"><![CDATA[HTTP Header Security Test - HTTP Observatory]]></title>
            <link rel="alternate" href="https://developer.mozilla.org/en-US/observatory" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12039"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Launched in 2016, the HTTP Observatory enhances web security by analyzing compliance with best security practices. It has provided insights to over 6.9 million websites through 47 million scans. 

Related contents:

- [De F à A+ sur HTTP Observatory : sécuriser les headers de mon blog Hugo @ Zwindler&amp;#039;s Reflection :fr:](https://blog.zwindler.fr/2026/02/20/securite-headers-http-observatory-hugo/).]]>
            </summary>
            <updated>2026-03-06T07:26:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12023</id>
            <title type="text"><![CDATA[Gibson]]></title>
            <link rel="alternate" href="https://github.com/HackingLZ/gibson" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12023"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Network monitoring tool that maps process-to-network connections, identifies cloud providers, and detects beaconing activity. Zero-flag agent binary for deployment, aggregation server, offline ASN lookup. 

Related contents:

- [\#66 @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-66).]]>
            </summary>
            <updated>2026-03-05T12:16:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12022</id>
            <title type="text"><![CDATA[mquire]]></title>
            <link rel="alternate" href="https://github.com/trailofbits/mquire" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12022"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[mquire, a play on the memory and inquire words, is a memory querying tool inspired by osquery.

 Zero-dependency Linux memory forensics PoC — leverages kernel-embedded BTF and kallsyms for type-aware memory analysis without external debug info. 

Related contents:

- [mquire: Linux memory forensics without external dependencies @ The Trail of Bits Blog](https://blog.trailofbits.com/2026/02/25/mquire-linux-memory-forensics-without-external-dependencies/).
- [\#66 @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-66).]]>
            </summary>
            <updated>2026-03-05T12:14:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12020</id>
            <title type="text"><![CDATA[MacNoise]]></title>
            <link rel="alternate" href="https://github.com/0xv1n/macnoise" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12020"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Extensible MacOS system telemetry generator.

MacNoise is an extensible and modular macOS system telemetry generation framework. It generates real system events (network connections, file writes, process spawns, plist mutations, TCC permission probes, and more) so security teams can validate that their EDR, SIEM, and firewall tooling detects what it is supposed to detect.

Related contents:

- [Introducing MacNoise! @ 0xv1n](https://0xv1n.github.io/posts/macnoise/).
- [\#66 @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-66).]]>
            </summary>
            <updated>2026-03-05T12:11:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12019</id>
            <title type="text"><![CDATA[CredData (Credential Dataset)]]></title>
            <link rel="alternate" href="https://github.com/Samsung/CredData" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12019"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CredData (Credential Dataset) is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line.

CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can choose a proper tool among open source credential scanning tools according to their use case. We sincerely hope that CredData will help minimize credential leaks.

Related contents:

- [\#66 @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-66).]]>
            </summary>
            <updated>2026-03-05T12:10:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12018</id>
            <title type="text"><![CDATA[CredSweeper]]></title>
            <link rel="alternate" href="https://github.com/Samsung/CredSweeper" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12018"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CredSweeper is an advanced credential detection tool designed to identify exposed credentials such as passwords, API keys, tokens, and other sensitive information across source code, configuration files, documents, and binary assets. CredSweeper scans regular files, embedded data in containers, and files added in Git commits. The tool combines pattern-based detection, machine learning–based validation, and deep file inspection to deliver comprehensive and accurate security scanning for modern codebases and repositories.

Related contents:

- [\#66 @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-66).]]>
            </summary>
            <updated>2026-03-05T12:09:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12000</id>
            <title type="text"><![CDATA[ClawShield]]></title>
            <link rel="alternate" href="https://github.com/SleuthCo/clawshield-public" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12000"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security proxy for AI agents. Scans every message for prompt injection, PII, and secrets. Defense-in-depth: Go proxy + iptables firewall + eBPF kernel monitor. YAML policy engine, audit logging, 5 AI agents with RAG knowledge bases. 

Security proxy for AI agents. Sits in front of OpenClaw and scans every message for prompt injection, PII leaks, and secrets — before they reach the model or leave the network.]]>
            </summary>
            <updated>2026-03-03T13:50:07+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11968</id>
            <title type="text"><![CDATA[MCP Hammer]]></title>
            <link rel="alternate" href="https://github.com/praetorian-inc/MCPHammer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11968"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[MCP security testing framework for evaluating Model Context Protocol server vulnerabilities.

A Model Context Protocol (MCP) server built with FastMCP that provides various tools including Claude AI integration, text injection capabilities, and server information utilities. It is definitely super secure, you should definitely send confidential data through it, and definitely take everything it says as fact.

Related contents:

- [MCP Server Security: The Hidden AI Attack Surface @ Praetorian](https://www.praetorian.com/blog/mcp-server-security-the-hidden-ai-attack-surface).]]>
            </summary>
            <updated>2026-03-02T06:48:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11930</id>
            <title type="text"><![CDATA[ShipSec Studio]]></title>
            <link rel="alternate" href="https://studio.shipsec.ai/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11930"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[No-Code Security Automation Platform.
Workflow automation for Security Teams.

ShipSec Studio provides a visual DSL and runtime for building, executing, and monitoring automated security workflows. It decouples security logic from infrastructure management, providing a durable and isolated environment for running security tooling at scale.

- [ShipSec Studio @ GitHub]().]]>
            </summary>
            <updated>2026-02-26T11:17:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11929</id>
            <title type="text"><![CDATA[Titus]]></title>
            <link rel="alternate" href="https://github.com/praetorian-inc/titus" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11929"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 459 detection rules with live credential validation.]]>
            </summary>
            <updated>2026-02-26T11:16:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11928</id>
            <title type="text"><![CDATA[Caterpillar]]></title>
            <link rel="alternate" href="https://caterpillar.alice.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11928"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior.

Security scanner for AI agent skills. Scans for malicious patterns before you install.

- [Caterpillar @ GitHub](https://github.com/alice-dot-io/caterpillar).]]>
            </summary>
            <updated>2026-02-26T11:14:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11907</id>
            <title type="text"><![CDATA[Bluehood]]></title>
            <link rel="alternate" href="https://github.com/dannymcc/bluehood" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11907"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Monitor your local neighbourhood&amp;#039;s bluetooth activity.

Bluetooth Neighborhood - Track BLE devices in your area and analyze traffic patterns.

Related contents:

- [What Your Bluetooth Devices Reveal About You @ dmcc.io](https://blog.dmcc.io/journal/2026-bluetooth-privacy-bluehood/).]]>
            </summary>
            <updated>2026-02-24T07:30:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11905</id>
            <title type="text"><![CDATA[Augustus]]></title>
            <link rel="alternate" href="https://github.com/praetorian-inc/augustus" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11905"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[LLM Vulnerability Scanner.

Test large language models against 210+ adversarial attacks covering prompt injection, jailbreaks, encoding exploits, and data extraction.

Related contents:

- [Digest \#202: Terraform Claude Skills, FinOps FOCUS 1.2, AI Fatigue for Cloud Engineers, and MCP for Web Data Extraction @ DevOps Bulletin](https://www.devopsbulletin.com/p/digest-202-terraform-claude-skills).]]>
            </summary>
            <updated>2026-02-24T07:13:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11877</id>
            <title type="text"><![CDATA[Tirith]]></title>
            <link rel="alternate" href="https://github.com/sheeki03/tirith" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11877"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Your browser catches homograph attacks. Your terminal doesn&amp;#039;t. Tirith guards the gate — intercepts suspicious URLs, ANSI injection, and pipe-to-shell attacks before they execute.]]>
            </summary>
            <updated>2026-02-20T11:05:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11857</id>
            <title type="text"><![CDATA[ROADtools]]></title>
            <link rel="alternate" href="https://github.com/dirkjanm/ROADtools" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11857"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[(Rogue Office 365 and Azure (active) Directory tools)

A collection of Azure AD/Entra tools for offensive and defensive security purposes.

ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components, the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool.

Related contents:

- [STOP THE CAP: Making Entra ID Conditional Access Make Sense Offline @ SpecterOps](https://specterops.io/blog/2026/02/17/stop-the-cap-making-entra-id-conditional-access-make-sense-offline/).]]>
            </summary>
            <updated>2026-02-19T12:38:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11856</id>
            <title type="text"><![CDATA[CAPSlock]]></title>
            <link rel="alternate" href="https://github.com/rbnroot/CAPSlock" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11856"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CAPSlock is an offline Conditional Access (CA) analysis tool built on top of a roadrecon database.
It helps defenders, auditors, and red teams understand how Conditional Access policies actually behave, not just how they are configured.

Related contents:

- [STOP THE CAP: Making Entra ID Conditional Access Make Sense Offline @ SpecterOps](https://specterops.io/blog/2026/02/17/stop-the-cap-making-entra-id-conditional-access-make-sense-offline/).]]>
            </summary>
            <updated>2026-02-19T12:38:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11851</id>
            <title type="text"><![CDATA[CI/CD Cybersecurity Guide]]></title>
            <link rel="alternate" href="https://cybersecurity.cd.foundation/docs/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11851"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Implementing Open Source Security Tooling into your CI/CD Pipeline

Securing your Continuous Integration and Continuous Deployment (CI/CD) pipeline is no longer optional—it’s essential. This guide is your go-to resource for building, implementing, and optimizing secure CI/CD workflows. Whether you’re a developer, DevOps engineer, or security professional, we provide information on the open-source tools and guidance you need to model security at every stage of your pipeline. From securing code and builds to monitoring post-deployment environments, our hub empowers teams to integrate security seamlessly into their workflows without sacrificing speed or agility. Explore, learn, and transform your CI/CD processes into a fortress of innovation and resilience.

- [CI/CD Cybersecurity Guide @ GitHub](https://github.com/cdfoundation/CICD-Cybersecurity).

Related contents:

- [Blueprinting Security in CI/CD: Building Trust Through Open Source @ CD Foundation](https://cd.foundation/blog/2026/02/06/blueprinting-security/).]]>
            </summary>
            <updated>2026-02-18T13:15:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11819</id>
            <title type="text"><![CDATA[Skill Scanner]]></title>
            <link rel="alternate" href="https://github.com/cisco-ai-defense/skill-scanner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11819"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security Scanner for Agent Skills.

A security scanner for AI Agent Skills that detects prompt injection, data exfiltration, and malicious code patterns. Combines pattern-based detection (YAML + YARA), LLM-as-a-judge, and behavioral dataflow analysis for comprehensive threat detection.

Related contents:

- [Personal AI Agents like OpenClaw Are a Security Nightmare @ Cisco Blogs](https://blogs.cisco.com/ai/personal-ai-agents-like-openclaw-are-a-security-nightmare).]]>
            </summary>
            <updated>2026-02-16T06:07:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11796</id>
            <title type="text"><![CDATA[Agentic AuthZ Demo]]></title>
            <link rel="alternate" href="https://github.com/Siddhant-K-code/agentic-authz" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11796"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Fine-grained authorization for AI agents using OpenFGA. 

AI agents are getting access to production systems - databases, APIs, file systems. But who decides what they can do? Traditional RBAC wasn&amp;#039;t designed for autonomous agents that make decisions without human approval.

Related contents:

- [AI fatigue is real and nobody talks about it @ Siddhant Khare](https://siddhantkhare.com/writing/ai-fatigue-is-real).]]>
            </summary>
            <updated>2026-02-13T09:28:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11795</id>
            <title type="text"><![CDATA[OpenFGA]]></title>
            <link rel="alternate" href="https://openfga.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11795"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Fine-Grained Authorization.
 A high performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar 

Relationship-based access control made fast, scalable, and easy to use.

OpenFGA is an open-source authorization solution that allows developers to build granular access control using an easy-to-read modeling language and friendly APIs.

- [OpenFGA @ GitHub](https://github.com/openfga/openfga).

Related contents:

- [AI fatigue is real and nobody talks about it @ Siddhant Khare](https://siddhantkhare.com/writing/ai-fatigue-is-real).]]>
            </summary>
            <updated>2026-02-13T09:27:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11789</id>
            <title type="text"><![CDATA[DumpGuard]]></title>
            <link rel="alternate" href="https://github.com/bytewreck/DumpGuard" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11789"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems. 

Related contents:

- [Cracking Credential Guard with DumpGuard @ The Weekly Purple Team&amp;#039;s YouTube](https://www.youtube.com/watch?v=wCM2R6cMrkA).]]>
            </summary>
            <updated>2026-02-12T09:55:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11788</id>
            <title type="text"><![CDATA[Julius]]></title>
            <link rel="alternate" href="https://github.com/praetorian-inc/julius" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11788"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[LLM Service Fingerprinting Tool.

Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 30+ other AI services in seconds.

Julius is an LLM service fingerprinting tool for security professionals. It detects which AI server software is running on network endpoints during penetration tests, attack surface discovery, and security assessments.

Unlike model fingerprinting tools that identify which LLM generated text, Julius identifies the server infrastructure: Is that endpoint running Ollama? vLLM? LiteLLM? A Hugging Face deployment? Julius answers in seconds.

Related contents:

- [Erreur 403 | \#63 :fr:](https://newsletter.erreur403.fr/p/erreur-403-63).
- [Introducing Julius: Open Source LLM Service Fingerprinting @ Praetorian](https://www.praetorian.com/blog/introducing-julius-open-source-llm-service-fingerprinting/).]]>
            </summary>
            <updated>2026-02-12T09:36:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11787</id>
            <title type="text"><![CDATA[Burp AI Agent]]></title>
            <link rel="alternate" href="https://burp-ai-agent.six2dez.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11787"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The bridge between Burp Suite and modern AI.

Burp AI Agent is an extension for Burp Suite that integrates AI capabilities into your security workflow.

 Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more 

- [Burp AI Agent @ GitHub](https://github.com/six2dez/burp-ai-agent).

Related contents:

- [Erreur 403 | \#63 :fr:](https://newsletter.erreur403.fr/p/erreur-403-63).]]>
            </summary>
            <updated>2026-02-12T09:34:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11786</id>
            <title type="text"><![CDATA[Minimal: Hardened Container Images]]></title>
            <link rel="alternate" href="https://github.com/rtvkiz/minimal" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11786"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Minimal CVE Hardened container image collection.

A collection of production-ready container images with minimal CVEs, rebuilt daily using Chainguard&amp;#039;s apko and Wolfi packages. By including only required packages, these images maintain a reduced attack surface and typically have zero or near-zero known vulnerabilities.

Related contents:

- [Newsletter du 02 Février 2026 @ RudeOps :fr:](https://www.rudeops.com/newsletter/2026-02-02-rudeops-newsletter/).]]>
            </summary>
            <updated>2026-02-12T07:41:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11784</id>
            <title type="text"><![CDATA[SysWarden]]></title>
            <link rel="alternate" href="https://syswarden.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11784"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SysWarden is a tool based on the Data-Shield IPv4 Blocklists Community, Wazuh and Fail2ban that blocks up to 99% of noisy, disruptive, and malicious IP addresses and focuses on real signals.

- [SysWarden @ GitHub](https://github.com/duggytuxy/syswarden).

Related contents:

- [Newsletter du 02 Février 2026 @ RudeOps :fr:](https://www.rudeops.com/newsletter/2026-02-02-rudeops-newsletter/).]]>
            </summary>
            <updated>2026-03-09T07:54:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11783</id>
            <title type="text"><![CDATA[Data-Shield IPv4 Blocklist Community]]></title>
            <link rel="alternate" href="https://duggytuxy.github.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11783"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuously, this resource offers vital threat intelligence to bolster your Firewall and WAF instances,... 

- [Data‑Shield IPv4 Blocklist Community @ GitHub](https://github.com/duggytuxy/Data-Shield_IPv4_Blocklist).

Related contents:

- [Newsletter du 02 Février 2026 @ RudeOps :fr:](https://www.rudeops.com/newsletter/2026-02-02-rudeops-newsletter/).
- [Digest \#202: Terraform Claude Skills, FinOps FOCUS 1.2, AI Fatigue for Cloud Engineers, and MCP for Web Data Extraction @ DevOps Bulletin](https://www.devopsbulletin.com/p/digest-202-terraform-claude-skills).
- [Data-Shield - La blocklist qui vire les IPs pourries @ Korben :fr:](https://korben.info/data-shield-ipv4-blocklist.html).]]>
            </summary>
            <updated>2026-04-07T06:55:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11764</id>
            <title type="text"><![CDATA[Matchlock]]></title>
            <link rel="alternate" href="https://github.com/jingkaihe/matchlock" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11764"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Matchlock secures AI agent workloads with a Linux-based sandbox. 

Matchlock is a CLI tool for running AI agents in ephemeral microVMs - with network allowlisting, secret injection via MITM proxy, and VM-level isolation. Your secrets never enter the VM.]]>
            </summary>
            <updated>2026-02-09T13:08:00+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11755</id>
            <title type="text"><![CDATA[Cyberbro]]></title>
            <link rel="alternate" href="https://docs.cyberbro.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11755"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services. 

Cyberbro is an open-source threat intelligence and indicator analysis platform.
Whether you&amp;#039;re a new user or a seasoned developer, this documentation will help you get started, configure, and make the most of Cyberbro&amp;#039;s features.

- [Cyberbro @ GitHub](https://github.com/stanfrbd/cyberbro).

Related contents:

- [Cyberbro - L&amp;#039;analyse d&amp;#039;IoC facile et en open source @ Korben :fr:](https://korben.info/cyberbro-analyse-ioc-osint.html).
- [Erreur 403 | \#63 :fr:](https://newsletter.erreur403.fr/p/erreur-403-63).]]>
            </summary>
            <updated>2026-02-12T09:36:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11746</id>
            <title type="text"><![CDATA[SITF]]></title>
            <link rel="alternate" href="https://wiz-sec-public.github.io/SITF/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11746"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SDLC Infrastructure Threat Framework

A comprehensive framework for understanding and mitigating supply chain security threats across the Software Development Lifecycle infrastructure. 

- [SITF @ GitHub](https://github.com/wiz-sec-public/SITF).

Related contents:

- [Introducing SITF: The First Threat Framework Dedicated to SDLC Infrastructure @ Wiz](https://www.wiz.io/blog/sitf-sdlc-threat-framework).]]>
            </summary>
            <updated>2026-02-09T06:31:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11720</id>
            <title type="text"><![CDATA[God&amp;#039;s Eye]]></title>
            <link rel="alternate" href="https://github.com/Vyntral/god-eye" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11720"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs.

God&amp;#039;s Eye is a powerful, ultra-fast subdomain enumeration and reconnaissance tool written in Go. It combines multiple passive sources with active DNS brute-forcing and comprehensive security checks to provide a complete picture of a target&amp;#039;s attack surface.

Related contents:

- [Newsletter du 19 Janvier 2026 @ Rudeops :fr:](https://www.rudeops.com/newsletter/2026-01-19-rudeops-newsletter/).]]>
            </summary>
            <updated>2026-02-06T10:17:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11719</id>
            <title type="text"><![CDATA[Open Bastion]]></title>
            <link rel="alternate" href="https://github.com/linagora/open-bastion" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11719"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure SSH bastion &amp;amp; PAM/NSS modules for LemonLDAP::NG - Centralized SSH &amp;amp; sudo access control with SSO integration.

Control SSH access and sudo privileges on your Linux servers through a centralized bastion server.

Open Bastion integrates your servers with LemonLDAP::NG (LLNG) to centrally manage who can SSH into which servers and who can use sudo. Administrators define access rules in the portal, and the PAM/NSS modules enforce them on each server.

Related contents:

- [Newsletter du 19 Janvier 2026 @ Rudeops :fr:](https://www.rudeops.com/newsletter/2026-01-19-rudeops-newsletter/).]]>
            </summary>
            <updated>2026-02-06T10:15:41+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11712</id>
            <title type="text"><![CDATA[Plumber]]></title>
            <link rel="alternate" href="https://getplumber.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11712"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenSource compliance CLI for GitLab CI/CD.

Analyze your GitLab CI/CD pipelines for security and compliance: pipeline composition (templates, components, version constraints), container images (mutable tags, trusted registries), and branch protection settings.

Plumber is a compliance scanner for GitLab. It reads your .gitlab-ci.yml and repository settings, then checks for security and compliance issues.

- [Plumber @ GitHub](https://github.com/getplumber/plumber).

Related contents:

- [Plumber : Vos pipelines GitLab CI/CD sont-ils conformes ? @ DevSecOps :fr:](https://blog.stephane-robert.info/docs/pipeline-cicd/gitlab/outils/plumber/).
- [Votre pipeline CI/CD GitLab a-t-il des fuites @ Korben :fr:](https://korben.info/plumber-scanner-securite-pipelines-cicd.html).]]>
            </summary>
            <updated>2026-04-13T09:23:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11704</id>
            <title type="text"><![CDATA[Supabase Exposure Check]]></title>
            <link rel="alternate" href="https://github.com/bscript/supabase-exposure-check" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11704"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically. 

A Python script that scans websites for exposed Supabase JWT tokens, enumerates accessible database tables, and analyzes them for sensitive data exposure. The script automatically detects sensitive information (emails, passwords, API keys, PII, financial data, etc.) and classifies vulnerability levels to identify which tables pose security risks.]]>
            </summary>
            <updated>2026-02-05T10:24:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11703</id>
            <title type="text"><![CDATA[ADTrapper]]></title>
            <link rel="alternate" href="https://github.com/MHaggis/ADTrapper" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11703"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Hunt Smarter, Hunt Harder.

Active Directory Security Analysis Platform.

ADTrapper is a comprehensive security analysis platform designed for cybersecurity professionals to analyze Windows Active Directory authentication logs. The platform provides advanced threat detection, anomaly analysis, and interactive visualizations to help identify and investigate security incidents.]]>
            </summary>
            <updated>2026-02-05T10:20:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11701</id>
            <title type="text"><![CDATA[Offensive Security MCP Servers]]></title>
            <link rel="alternate" href="https://github.com/FuzzingLabs/mcp-security-hub" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11701"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Production-ready, Dockerized MCP (Model Context Protocol) servers for offensive security tools. Enable AI assistants like Claude to perform security assessments, vulnerability scanning, and binary analysis.]]>
            </summary>
            <updated>2026-02-05T09:50:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11679</id>
            <title type="text"><![CDATA[📧 SMTP Tunnel Proxy]]></title>
            <link rel="alternate" href="https://github.com/x011/smtp-tunnel-proxy" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11679"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A high-speed covert tunnel that disguises TCP traffic as SMTP email communication to bypass Deep Packet Inspection (DPI) firewalls. 

Related contents:

- [Smtp-Tunnel-Proxy - Déguisez votre trafic en simples emails @ Korben :fr:](https://korben.info/smtp-tunnel-proxy.html).]]>
            </summary>
            <updated>2026-02-02T08:54:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11662</id>
            <title type="text"><![CDATA[Tangled]]></title>
            <link rel="alternate" href="https://tangled.gitbook.io/tangled-docs/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11662"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing. 

Tangled is a phishing platform designed from an offensive security perspective.
It automates many of the aspects of social engineering campaigns delivery and weaponizes iCalendar rendering features in Microsoft Outlook &amp;amp; Gmail (Google Workspace) to deliver spoofed meeting invites that are automatically added to a user&amp;#039;s calendar without interaction.

- [Tangled @ GitHub](https://github.com/ineesdv/Tangled).]]>
            </summary>
            <updated>2026-02-02T06:30:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11641</id>
            <title type="text"><![CDATA[CT Log Explorer]]></title>
            <link rel="alternate" href="https://certs.swerdlow.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11641"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Exploration into public Certificate Transparency Logs.

Real-time Certificate Transparency log explorer. Watch newly issued TLS certificates appear as they&amp;#039;re published to public CT logs.
CertTrack monitors Certificate Transparency logs in real-time, showing you newly issued TLS certificates as they appear. You can watch the stream of certificates, filter by domain, and explore the details of each certificate.

- [CT Log Explorer @ GitHub](https://github.com/theswerd/certtrack).

Related contents:

- [Erreur 403 | #61 :fr:](https://newsletter.erreur403.fr/p/erreur-403-61).]]>
            </summary>
            <updated>2026-01-29T11:51:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11640</id>
            <title type="text"><![CDATA[IDE Shepherd Extension]]></title>
            <link rel="alternate" href="https://github.com/DataDog/IDE-Shepherd-extension" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11640"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE.

IDE Shepherd is a security extension for VS Code and Cursor IDEs that provides real-time runtime protection against malicious extensions and supply chain attacks. Using advanced require-in-the-middle (RITM) instrumentation, IDE Shepherd intercepts Node.js primitives at the module loading layer, enabling comprehensive monitoring and blocking of suspicious network requests, process executions, dynamic code evaluation, and workspace tasks.

Related contents:

- [Erreur 403 | #61 :fr:](https://newsletter.erreur403.fr/p/erreur-403-61).]]>
            </summary>
            <updated>2026-01-29T11:50:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11639</id>
            <title type="text"><![CDATA[Sec-Context]]></title>
            <link rel="alternate" href="https://arcanum-sec.github.io/sec-context/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11639"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AI Code Security Anti-Patterns distilled from 150+ sources to help LLMs generate safer code. 

A comprehensive security reference distilled from 150+ sources to help LLMs generate safer code.

- [Sec-Context @ GitHub](https://github.com/Arcanum-Sec/sec-context).

Related contents:

- [Erreur 403 | #61 :fr:](https://newsletter.erreur403.fr/p/erreur-403-61).]]>
            </summary>
            <updated>2026-01-29T11:49:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11624</id>
            <title type="text"><![CDATA[Brakeman]]></title>
            <link rel="alternate" href="https://brakemanscanner.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11624"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Brakeman Security Scanner. Secure Your Rails Applications

Brakeman is a free vulnerability scanner designed for Ruby on Rails applications. Statically analyze Rails application code to find security issues at any stage of development.

- [Brakeman @ GitHub](https://github.com/presidentbeef/brakeman).]]>
            </summary>
            <updated>2026-01-26T16:46:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11621</id>
            <title type="text"><![CDATA[C’est qui qui a fuité aujourd’hui ? :fr:]]></title>
            <link rel="alternate" href="https://bonjourlafuite.eu.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11621"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[News on data leaks in France]]>
            </summary>
            <updated>2026-01-26T16:05:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11589</id>
            <title type="text"><![CDATA[Dotenv Mask Editor]]></title>
            <link rel="alternate" href="https://github.com/xinbenlv/dotenv-mask-editor" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11589"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure visual editor for .env files that masks sensitive secrets while allowing easy editing.

Dotenv Mask Editor provides a table-based interface for .env files. It is designed to reduce the accidental exposure of sensitive values by masking strings that meet a length threshold. All processing is done locally within your editor.

Related contents:

- [Dotenv Mask Editor - Fini les clés API à l&amp;#039;air libre @ Korben :fr:](https://korben.info/dotenv-mask-editor.html).]]>
            </summary>
            <updated>2026-03-16T09:38:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11576</id>
            <title type="text"><![CDATA[aura-inspector]]></title>
            <link rel="alternate" href="https://github.com/google/aura-inspector" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11576"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[aura-inspector is a Swiss Army knife of Salesforce Experience Cloud testing. It facilitates in discovering misconfigured Salesforce Experience Cloud applications as well as automates much of the testing process. Some of it&amp;#039;s functionality includes:

Related contents:

- [Erreur 403 | \#60](https://newsletter.erreur403.fr/p/erreur-403-60).
- [ShinyHunters claims more high-profile victims in latest Salesforce customers data heist @ The Register](https://www.theregister.com/2026/03/09/shinyhunters_claims_more_highprofile_victims/).]]>
            </summary>
            <updated>2026-03-12T10:49:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11575</id>
            <title type="text"><![CDATA[Trail of Bits Skills Marketplace]]></title>
            <link rel="alternate" href="https://github.com/trailofbits/skills" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11575"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows.

A Claude Code plugin marketplace from Trail of Bits providing skills to enhance AI-assisted security analysis, testing, and development workflows.

Related contents:

- [Erreur 403 | \#60](https://newsletter.erreur403.fr/p/erreur-403-60).]]>
            </summary>
            <updated>2026-01-23T07:26:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11574</id>
            <title type="text"><![CDATA[Heimdall]]></title>
            <link rel="alternate" href="https://github.com/DenizParlak/heimdall" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11574"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AWS Attack Path Scanner.
Discover privilege escalation paths across 10+ AWS services.

Heimdall is an AWS security scanner that discovers privilege escalation paths attackers could exploit to gain admin access.

Related contents:

- [Erreur 403 | \#60](https://newsletter.erreur403.fr/p/erreur-403-60).]]>
            </summary>
            <updated>2026-01-23T07:24:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11573</id>
            <title type="text"><![CDATA[Gixy-Next]]></title>
            <link rel="alternate" href="https://gixy.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11573"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[NGINX Configuration Security &amp;amp; Hardening Scanner.

Gixy-Next (Gixy) is an open-source NGINX configuration security scanner and hardening tool that statically analyzes your nginx.conf to detect security misconfigurations, hardening gaps, and common performance pitfalls before they reach production. It is an actively maintained fork of Yandex&amp;#039;s Gixy. Gixy-Next&amp;#039;s source code is available on GitHub.

- [Gixy-Next @ GitHub](https://github.com/MegaManSec/Gixy-Next).

Related contents:

- [Erreur 403 | \#60](https://newsletter.erreur403.fr/p/erreur-403-60).]]>
            </summary>
            <updated>2026-01-23T07:23:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11542</id>
            <title type="text"><![CDATA[OSAKA :fr:]]></title>
            <link rel="alternate" href="https://github.com/ANSSI-FR/OSAKA" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11542"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Advanced Kubernetes Architecture Security Tool.

This tool allows to perform the reconstruction of complex attack paths by graph generation in a Kubernetes cluster. It uses Neo4j for the storage of objects and relationships in database as well as neodash for visualization. The language Cypher as MySQL allows queries to the database to retrieve graphs. It can be used by security auditors to quickly identify attack paths or security experts to monitor theses paths.

Related contents:

- [Episode #526 consacré à OSAKA, un outil de l’ANSSI dédié à la sécurité avancée des environnements Kubernetes @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/osaka/).]]>
            </summary>
            <updated>2026-01-20T09:18:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11541</id>
            <title type="text"><![CDATA[JSAnalyzer]]></title>
            <link rel="alternate" href="https://github.com/jenish-sojitra/JSAnalyzer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11541"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A powerful Burp Suite extension for JavaScript static analysis. Extracts API endpoints, URLs, secrets, and email addresses from JavaScript files with intelligent noise filtering. The goal is reduce noise as much as possible to ensure the accuracy]]>
            </summary>
            <updated>2026-01-20T09:17:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11529</id>
            <title type="text"><![CDATA[memlab]]></title>
            <link rel="alternate" href="https://facebook.github.io/memlab/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11529"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A framework for finding JavaScript memory leaks and analyzing heap snapshots.
Analyzes JavaScript heap and finds memory leaks in browser and node.js.

- [memlab @ GitHub](https://github.com/facebook/memlab).

Related contents:

- [\#126 - 🤖 News Janvier 2026 : Open Code, Qwen Code et un peu de code @ Double Slash :fr:](https://double-slash.dev/podcasts/news-jan26/).]]>
            </summary>
            <updated>2026-02-20T07:19:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11522</id>
            <title type="text"><![CDATA[Leash]]></title>
            <link rel="alternate" href="https://leash.strongdm.ai/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11522"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security, visibility, and authorization for AI agents

Leash wraps AI coding agents in containers and monitors their activity. You define policies in Cedar; Leash enforces them instantly.

Authorize and monitor your AI agents with policy enforcement, sandboxed execution, and real-time observability—ensuring they operate safely within your defined boundaries.

- [Leash @ GitHub](https://github.com/strongdm/leash).]]>
            </summary>
            <updated>2026-01-19T06:51:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11520</id>
            <title type="text"><![CDATA[Vulnerable MCP Servers Lab]]></title>
            <link rel="alternate" href="https://github.com/appsecco/vulnerable-mcp-servers-lab" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11520"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers. 

This repository contains intentionally vulnerable implementations of Model Context Protocol (MCP) servers (both local and remote). Each server lives in its own folder and includes a dedicated README.md with full details on what it does, how to run it, and how to demonstrate/attack the vulnerability.]]>
            </summary>
            <updated>2026-01-19T06:49:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11426</id>
            <title type="text"><![CDATA[threatcl]]></title>
            <link rel="alternate" href="https://threatcl.github.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11426"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[threat modelling configuration language with hcl.

There are many different ways in which a threat model can be documented. From a simple text file, to more in-depth word documents, to fully instrumented threat models in a centralised solution. Two of the most valuable attributes of a threat model are being able to clearly document the threats, and to be able to drive valuable change.

- [threatcl @ GitHub](https://github.com/threatcl/threatcl).]]>
            </summary>
            <updated>2026-01-09T15:44:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11392</id>
            <title type="text"><![CDATA[Tailsnitch]]></title>
            <link rel="alternate" href="https://github.com/Adversis/tailsnitch" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11392"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A security auditor for Tailscale configurations. Scans your tailnet for misconfigurations, overly permissive access controls, and security best practice violations.]]>
            </summary>
            <updated>2026-01-06T13:04:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11369</id>
            <title type="text"><![CDATA[Secretive]]></title>
            <link rel="alternate" href="https://secretive.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11369"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Protect your SSH keys with your Mac&amp;#039;s Secure Enclave.

Secretive is an app for protecting and managing SSH keys with the Secure Enclave. 

- [Secretive @ GitHub](https://github.com/maxgoedjen/secretive).

Related contents:

- [Protégez vos clés SSH avec Touch ID sur macOS @ Korben :fr:](https://korben.info/secretive-cles-ssh-touch-id-macos.html).]]>
            </summary>
            <updated>2026-01-05T08:31:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11357</id>
            <title type="text"><![CDATA[react2shell-scanner]]></title>
            <link rel="alternate" href="https://github.com/assetnote/react2shell-scanner?utm_source=tldrdevops" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11357"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 &amp;amp; CVE-2025-66478).

A command-line tool for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js applications using React Server Components.]]>
            </summary>
            <updated>2026-01-05T07:29:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11346</id>
            <title type="text"><![CDATA[PentestAgent]]></title>
            <link rel="alternate" href="https://github.com/GH05TCREW/pentestagent" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11346"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AI Penetration Testing.

PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.]]>
            </summary>
            <updated>2025-12-31T07:54:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11294</id>
            <title type="text"><![CDATA[IPRememberMe]]></title>
            <link rel="alternate" href="https://github.com/CircuitGuy/IPRememberMe" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11294"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An IP based remember-me to allow auth interactions on dumb clients. Targeted at self-hosters who don&amp;#039;t want to directly expose things like HomeAssistant or Jellyfin login pages to the open internet but have clients that can&amp;#039;t support web auth]]>
            </summary>
            <updated>2025-12-23T13:36:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11280</id>
            <title type="text"><![CDATA[CamXploit]]></title>
            <link rel="alternate" href="https://github.com/spyboy-productions/CamXploit" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11280"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials. 

CamXploit is a reconnaissance tool designed to help researchers and security enthusiasts check if an IP address is hosting an exposed CCTV camera. It scans common camera ports, checks for login pages, tests default credentials, and provides useful search links for further investigation.]]>
            </summary>
            <updated>2025-12-23T06:35:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11274</id>
            <title type="text"><![CDATA[obsidenc]]></title>
            <link rel="alternate" href="https://github.com/markrai/obsidenc" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11274"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[paranoid-grade rust-based encryption utility + cross-platform GUI.

Related contents:

- [Obsidenc - Du chiffrement parano en Rust pour vos dossiers sensibles @ Korben :fr:](https://korben.info/obsidenc-chiffrement-rust-dossiers-argon2-2.html).]]>
            </summary>
            <updated>2025-12-22T08:32:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11254</id>
            <title type="text"><![CDATA[PrivacyFirewall]]></title>
            <link rel="alternate" href="https://github.com/privacyshield-ai/privacy-firewall" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11254"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A local AI-powered DLP solution.

PrivacyFirewall is a local-first PII and secrets firewall for AI tools like ChatGPT, Claude, and Gemini.It blocks risky paste events, warns as you type, and (optionally) uses a lightweight on-device Transformer model for deeper PII detection.

- [Privacy Firewall - Le garde fou de vos IA @ Korben :fr:](https://korben.info/privacyfirewall-extension-chrome-bloquer-fuites-do.html).]]>
            </summary>
            <updated>2025-12-16T10:38:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11253</id>
            <title type="text"><![CDATA[Harden Windows Security]]></title>
            <link rel="alternate" href="https://hotcakex.github.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11253"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Personal, Enterprise, Government and Military security levels | SLSA Level 3 Compliant for Secure Development and Build Process | Apps Available on MS Store✨ 

- [Harden Windows Security @ GitHub](https://github.com/HotCakeX/Harden-Windows-Security).

Related contents:

- [Harden Windows Security - Blindez votre Windows sans installer un seul logiciel tiers ! @ Korben :fr:](https://korben.info/harden-windows-security-blindage-windows-officiel.html).]]>
            </summary>
            <updated>2025-12-16T10:37:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11237</id>
            <title type="text"><![CDATA[OpenSSF Scorecard]]></title>
            <link rel="alternate" href="https://scorecard.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11237"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Build better security habits, one test at a time.
Quickly assess open source projects for risky practices.

- [OpenSSF Scorecard @ GitHub](https://github.com/ossf/scorecard).

Related contents:

- [OpenSSF Scorecard @ DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/supply-chain/scorecard/).]]>
            </summary>
            <updated>2025-12-15T09:57:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11229</id>
            <title type="text"><![CDATA[Hands-on MCP security lab]]></title>
            <link rel="alternate" href="https://github.com/PawelKozy/mcp-breach-to-fix-labs" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11229"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-tested exploit walkthroughs]]>
            </summary>
            <updated>2025-12-15T06:51:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11197</id>
            <title type="text"><![CDATA[Grummage]]></title>
            <link rel="alternate" href="https://github.com/popey/grummage" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11197"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Grype + Rummage = Grummage.

Grummage is an interactive terminal frontend to Grype.

Related contents:

- [Ep 70: Grummaging Gophers &amp;amp; Gods @ Linux Matters](https://linuxmatters.sh/70/).]]>
            </summary>
            <updated>2025-12-10T06:53:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11172</id>
            <title type="text"><![CDATA[pinact]]></title>
            <link rel="alternate" href="https://github.com/suzuki-shunsuke/pinact" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11172"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[pinact is a CLI to edit GitHub Workflow and Composite action files and pin versions of Actions and Reusable Workflows. pinact can also update their versions and verify version annotations.]]>
            </summary>
            <updated>2025-12-05T15:21:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11144</id>
            <title type="text"><![CDATA[agenix]]></title>
            <link rel="alternate" href="https://github.com/ryantm/agenix" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11144"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[age-encrypted secrets for NixOS and Home manager.

agenix is a small and convenient Nix library for securely managing and deploying secrets using common public-private SSH key pairs: You can encrypt a secret (password, access-token, etc.) on a source machine using a number of public SSH keys, and deploy that encrypted secret to any another target machine that has the corresponding private SSH key of one of those public keys.

Related contents:

- [Public Dotfiles, Private Secrets: My Nix OS Docker Workflow @ Tymscar](https://blog.tymscar.com/posts/nixosdockerwithsecrets/)]]>
            </summary>
            <updated>2025-12-01T13:30:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11134</id>
            <title type="text"><![CDATA[CRXPlorer]]></title>
            <link rel="alternate" href="https://crxplorer.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11134"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Analyze Chrome Extensions for Security.

CRXplorer is a free Chrome extensions analysis tool that combines traditional security scanning with AI-powered insights.

Related contents:

- [CRXplorer - Pour débusquer les extensions Chrome malveillantes @ Korben :fr:](https://korben.info/crxplorer-extensions-chrome-securite-malware.html).]]>
            </summary>
            <updated>2025-12-01T09:27:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11115</id>
            <title type="text"><![CDATA[express-rate-limit]]></title>
            <link rel="alternate" href="https://github.com/express-rate-limit/express-rate-limit" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11115"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Basic rate-limiting middleware for the Express web server.

Use to limit repeated requests to public APIs and/or endpoints such as password reset. Plays nice with express-slow-down and ratelimit-header-parser.]]>
            </summary>
            <updated>2025-11-27T16:11:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11108</id>
            <title type="text"><![CDATA[GreyNoise IP Check]]></title>
            <link rel="alternate" href="https://check.labs.greynoise.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11108"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[GreyNoise watches the internet&amp;#039;s background radiation—the constant storm of scanners, bots, and probes hitting every IP address on Earth. We&amp;#039;ve cataloged billions of these interactions to answer one critical question: is this IP a real threat, or just internet noise? Security teams trust our data to cut through the chaos and focus on what actually matters.

Related contents:

- [Cet outil gratuit indique si votre adresse IP est associée à des activités malveillantes ! @ IT-Connect :fr:](https://www.it-connect.fr/outil-gratuit-analyse-adresse-ip-reseau-compromis/).
- [Un site gratuit pour savoir si vous contribuez bénévolement à un botnet @ Korben :fr:](https://korben.info/detecteur-botnet.html).]]>
            </summary>
            <updated>2026-02-23T13:51:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11107</id>
            <title type="text"><![CDATA[Web Cache Vulnerability Scanner]]></title>
            <link rel="alternate" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11107"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning and web cache deception.

The scanner supports many different web cache poisoning and web cache deception techniques, includes a crawler to identify further URLs to test, and can adapt to a specific web cache for more efficient testing. It is highly customizable and can be easily integrated into existing CI/CD pipelines.]]>
            </summary>
            <updated>2025-11-27T07:13:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11079</id>
            <title type="text"><![CDATA[🛡️ Guardon]]></title>
            <link rel="alternate" href="https://github.com/sajal-n/guardon" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11079"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Kubernetes Compliance &amp;amp; Security Checks Extension.
Browser extension for Kubernetes YAML guardrails – security &amp;amp; compliance linting directly in GitHub/GitLab. 

Guardon is a lightweight browser extension that helps developers and reviewers detect common Kubernetes misconfigurations and security issues directly on code hosting sites (GitHub, GitLab, Bitbucket) or from pasted YAML. It parses multi-document YAML, applies configurable rules, and can suggest safe fixes.

Related contents:

- [Kubernetes Guardrail Extension: Bringing Compliance-as-Code to Your Browser @ DZone](https://dzone.com/articles/kubernetes-guardrail-extension-brings-compliance-as-code-to-browser).
- [Guardon — Kubernetes Compliance &amp;amp; Security Checks Extension @ Sajal Nigam&amp;#039;s YouTube](https://www.youtube.com/watch?v=LPAi8UY1XIM).]]>
            </summary>
            <updated>2025-11-24T12:35:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11074</id>
            <title type="text"><![CDATA[cnspec]]></title>
            <link rel="alternate" href="https://mondoo.com/cnspec" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11074"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Source Cloud Security Scanner.

An open source, cloud-native security to protect everything from build to runtime.

cnspec assesses your entire infrastructure&amp;#039;s security and compliance. It finds vulnerabilities and misconfigurations across public and private cloud environments, Kubernetes clusters, containers, container registries, servers, endpoints, SaaS products, infrastructure as code, APIs, and more.

A powerful policy as code engine, cnspec is built upon Mondoo&amp;#039;s security data fabric. It comes configured with default security policies that run right out of the box. It&amp;#039;s both fast and simple to use!

- [cnspec @ GitHub](https://github.com/mondoohq/cnspec).]]>
            </summary>
            <updated>2025-11-24T10:37:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11068</id>
            <title type="text"><![CDATA[&amp;quot;Two-Face&amp;quot; Rust Linux binary]]></title>
            <link rel="alternate" href="https://github.com/synacktiv/twoface" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11068"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An executable file that runs a harmless program most of the time, but will run a different, hidden code if deployed on a specific target host.

Related contents:

- [TwoFace - Quand les sandbox deviennent inutiles @ Korben :fr:](https://korben.info/twoface-sandboxes-inutiles-malware-contextuel.html).]]>
            </summary>
            <updated>2025-11-24T08:49:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11050</id>
            <title type="text"><![CDATA[CrowdSec Manager]]></title>
            <link rel="alternate" href="https://github.com/hhftechnology/crowdsec_manager" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11050"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A web-based management interface for CrowdSec security stack with Pangolin integration. This project replaces the bash script with a modern, user-friendly ShadcnUI built with Go and React.]]>
            </summary>
            <updated>2025-11-24T08:03:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11029</id>
            <title type="text"><![CDATA[Sirius]]></title>
            <link rel="alternate" href="https://github.com/SiriusScan/Sirius" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11029"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Sirius is an open-source comprehensive vulnerability scanner that leverages community-driven security intelligence and automated penetration testing capabilities.]]>
            </summary>
            <updated>2025-11-21T06:29:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11020</id>
            <title type="text"><![CDATA[Mojo-V]]></title>
            <link rel="alternate" href="https://github.com/toddmaustin/mojo-v" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11020"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A RISC-V instruction set extension for privacy-oriented programming. Mojo-V allows programmers to write software that computes on data that no software or person can see, except the data owner. Mojo-V implements this novel form of secret computation using simple extensions to a RISC-V CPU.]]>
            </summary>
            <updated>2025-11-20T12:12:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11006</id>
            <title type="text"><![CDATA[Orochi]]></title>
            <link rel="alternate" href="https://github.com/LDO-CERT/orochi" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11006"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Volatility Collaborative GUI.

A modern, distributed web interface for collaborative memory forensics built on Volatility 3, Django, and Dask.]]>
            </summary>
            <updated>2025-11-18T10:42:00+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10985</id>
            <title type="text"><![CDATA[ImunifyAV]]></title>
            <link rel="alternate" href="https://imunify360.com/imunifyav/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10985"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free Malware Scanner for Linux Servers.

Find out what’s hiding on your server, absolutely free. Your first step to a secure server starts here.

Related contents:

- [ImunifyAV - Le scanner qui exécute les malwares @ Korben :fr:](https://korben.info/imunifyav-rce-faille-php-serveur.html).]]>
            </summary>
            <updated>2025-11-17T10:34:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10947</id>
            <title type="text"><![CDATA[MCP Scanner]]></title>
            <link rel="alternate" href="https://github.com/cisco-ai-defense/mcp-scanner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10947"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Scan MCP servers for potential threats &amp;amp; security findings.

A Python tool for scanning MCP (Model Context Protocol) servers and tools for potential security findings. The MCP Scanner combines Cisco AI Defense inspect API, YARA rules and LLM-as-a-judge to detect malicious MCP tools.

Related contents:

- [Securing the AI agent supply chain with Cisco’s open-source MCP Scanner @ Cisco Blogs](https://blogs.cisco.com/ai/securing-the-ai-agent-supply-chain-with-ciscos-open-source-mcp-scanner).]]>
            </summary>
            <updated>2025-11-13T06:36:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10941</id>
            <title type="text"><![CDATA[Strix]]></title>
            <link rel="alternate" href="https://usestrix.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10941"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The AI Penetration Testing Agent.
Penetration testing done in hours, not weeks.
Strix finds and fixes vulnerabilities before they reach production. 

- [Strix @ GitHub](https://github.com/usestrix/strix).]]>
            </summary>
            <updated>2025-11-12T14:32:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10908</id>
            <title type="text"><![CDATA[Wildbox]]></title>
            <link rel="alternate" href="https://fabriziosalmi.github.io/wildbox/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10908"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Your Complete Security Operations Platform

Open-source SIEM, CSPM, WAF, and threat intelligence. From git clone to running security scans in just 5 minutes. No vendor lock-in. No complex setup. 

- [Wildbox @ GitHub](https://github.com/fabriziosalmi/wildbox).]]>
            </summary>
            <updated>2025-11-07T14:22:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10888</id>
            <title type="text"><![CDATA[SOARCA]]></title>
            <link rel="alternate" href="https://cossas.github.io/SOARCA/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10888"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security Orchestrator for Advanced Response to Cyber Attacks.

The Open Source CACAO-based Security Orchestrator! 
Automate threat and incident response workflows with CACAO security playbooks.

- [SOARCA @ GitHub](https://github.com/COSSAS/SOARCA).

Related contents:

- [The race to shore up Europe’s power grids against cyberattacks and sabotage @ The Register](https://www.theregister.com/2025/11/03/europe_power_grid_security/).]]>
            </summary>
            <updated>2025-11-05T10:41:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10884</id>
            <title type="text"><![CDATA[ENISA :eu:]]></title>
            <link rel="alternate" href="https://www.enisa.europa.eu/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10884"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[ENISA, is the Union&amp;#039;s agency dedicated to achieving a high common level of cybersecurity across Europe.

Related contents:

- [Episode \#518: ENISA Threat Landscape 2025  @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/enisa-threat-landscape-2025/).]]>
            </summary>
            <updated>2025-11-05T06:47:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10879</id>
            <title type="text"><![CDATA[Meltdown and Spectre]]></title>
            <link rel="alternate" href="https://meltdownattack.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10879"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Vulnerabilities in modern computers leak passwords and sensitive data.

Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents.]]>
            </summary>
            <updated>2025-11-04T12:42:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10841</id>
            <title type="text"><![CDATA[Deep Eye 🔍]]></title>
            <link rel="alternate" href="https://github.com/zakirkun/deep-eye" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10841"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Claude) with comprehensive security testing modules for automated bug hunting, intelligent payload generation, and professional reporting.

Related contents:

- [Deep Eye - Le scanner de vulns multi-IA @ Korben :fr:](https://korben.info/deep-eye-scanner-vulnerabilites-ai-openai-claude-g.html).]]>
            </summary>
            <updated>2025-11-03T08:55:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10787</id>
            <title type="text"><![CDATA[yams]]></title>
            <link rel="alternate" href="https://github.com/nsiow/yams" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10787"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A simulation tool for AWS IAM written in Go.

 yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies.]]>
            </summary>
            <updated>2025-10-27T15:35:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10786</id>
            <title type="text"><![CDATA[&amp;quot;Sealed Secrets&amp;quot; for Kubernetes]]></title>
            <link rel="alternate" href="https://github.com/bitnami-labs/sealed-secrets" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10786"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Kubernetes controller and tool for one-way encrypted Secrets.

Problem: &amp;quot;I can manage all my K8s config in git, except Secrets.&amp;quot;
Solution: Encrypt your Secret into a SealedSecret, which is safe to store - even inside a public repository. The SealedSecret can be decrypted only by the controller running in the target cluster and nobody else (not even the original author) is able to obtain the original Secret from the SealedSecret.

Related contents:

- [GitOps architecture, patterns and anti-patterns @ Platform Engineering](https://platformengineering.org/blog/gitops-architecture-patterns-and-anti-patterns).]]>
            </summary>
            <updated>2026-03-04T12:41:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10761</id>
            <title type="text"><![CDATA[Lenspect]]></title>
            <link rel="alternate" href="https://github.com/vmkspv/lenspect" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10761"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A lightweight security threat scanner intended to make malware detection more accessible and efficient. 

Lenspect is a lightweight security threat scanner powered by VirusTotal.

- [Lenspect @ Flathub](https://flathub.org/en/apps/io.github.vmkspv.lenspect).

Related contents:

- [Episode 637: Chris’ Smart Home Disaster @ Linux Unplugged](https://linuxunplugged.com/637).]]>
            </summary>
            <updated>2025-10-23T05:47:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10755</id>
            <title type="text"><![CDATA[Red AI Range (RAR)]]></title>
            <link rel="alternate" href="https://github.com/ErdemOzgen/RedAiRange" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10755"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AI Red Teaming Range.

Red AI Range (RAR) is a comprehensive security platform designed specifically for AI red teaming and vulnerability assessment. It creates realistic environments where security professionals can systematically discover, analyze, and mitigate AI vulnerabilities through controlled testing scenarios.]]>
            </summary>
            <updated>2025-10-22T06:19:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10720</id>
            <title type="text"><![CDATA[AuditKit]]></title>
            <link rel="alternate" href="https://auditkit.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10720"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open-Source Compliance Scanner.
Multi-Cloud Compliance Scanner &amp;amp; Evidence Collection.
 
Scan AWS, Azure, and M365 for SOC2, PCI-DSS, HIPAA, CMMC, and NIST 800-53 compliance. Get audit-ready reports in minutes.

- [AuditKit @ GitHub](https://github.com/guardian-nexus/auditkit).]]>
            </summary>
            <updated>2025-10-20T06:16:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10718</id>
            <title type="text"><![CDATA[HoneyBee]]></title>
            <link rel="alternate" href="https://github.com/yaaras/honeybee" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10718"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[HoneyBee.  Create honeypots for cloud environments.

HoneyBee is a tool for creating misconfigured environments to test vulnerabilities in technologies like Jenkins, Jupyter Notebook, and more.]]>
            </summary>
            <updated>2025-10-20T06:12:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10716</id>
            <title type="text"><![CDATA[Docker Proxy Filter (DPF)]]></title>
            <link rel="alternate" href="https://github.com/FoxxMD/docker-proxy-filter" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10716"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Docker Proxy Filter (DPF) is a smol, forward proxy for filtering the content and responses of Docker API responses to only those you want to expose.

Unlike the OG docker-socket-proxy and its variants, DPF provides filtering of the response content from the Docker API, rather than disabling/enabling of API endpoints.
It does not connect directly to the Docker socket: it designed to be used with another Docker &amp;quot;Socket Proxy&amp;quot; container.
Combined with a socket-proxy container that provides granular endpoint access it&amp;#039;s possible to expose only information about specific containers in a read-only context.

Related contents:

- [Restricting Docker Socket Proxy by Container @ FoxxMD Blog](https://blog.foxxmd.dev/posts/restricting-socket-proxy-by-container/).]]>
            </summary>
            <updated>2025-10-17T14:04:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10683</id>
            <title type="text"><![CDATA[andcli]]></title>
            <link rel="alternate" href="https://github.com/tjblackheart/andcli" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10683"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A 2FA TUI for your shell.

andcli lets you work with 2FA tokens directly in your shell, using encrypted backups exported out of your favourite 2FA apps. All the data is held in memory only and will never leave your machine.]]>
            </summary>
            <updated>2025-10-16T09:47:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10675</id>
            <title type="text"><![CDATA[npq]]></title>
            <link rel="alternate" href="https://github.com/lirantal/npq" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10675"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[safely install npm packages by auditing them pre-install stage.
npq allows you to audit npm packages before you install them.

Related contents:

- [\#121 - Les news Web Dev d’octobre 2025. Adonis, Laravel, React Compiler, Vite+ et bien plus encore ! @ Double Slash :fr:](https://double-slash.dev/podcasts/news-oct25/).]]>
            </summary>
            <updated>2025-10-16T06:36:00+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10661</id>
            <title type="text"><![CDATA[Al-Khaser]]></title>
            <link rel="alternate" href="https://github.com/ayoubfaouzi/al-khaser" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10661"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

al-khaser is a PoC &amp;quot;malware&amp;quot; application with good intentions that aims to stress your anti-malware system. It performs a bunch of common malware tricks with the goal of seeing if you stay under the radar.

Related contents:

- [Al-khaser - L&amp;#039;outil qui fait transpirer votre solution de cybersécurité @ Korben :fr:]().]]>
            </summary>
            <updated>2025-10-15T09:39:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10660</id>
            <title type="text"><![CDATA[Ludus]]></title>
            <link rel="alternate" href="https://ludus.cloud/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10660"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The easiest way to deploy dev/test infrastructure.
An open-source, API driven infrastructure management system.

Ludus is a system to build easy to use cyber environments, or &amp;quot;ranges&amp;quot; for testing and development.

Built on Proxmox, Ludus enables advanced automation while still allowing easy manual modifications or setup of virtual machines and networks.

- [Ludus @ GitLab](https://gitlab.com/badsectorlabs/ludus).

Related contents:

- [Ludus - Pour monter un lab de cybersécurité en une commande @ Korben :fr:](https://korben.info/ludus-automatisation-lab-cybersecurite.html).
- [Automating GOAD and Live Malware Labs @ Elastic Security Labs](https://www.elastic.co/security-labs/automating-goad-and-live-malware-labs).]]>
            </summary>
            <updated>2026-02-12T09:43:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10658</id>
            <title type="text"><![CDATA[YesWeHack :fr:]]></title>
            <link rel="alternate" href="https://www.yeswehack.com/en" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10658"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Global Bug Bounty &amp;amp; Vulnerability Management Platform.

Related contents:

- [Les hackeurs de YesWeHack désormais « autorité » sur internet ? @ Choses à Savoir Tech :fr:](https://shows.acast.com/choses-a-savoir-technologie/episodes/les-hackeurs-de-yeswehack-desormais-autorite-sur-internet).]]>
            </summary>
            <updated>2025-10-15T05:44:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10647</id>
            <title type="text"><![CDATA[CycloneDX]]></title>
            <link rel="alternate" href="https://cyclonedx.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10647"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CycloneDX Bill of Materials Standard.

CycloneDX is a modern standard for the software supply chain.

The International Standard for Bill of Materials (ECMA-424)
The OWASP Foundation and Ecma International Technical Committee for Software &amp;amp; System Transparency (TC54) drive the continued advancement of the specification.

- [CycloneDX BOM Standard @ GitHub](https://github.com/CycloneDX).

Related contents:

- [CycloneDX PHP Composer Plugin @ GitHub](https://github.com/CycloneDX/cyclonedx-php-composer).]]>
            </summary>
            <updated>2025-10-14T09:44:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10626</id>
            <title type="text"><![CDATA[Automated Splunk Detection &amp;amp; Response Lab]]></title>
            <link rel="alternate" href="https://github.com/thekibiru03/splunk-ad-lab" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10626"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This project automates the creation of a complete security lab environment for detection engineering and attack simulation. With a single command, it deploys three virtual machines: a fully configured Splunk server, a Windows Server Active Directory Domain Controller with advanced logging, and a Splunk SOAR server for automated response capabilities.]]>
            </summary>
            <updated>2025-10-10T13:36:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10593</id>
            <title type="text"><![CDATA[InterceptSuite]]></title>
            <link rel="alternate" href="https://interceptsuite.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10593"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[MITM Proxy for Thick Client &amp;amp; non-HTTP Protocol.

 A TLS MITM proxy for TCP/TLS/UDP traffic, with support for TLS upgrades like STARTTLS, PostgreSQL, and more. 

Non-HTTP proxy that supports TCP to TLS upgrade protocols like STARTTLS and custom protocols.
Perfect for thick client intercept and database protocol analysis.

- [InterceptSuite @ GitHub](https://github.com/InterceptSuite/InterceptSuite).]]>
            </summary>
            <updated>2025-10-10T05:46:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10575</id>
            <title type="text"><![CDATA[Nova Framework]]></title>
            <link rel="alternate" href="https://novahunting.ai/#" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10575"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[NOVA: The Prompt Pattern Matching.
NOVA is a Python-based tool for detecting adversarial prompts - prompt injections, exfiltration, evasion and TTPs.

NOVA is an open-source prompt pattern matching system combining keyword detection, semantic similarity, and LLM-based evaluation to analyze and detect prompt content.

- [Nova Framework @ GitHub](https://github.com/fr0gger/nova-framework).

Related contents:

- [Introducing NOVA @ SecurityBreak&amp;#039;s Medium](https://blog.securitybreak.io/introducing-nova-f4244216ae2c).]]>
            </summary>
            <updated>2025-10-08T07:20:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10573</id>
            <title type="text"><![CDATA[Secure Your Containers with Chainguard]]></title>
            <link rel="alternate" href="https://www.chainguard.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10573"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Patch the past. Build the future.
Eliminate your CVEs

Build, ship, and run secure software with minimal, hardened container images —
rebuilt from source daily and guarded under our industry-leading remediation SLA.:

1,700+ trusted container images to eliminate your vulnerabilities and mitigate malware.

- [Chainguard container images registry](https://images.chainguard.dev/).
- [Chainguard for Raspberry Pi](https://images.chainguard.dev/rpi).

Related contents:

- [Episode 635: The Texas Linux Fest Special @ Linux Unplugged](https://linuxunplugged.com/635).
- [A Gift for the Open Source Community: Chainguard’s CVE-Free Raspberry Pi Images (Beta) @ Chainguard](https://www.chainguard.dev/unchained/a-gift-for-the-open-source-community-chainguards-cve-free-raspberry-pi-images-beta).]]>
            </summary>
            <updated>2025-10-08T05:35:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10560</id>
            <title type="text"><![CDATA[Socket Firewall Free]]></title>
            <link rel="alternate" href="https://github.com/SocketDev/sfw-free" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10560"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Wraps your package manager, preventing installation of malicious packages. 

Related contents:

- [Introducing Socket Firewall: Free, Proactive Protection for Your Software Supply Chain @ Socket](https://socket.dev/blog/introducing-socket-firewall).
- [Episode \#111: npm under siege (what to do about it) @ Changelog &amp;amp; Friends](https://changelog.com/friends/111).]]>
            </summary>
            <updated>2025-10-07T05:44:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10547</id>
            <title type="text"><![CDATA[DiffRays]]></title>
            <link rel="alternate" href="https://github.com/pwnfuzz/diffrays" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10547"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[IDA Pro Binary Diffing Engine.

 DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and reverse engineering. 

Relate contents:

- [Diffrays - Un super outil de diffing binaire IDA Pro pour la recherche de vulnérabilités @ Korben :fr:](https://korben.info/diffrays-exploit-wednesday-archeologie-binaire.html).]]>
            </summary>
            <updated>2025-10-06T09:26:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10522</id>
            <title type="text"><![CDATA[Fox&amp;#039;s High Speed TLS Signature Filtering]]></title>
            <link rel="alternate" href="https://github.com/FoxMoss/fox-xdp/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10522"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[High speed TLS signature filtering.

Instead of taking the full JA4 hash to fingerprint traffic which is slow to calculate and is hard to implement in a BPF filter, I take a Jenkins hash of the sorted supported ciphers in any given TLS request. To similar effect as JA4, keeping fingerprinting usefulness. Switching to a non-cryptographic hashing algorithm is okay here because any given attacker with enough skill could replicate the ciphers of another client, so any hash reversing would be useless or at best force the attacker to implement a different amount of hashes.

Related contents:

- [How I Block All 26 Million Of Your Curl Requests @ Fox Ellison-Taylor&amp;#039;s Blog](https://foxmoss.com/blog/packet-filtering/).]]>
            </summary>
            <updated>2025-10-06T05:30:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10521</id>
            <title type="text"><![CDATA[Replik8s]]></title>
            <link rel="alternate" href="https://github.com/latacora/replik8s" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10521"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A modern open-source Kubernetes auditing and investigation tool.

Replik8s is a modern open-source Kubernetes auditing and investigation tool. It is designed to address the common limitations of traditional security tools, which rely on narrow data collection and predefined logic. RepliK8s allows cloning Kubernetes clusters and serving back exact replicas of the original data, as well as conducting analysis through a tool-agnostic query language.]]>
            </summary>
            <updated>2025-10-06T05:18:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10499</id>
            <title type="text"><![CDATA[CVE: Common Vulnerabilities and Exposures]]></title>
            <link rel="alternate" href="https://www.cve.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10499"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
There are currently over 296,000 CVE Records accessible via Download or Keyword Search above. 

Related contents:

- [YesWeHack authorised as a CVE Numbering Authority (CNA) @ YesWeHack](https://www.yeswehack.com/news/yeswehack-authorised-cve-numbering-authority).
- [YesWeHack rejoint les autorités CVE @ Data Security Breach :fr:](https://www.datasecuritybreach.fr/yeswehack-rejoint-les-autorites-cve/).]]>
            </summary>
            <updated>2025-10-02T06:23:47+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10456</id>
            <title type="text"><![CDATA[Mon Service Sécurisé :fr:]]></title>
            <link rel="alternate" href="https://monservicesecurise.cyber.gouv.fr/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10456"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[L&amp;#039;outil pour piloter en équipe la sécurité de tous vos services numériques et les homologuer rapidement.

Related contents:

- [Episode \#508 consacré au laboratoire d’innovation de l’ANSSI @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/le-laboratoire-dinnovation-de-lanssi/).]]>
            </summary>
            <updated>2025-09-30T05:29:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10451</id>
            <title type="text"><![CDATA[NPM Supply Chain Security Scanner]]></title>
            <link rel="alternate" href="https://github.com/Drasrax/npm-shai-hulud-scanner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10451"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Comprehensive detection tool for NPM supply chain attacks, specifically designed to identify and prevent the Shai-Hulud worm that compromised 500+ packages including CrowdStrike npm packages in 2025. 

Related contents:

- [Malicious NPM packages: Are you exposed? @ sysdig](https://www.sysdig.com/blog/malicious-npm-packages-are-you-exposed).
- [Un scanner pour lutter contre l&amp;#039;attaque Shai-Hulud @ Korben :fr:](https://korben.info/npm-shai-hulud-scanner-attaque-supply-chain.html).]]>
            </summary>
            <updated>2025-09-29T13:04:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10436</id>
            <title type="text"><![CDATA[Alibi]]></title>
            <link rel="alternate" href="https://github.com/Myzel394/Alibi" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10436"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Use your phone as a dashcam and save the last 30 minutes when you need them. 

Alibi keeps recording audio/video in the background and saves the last 30 minutes at your request. Everything is completely configurable. No internet connection required.

Related contents:

- [Alibi - Faites de votre smartphone Android, une dashcam @ Korben :fr:](https://korben.info/alibi-paradoxe-surveillance-volontaire-smartphone.html).]]>
            </summary>
            <updated>2025-09-29T10:29:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10429</id>
            <title type="text"><![CDATA[wister]]></title>
            <link rel="alternate" href="https://github.com/cycurity/wister" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10429"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.]]>
            </summary>
            <updated>2025-09-29T06:30:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10428</id>
            <title type="text"><![CDATA[cfn-nag]]></title>
            <link rel="alternate" href="https://github.com/stelligent/cfn_nag" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10428"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Linting tool for CloudFormation templates.
The cfn-nag tool looks for patterns in CloudFormation templates that may indicate insecure infrastructure.

Related contents:

- [How to Complete Infrastructure Code Reviews Like a PRO @ microtica](https://www.microtica.com/blog/how-to-complete-infrastructure-code-reviews-like-a-pro).]]>
            </summary>
            <updated>2025-09-29T06:25:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10427</id>
            <title type="text"><![CDATA[Prowler]]></title>
            <link rel="alternate" href="https://prowler.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10427"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Source Cloud Security Tool.

 Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuous monitoring, security assessments &amp;amp; audits, incident response, compliance, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, ENS and more.

- [Prowler @ GitHub](https://github.com/prowler-cloud/prowler).

Related contents:

- [How to Complete Infrastructure Code Reviews Like a PRO @ microtica](https://www.microtica.com/blog/how-to-complete-infrastructure-code-reviews-like-a-pro).]]>
            </summary>
            <updated>2025-09-29T06:23:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10421</id>
            <title type="text"><![CDATA[HexStrike AI]]></title>
            <link rel="alternate" href="https://www.hexstrike.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10421"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Revolutionary AI-Powered Offensive Security Framework.

 HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capabilities. 

- [HexStrike AI MCP Agents v6.0 @ GitHub](https://github.com/0x4m4/hexstrike-ai).]]>
            </summary>
            <updated>2025-09-29T05:46:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10419</id>
            <title type="text"><![CDATA[bluemonday]]></title>
            <link rel="alternate" href="https://github.com/microcosm-cc/bluemonday" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10419"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS.

bluemonday takes untrusted user generated content as an input, and will return HTML that has been sanitised against an allowlist of approved HTML elements and attributes so that you can safely include the content in your web page.

Related contents:

- [Episode 132 @ Linux Dev Time](https://www.linuxdevtime.com/linux-dev-time-episode-132/).]]>
            </summary>
            <updated>2025-09-27T16:13:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10397</id>
            <title type="text"><![CDATA[bomber]]></title>
            <link rel="alternate" href="https://devops-kung-fu.github.io/bomber/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10397"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Scans Software Bill of Materials (SBOMs) for security vulnerabilities.

bomber is an application that scans SBOMs for security vulnerabilities.

- [bomber @ GitHub](https://github.com/devops-kung-fu/bomber).]]>
            </summary>
            <updated>2025-09-25T12:39:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10372</id>
            <title type="text"><![CDATA[cvemon]]></title>
            <link rel="alternate" href="https://cvemon.intruder.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10372"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Top 10 Trending CVEs, Latest Insights &amp;amp; Analysis.

cvemon is a free vulnerability intelligence platform developed by Intruder to help businesses stay ahead of the latest threats.

By aggregating data from trusted sources, it provides the latest intelligence on CVEs and tracks what’s trending over the last 24 hours, complete with a hype score to contextualize the buzz.]]>
            </summary>
            <updated>2025-09-24T12:02:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10368</id>
            <title type="text"><![CDATA[NPM Security Best Practices]]></title>
            <link rel="alternate" href="https://github.com/bodadotsh/npm-security-best-practices" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10368"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[How to stay safe from NPM supply chain attacks.

The NPM ecosystem is no stranger to compromises, supply-chain attacks, malware, spam, phishing, incidents, or even trolls. In this repository, I have consolidated a list of information you might find useful in securing yourself against these incidents.]]>
            </summary>
            <updated>2025-09-23T11:37:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10362</id>
            <title type="text"><![CDATA[dbarzin/pandora-box: USB Scanning device]]></title>
            <link rel="alternate" href="https://github.com/dbarzin/pandora-box" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10362"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PandoraBox is a USB scanning station designed to detect and remove malware from USB disks. It is based on Pandora by CIRCL and is distributed under the GPLv3 license.

Related contents:

- [Episode #513 consacré à Mercator @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).]]>
            </summary>
            <updated>2025-09-23T09:10:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10344</id>
            <title type="text"><![CDATA[Create a Phishy URL]]></title>
            <link rel="alternate" href="https://phishyurl.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10344"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Want to piss off your IT department? Are your links not malicious looking enough?

This is a tool that takes any link and makes it look malicious. It works on the idea of a redirect. Much like https://tinyurl.com/ for example. Where tinyurl makes an url shorter, this site makes it look malicious. 

Related contents:

- [Vous voulez énerver votre service informatique ? @ Korben :fr:](https://korben.info/phishyurl-generateur-urls-malveillantes-prank.html).]]>
            </summary>
            <updated>2025-09-22T11:33:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10339</id>
            <title type="text"><![CDATA[Paralegal]]></title>
            <link rel="alternate" href="https://brownsys.github.io/paralegal/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10339"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Paralegal is a static analyzer for Rust code that enforces privacy and security policies on programs. 

- [Paralegal @ GitHub](https://github.com/brownsys/paralegal).

Related contents:

- [Practical Static Analysis for Privacy Bugs @ The Brown PLT Blog](https://blog.brownplt.org/2025/08/03/paralegal.html).]]>
            </summary>
            <updated>2025-09-22T07:16:00+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10327</id>
            <title type="text"><![CDATA[DetectPack Forge]]></title>
            <link rel="alternate" href="https://detect-pack-forge.vercel.app/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10327"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Turn ideas into detections your SIEM understands. Generate Sigma, KQL, and SPL rules with tests and playbooks in seconds.

 DetectPack Forge turns plain-English behaviors or sample logs into production-ready detection packs — Sigma, KQL (Sentinel), SPL (Splunk) — plus tests and a response playbook, mapped to MITRE ATT&amp;amp;CK, fully powered by Gen AI. 

- [DetectPack Forge @ GitHub](https://github.com/andrewkolagit/DetectPack-Forge).]]>
            </summary>
            <updated>2025-09-22T05:28:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10276</id>
            <title type="text"><![CDATA[Secrover]]></title>
            <link rel="alternate" href="https://secrover.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10276"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open-Source Security Reports, Made Simple.

 Secrover is a free and open-source tool that generates clear, professional security audit reports — without paywalls or proprietary SaaS. Just useful insights you can trust and share. 

- [Secrover @ GitHub](https://github.com/Secrover/Secrover).]]>
            </summary>
            <updated>2025-09-18T14:25:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10275</id>
            <title type="text"><![CDATA[Sneak Link]]></title>
            <link rel="alternate" href="https://github.com/felixandersen/sneak-link" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10275"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Link-based access control for Immich, NextCloud and Paperless. After verifying a URL &amp;quot;knock&amp;quot; on a share link, Sneak Link issues a cookie that grants access to a protected service. No IP whitelisting required.]]>
            </summary>
            <updated>2025-09-18T14:24:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10241</id>
            <title type="text"><![CDATA[Sortez couvert·es :fr:]]></title>
            <link rel="alternate" href="https://sortezcouvert.es/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10241"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Sortez couvert·es est un site qui donne des conseils juridiques et des rappels légaux sur l’usage du numérique, dans l’optique de protéger ses utilisateurices dans des situations d’urgence, de stress, comme nous pouvons les vivre au moment de grèves ou de manifestations.

Related contents:

- [3 applis pour le 18 septembre et après @ La Quadrature du Net :fr:](https://www.laquadrature.net/2025/09/16/3-applis-pour-le-18-et-apres/).]]>
            </summary>
            <updated>2025-09-17T07:47:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10240</id>
            <title type="text"><![CDATA[Wasted]]></title>
            <link rel="alternate" href="https://github.com/x13a/Wasted" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10240"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Lock a device and wipe its data on emergency.

You can use PanicKit, tile, shortcut or send a message with a secret code. On trigger, using Device Administration API, it locks a device and optionally runs wipe (factory reset). Or it can send a broadcast message instead of the wipe.

Related contents:

- [3 applis pour le 18 septembre et après @ La Quadrature du Net :fr:](https://www.laquadrature.net/2025/09/16/3-applis-pour-le-18-et-apres/).]]>
            </summary>
            <updated>2025-09-17T07:45:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10239</id>
            <title type="text"><![CDATA[Duress]]></title>
            <link rel="alternate" href="https://github.com/x13a/Duress" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10239"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Duress password trigger.

Tiny app to listen for a duress password on the lockscreen.
When found, it can send a broadcast message or wipe the device.

Related contents:

- [3 applis pour le 18 septembre et après @ La Quadrature du Net :fr:](https://www.laquadrature.net/2025/09/16/3-applis-pour-le-18-et-apres/).]]>
            </summary>
            <updated>2025-09-17T07:44:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10232</id>
            <title type="text"><![CDATA[Bruce Firmware]]></title>
            <link rel="alternate" href="https://bruce.computer/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10232"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The powerful open-source ESP32 firmware designed for offensive security and Red Team operations.

Bruce is meant to be a versatile ESP32 firmware that supports a ton of offensive features focusing on facilitating Red Team operations. It also supports m5stack products and works great with Cardputer, Sticks, M5Cores, T-Decks and T-Embeds.

- [Bruce Firmware @ GitHub](https://github.com/pr3y/Bruce).]]>
            </summary>
            <updated>2025-09-16T08:45:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10231</id>
            <title type="text"><![CDATA[CapibaraZero]]></title>
            <link rel="alternate" href="https://capibarazero.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10231"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A cheap alternative to FlipperZero™ based on Espressif and SBC boards.

CapibaraZero aim to be a cheap alternative to FlipperZero™. It&amp;#039;s based on ESP32 boards especially on ESP32-S3 but we want to port firmware to all ESP family boards.

- [CapibaraZero @ GitHub](https://github.com/CapibaraZero/).]]>
            </summary>
            <updated>2025-09-16T08:44:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10185</id>
            <title type="text"><![CDATA[YARA]]></title>
            <link rel="alternate" href="https://virustotal.github.io/yara/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10185"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The pattern matching swiss knife for malware researchers.

YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic.

- [YARA @ GitHub](https://github.com/virustotal/yara).
- [YARA documentation @ Read the Docs](https://yara.readthedocs.io/en/latest/)]]>
            </summary>
            <updated>2025-09-15T05:41:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10184</id>
            <title type="text"><![CDATA[PhishingKit-Yara-Rules]]></title>
            <link rel="alternate" href="https://stalkphish.com/products/phishingkit-yara-rules/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10184"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Repository of Yara rules dedicated to Phishing Kits Zip files.

This repository, dedicated to Phishing Kits zip files YARA rules, is based on zip raw format analysis to find directories and files names, you don&amp;#039;t need yara-extend there.

- [PhishingKit-Yara-Rules @ GitHub](https://github.com/t4d/PhishingKit-Yara-Rules).

Related contents:

- [Episode #513 conscacré à StalkPhish @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/stalkphish/).]]>
            </summary>
            <updated>2025-09-15T05:39:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10182</id>
            <title type="text"><![CDATA[OpenPhish]]></title>
            <link rel="alternate" href="https://openphish.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10182"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Timely. Accurate. Relevant Phishing Intelligence.

- [OpenPhish Community Phishing Feed @ GitHub](https://github.com/openphish/public_feed).

Related contents:

- [Episode #513 conscacré à StalkPhish @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/stalkphish/).]]>
            </summary>
            <updated>2025-09-15T05:35:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10160</id>
            <title type="text"><![CDATA[Aced]]></title>
            <link rel="alternate" href="https://github.com/garrettfoster13/aced" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10160"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Aced is a tool to parse and resolve a single targeted Active Directory principal&amp;#039;s DACL. Aced will identify interesting inbound access allowed privileges against the targeted account, resolve the SIDS of the inbound permissions, and present that data to the operator. Additionally, the logging features of pyldapsearch have been integrated with Aced to log the targeted principal&amp;#039;s LDAP attributes locally which can then be parsed by pyldapsearch&amp;#039;s companion tool BOFHound to ingest the collected data into BloodHound.]]>
            </summary>
            <updated>2025-09-12T09:49:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10154</id>
            <title type="text"><![CDATA[Harbor Guard]]></title>
            <link rel="alternate" href="https://harborguard.co/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10154"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Securing containers, one scan at a time.

 Harbor Guard is a comprehensive container security scanning platform that provides an intuitive web interface for managing and visualizing security assessments of Docker images.

- [Harbor Guard @ GitHub](https://github.com/HarborGuard/HarborGuard).]]>
            </summary>
            <updated>2025-09-12T07:43:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10134</id>
            <title type="text"><![CDATA[sandmap]]></title>
            <link rel="alternate" href="https://github.com/trimstray/sandmap" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10134"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles. 

sandmap is a tool supporting network and system reconnaissance using the massive Nmap engine. It provides a user-friendly interface, automates and speeds up scanning and allows you to easily use many advanced scanning techniques.]]>
            </summary>
            <updated>2025-09-11T13:42:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10123</id>
            <title type="text"><![CDATA[Composer Patches]]></title>
            <link rel="alternate" href="https://docs.cweagans.net/composer-patches/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10123"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A simple plugin for Composer that allows you to apply patches to your dependencies. 

- [Composer Patches @ GitHub](https://docs.cweagans.net/composer-patches/).

Related contents:

- [PHP: How to Apply Your Own Patches to Composer Packages @ How-To Geek](https://www.howtogeek.com/devops/how-to-apply-your-own-patches-to-composer-packages/).
- [Patch dependencies with composer-patches @ Nerdpress.org](https://nerdpress.org/2025/04/11/patch-dependencies-with-composer-patches/).]]>
            </summary>
            <updated>2025-09-11T07:29:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10122</id>
            <title type="text"><![CDATA[SniperPhish]]></title>
            <link rel="alternate" href="https://sniperphish.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10122"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Web-Email Spear Phishing Toolkit.
An open-source phishing toolkit to simulate real-world phishing attacks that comprise phishing email and website.

SniperPhish (SP in short) is a phishing toolkit for pentester or security professionals to enhance user awareness by simulating real-world phishing attacks. SniperPhish helps to combine both phishing emails and phishing websites you created to centrally track user actions. The tool is designed in a view of performing professional phishing exercise and would be reminded to take prior permission from the targeted organization to avoid legal implications.

- [SniperPhish @ GitHub](https://github.com/GemGeorge/SniperPhish).]]>
            </summary>
            <updated>2025-09-11T06:54:07+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10084</id>
            <title type="text"><![CDATA[sha1collisiondetection]]></title>
            <link rel="alternate" href="https://github.com/cr-marcstevens/sha1collisiondetection" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10084"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Library and command line tool to detect SHA-1 collision in a file.

Related contents:

- [Turning Github Actions into an oracle @ Ethan Heilman](https://www.ethanheilman.com/x/35/index.html).]]>
            </summary>
            <updated>2025-09-09T11:26:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10081</id>
            <title type="text"><![CDATA[PostgreSQL MCP Server]]></title>
            <link rel="alternate" href="https://github.com/modelcontextprotocol/servers-archived/tree/main/src/postgres" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10081"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Model Context Protocol server that provides read-only access to PostgreSQL databases. This server enables LLMs to inspect database schemas and execute read-only queries.

Related contents:

- [MCP vulnerability case study: SQL injection in the Postgres MCP server @ Datadog](https://securitylabs.datadoghq.com/articles/mcp-vulnerability-case-study-SQL-injection-in-the-postgresql-mcp-server/).]]>
            </summary>
            <updated>2025-09-09T08:06:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10077</id>
            <title type="text"><![CDATA[ghbuster]]></title>
            <link rel="alternate" href="https://github.com/DataDog/ghbuster" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10077"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A tool to identify and investigate inauthentic GitHub user accounts and repositories.

ghbuster is a tool to detect suspicious GitHub repositories and users using heuristics. It is designed to help identify potentially malicious or inauthentic accounts and repositories on GitHub.

Related contents:

-  [GHBuster - Le détecteur de comptes GitHub bidons de DataDog @ Korben :fr:](https://korben.info/ghbuster-datadog-devoile-son-detecteur-comptes.html).]]>
            </summary>
            <updated>2025-09-15T08:49:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10066</id>
            <title type="text"><![CDATA[Semgrep App Security Platform]]></title>
            <link rel="alternate" href="https://semgrep.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10066"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AI-assisted SAST, SCA and Secrets Detection.
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code. 

Semgrep is a fast, open-source, static analysis tool that searches code, finds bugs, and enforces secure guardrails and coding standards. Semgrep supports 30+ languages and can run in an IDE, as a pre-commit check, and as part of CI/CD workflows.

- [Sempgrep @ GitHub](https://github.com/semgrep/semgrep).

Related contents:

- [Keeping Secrets Out of Logs @ allan.reyes.sh](https://allan.reyes.sh/posts/keeping-secrets-out-of-logs/).
- [Blueprinting Security in CI/CD: Building Trust Through Open Source @ CD Foundation](https://cd.foundation/blog/2026/02/06/blueprinting-security/).]]>
            </summary>
            <updated>2026-02-18T13:12:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10051</id>
            <title type="text"><![CDATA[vulners-lookup]]></title>
            <link rel="alternate" href="https://github.com/vulnersCom/vulners-lookup" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10051"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Chrome extension that highlights CVE identifiers and displays critical information directly on any webpage. No need to navigate elsewhere. 

- [Vulners Lookup @ Chrome web store](https://chromewebstore.google.com/detail/vulners-lookup/pkhbdkfenifidcejinfbgjdalelamaao).

Related contents:

- [Vulners Lookup transforme votre navigateur en catalogue de vulnérabilités @ Korben :fr:](https://korben.info/vulners-lookup-extension-chrome-cve-vulnerabilites.html).]]>
            </summary>
            <updated>2025-09-08T11:23:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10044</id>
            <title type="text"><![CDATA[WiFi password stealer]]></title>
            <link rel="alternate" href="https://github.com/AleksaMCode/WiFi-password-stealer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10044"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password). 

Have you ever seen a movie where a hacker plugs a seemingly ordinary USB drive into a computer and instantly steals data? Today, you&amp;#039;ll be building a device that does exactly that.

Related contents:

- [Transformer un Raspberry Pi Pico à 4€ en outil de récupération de mots de passe WiFi @ Korben :fr:](https://korben.info/transformer-raspberry-pico-outil-recuperation-mots.html).]]>
            </summary>
            <updated>2025-09-08T10:23:07+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10038</id>
            <title type="text"><![CDATA[BruteForceAI]]></title>
            <link rel="alternate" href="https://github.com/MorDavid/BruteForceAI" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10038"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks.

Related contents:

- [BruteForceAI - L&amp;#039;IA qui cracke vos mots de passe @ Korben :fr:](https://korben.info/bruteforceai.html).
- [BruteForceAI: Free AI-powered login brute force tool @ Help Net Security](https://www.helpnetsecurity.com/2025/09/03/bruteforceai-free-ai-powered-login-brute-force-tool/).]]>
            </summary>
            <updated>2025-09-08T10:03:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10037</id>
            <title type="text"><![CDATA[PassGAN]]></title>
            <link rel="alternate" href="https://github.com/brannondorsey/PassGAN" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10037"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Deep Learning Approach for Password Guessing.

Related contents:

- [BruteForceAI - L&amp;#039;IA qui cracke vos mots de passe @ Korben :fr:](https://korben.info/bruteforceai.html).
- [BruteForceAI: Free AI-powered login brute force tool @ Help Net Security](https://www.helpnetsecurity.com/2025/09/03/bruteforceai-free-ai-powered-login-brute-force-tool/).]]>
            </summary>
            <updated>2025-09-08T10:01:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10036</id>
            <title type="text"><![CDATA[ChopChop]]></title>
            <link rel="alternate" href="https://github.com/michelin/ChopChop" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10036"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT.

Its goal is to scan several endpoints and identify exposition of services/files/folders through the webroot. Checks/Signatures are declared in a config file (by default: chopchop.yml), fully configurable, and especially by developers.]]>
            </summary>
            <updated>2025-09-08T08:17:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10005</id>
            <title type="text"><![CDATA[Frida]]></title>
            <link rel="alternate" href="https://frida.re/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10005"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A world-class dynamic instrumentation toolkit.
Observe and reprogram running programs on Windows, macOS, GNU/Linux, iOS, watchOS, tvOS, Android, FreeBSD, and QNX.

Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.

- [Frida @ GitHub](https://github.com/frida/frida).
- [Frida CodeShare](https://codeshare.frida.re/).

Related contents:

- [Frida Workbench for VSCode @ GitHub](https://github.com/ChiChou/vscode-frida).
- [Injecter du javascript dans une application native Windows, OSX, Linux, iOS ou Android @ Korben :fr:](https://korben.info/injecter-du-javascript-dans-une-application-native-windows-osx-linux-ios-ou-android.html).
- [Frida CodeShare - La bibliothèque communautaire du reverse engineering @ Korben :fr:](https://korben.info/frida-codeshare-reverse-engineering.html).
- [Resurrecting Crimsonland @ banteg](https://banteg.xyz/posts/crimsonland/).]]>
            </summary>
            <updated>2026-04-03T13:51:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10004</id>
            <title type="text"><![CDATA[Have I Been Pwned]]></title>
            <link rel="alternate" href="https://haveibeenpwned.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10004"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Check if your email address has been exposed in a data breach.

Related contents:

- [Troy Hunt - L&amp;#039;histoire du créateur de Have I Been Pwned @ Korben :fr:](https://korben.info/troy-hunt-developpeur-chez-pfizer-gardien.html).]]>
            </summary>
            <updated>2025-09-04T12:43:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2</id>
            <title type="text"><![CDATA[Trapster Community]]></title>
            <link rel="alternate" href="https://docs.trapster.cloud/community/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Multi-services Honeypot Solution with AI support and dynamic HTTP template.

Trapster Community is a low-interaction honeypot designed to be deployed on internal networks or to capture credentials. It is built to monitor and detect suspicious activities, providing a deceptive layer to network security.

Trapster Community Edition is a powerful open-source honeypot solution designed to enhance your network security. By acting as a decoy system within your infrastructure, Trapster helps detect and track potential threats, providing valuable insights into attacker behavior and network security posture.

- [Trapster Community @ GitHub](https://github.com/0xBallpoint/trapster-community).]]>
            </summary>
            <updated>2025-09-04T08:39:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/56</id>
            <title type="text"><![CDATA[Buttercup]]></title>
            <link rel="alternate" href="https://github.com/trailofbits/buttercup" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/56"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Buttercup is a Cyber Reasoning System (CRS) developed by Trail of Bits for the DARPA AIxCC (AI Cyber Challenge). Buttercup finds and patches software vulnerabilities in open-source code repositories like example-libpng. It starts by running an AI/ML-assisted fuzzing campaign (built on oss-fuzz) for the program. When vulnerabilities are found, Buttercup analyzes them and uses a multi-agent AI-driven patcher to repair the vulnerability.

Related contents:

- [Buttercup - L&amp;#039;IA qui trouve et patche automatiquement les failles de sécurité @ Korben :fr:](https://korben.info/buttercup-trouve-patche-automatiquement-failles-securite.html).]]>
            </summary>
            <updated>2025-09-04T08:40:36+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/83</id>
            <title type="text"><![CDATA[CodeRunner]]></title>
            <link rel="alternate" href="https://github.com/instavm/coderunner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/83"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Run AI Generated Code Locally.
A secure local sandbox to run LLM-generated code using Apple containers.

CodeRunner is an MCP (Model Context Protocol) server that executes AI-generated code in a sandboxed environment on your Mac using Apple&amp;#039;s native containers.

Related contents:

- [I Want Everything Local — Building My Offline AI Workspace @ InstaVM](https://instavm.io/blog/building-my-offline-ai-workspace).
- [Accelerate developer productivity with these 9 open source AI and MCP projects @ GitHub blog](https://github.blog/open-source/accelerate-developer-productivity-with-these-9-open-source-ai-and-mcp-projects/).]]>
            </summary>
            <updated>2025-10-27T14:06:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/117</id>
            <title type="text"><![CDATA[Destroylist]]></title>
            <link rel="alternate" href="https://github.com/phishdestroy/destroylist" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/117"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Phishing &amp;amp; Scam Domain Blacklist.

 An up-to-date blacklist of phishing and scam domains, automatically updated by the PhishDestroy system. A reliable threat intelligence source for integration into security systems.]]>
            </summary>
            <updated>2025-10-15T15:29:07+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/131</id>
            <title type="text"><![CDATA[Ferriskey]]></title>
            <link rel="alternate" href="https://ferriskey.rs/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/131"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Unlock the Future of Identity. Modern IAM written in Rust.

A blazing-fast IAM, powered by Rust. Open, secure, ready for your cloud journey.

 FerrisKey is an open-source IAM solution designed for modern cloud-native environments. With its high-performance API written in Rust and its intuitive web interface developed in Typescript/React, FerrisKey offers a robust and flexible alternative to traditional IAM solutions. 

- [Ferriskey @ GitHub](https://github.com/ferriskey/ferriskey).]]>
            </summary>
            <updated>2025-10-16T09:06:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/138</id>
            <title type="text"><![CDATA[OdooMap]]></title>
            <link rel="alternate" href="https://github.com/MohamedKarrab/odoomap" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/138"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A penetration testing tool for odoo applications. 

OdooMap is a reconnaissance, enumeration, and security testing tool for Odoo applications.

Related contents:

- [OdooMap - L&amp;#039;outil de pentest qui fait trembler les installations Odoo mal sécurisées @ Korben :fr:](https://korben.info/odoomap-outil-pentest-fait-trembler-installations.html).]]>
            </summary>
            <updated>2025-10-16T12:06:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/159</id>
            <title type="text"><![CDATA[GCVE - Global CVE Allocation System :lu: :eu:]]></title>
            <link rel="alternate" href="https://gcve.eu/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/159"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Global CVE (GCVE) allocation system is a new, decentralized approach to vulnerability identification and numbering, designed to improve flexibility, scalability, and autonomy for participating entities.

While remaining compatible with the traditional CVE system, GCVE introduces GCVE Numbering Authorities (GNAs). GNAs are independent entities that can allocate identifiers without relying on a centralised block distribution system or rigid policy enforcement.

- [gcve.eu @ GitHub](https://github.com/gcve-eu/).

Related contents:

- [Episode \#499 consacré aux référentiels de vulnérabilités @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/referentiels-de-vulnerabilites/).]]>
            </summary>
            <updated>2025-10-20T09:18:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/160</id>
            <title type="text"><![CDATA[CNVD - 国家信息安全漏洞共享平台 - China National Vulnerability Database :cn:]]></title>
            <link rel="alternate" href="https://www.cnvd.org.cn/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/160"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Related contents:

- [LABScon Replay | Is CNVD ≥ CVE? A Look at Chinese Vulnerability Discovery and Disclosure @ SentinelOne&amp;#039;s YouTube](https://www.youtube.com/watch?v=6BtnGo3-K6Y).
- [Episode \#499 consacré aux référentiels de vulnérabilités @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/referentiels-de-vulnerabilites/).]]>
            </summary>
            <updated>2025-10-20T09:18:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/161</id>
            <title type="text"><![CDATA[NVD - National Vulnerability Database :us:]]></title>
            <link rel="alternate" href="https://nvd.nist.gov/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/161"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.

Related contents:

- [Episode \#499 consacré aux référentiels de vulnérabilités @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/referentiels-de-vulnerabilites/).
- [NVD Program Announcement UPDATED - April, 25th 2024 @ NIST](https://nvd.nist.gov/general/news/nvd-program-transition-announcement).]]>
            </summary>
            <updated>2026-03-24T14:25:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/206</id>
            <title type="text"><![CDATA[Autoswagger]]></title>
            <link rel="alternate" href="https://github.com/intruder-io/autoswagger/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/206"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[detect API auth weaknesses.

Autoswagger is a command-line tool designed to discover, parse, and test for unauthenticated endpoints using Swagger/OpenAPI documentation. It helps identify potential security issues in unprotected endpoints of APIs, such as PII leaks and common secret exposures.

Related contents:

- [AutoSwagger - L&amp;#039;outil gratuit qui trouve les failles d&amp;#039;API que les hackers adorent @ Korben :fr:](https://korben.info/autoswagger-outil-gratuit-trouve-failles-api.html).]]>
            </summary>
            <updated>2025-10-27T15:09:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/207</id>
            <title type="text"><![CDATA[Thorium :us:]]></title>
            <link rel="alternate" href="https://cisagov.github.io/thorium/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/207"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale. 

Thorium is a highly scalable, distributed malware analysis and data generation framework. Thorium is designed to make cyber incident response, triage, and file analysis easier through the safe ingestion and storage of data, automation of analyses and easy access to stored analyses and metadata. Because of the sensitivity and potential maliciousness of data handled within Thorium, uploaded files are placed into an encrypted/neutered format called CaRT. After initial file upload, all analysis is conducted in sandboxed environments where protective measures and sanitization steps can be easily applied.

- [Thorium @ GitHub](https://github.com/cisagov/thorium).

Related contents:

- [Thorium: A Scalable Platform for Automated File Analysis and Result Aggregation @ CISA](https://www.cisa.gov/resources-tools/resources/thorium).
- [CISA open-sources Thorium platform for malware, forensic analysis @ Bleeping Computer](https://www.bleepingcomputer.com/news/security/cisa-open-sources-thorium-platform-for-malware-forensic-analysis/).]]>
            </summary>
            <updated>2026-04-09T09:10:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/274</id>
            <title type="text"><![CDATA[Calico]]></title>
            <link rel="alternate" href="https://www.tigera.io/project-calico/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/274"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cloud native networking and network security.

Calico is a single platform for networking, network security, and observability for any Kubernetes distribution in the cloud, on-premises, or at the edge. Whether you&amp;#039;re just starting with Kubernetes or operating at scale, Calico&amp;#039;s open source, enterprise, and cloud editions provide the networking, security, and observability you need.

- [Calico @ GitHub](https://github.com/projectcalico/calico).
- [Calico documentation](https://docs.tigera.io/calico/latest/about/).

Related contents:

- [Kubernetes Is Powerful, But Not Secure (at least not by default) @ Tigera](https://www.tigera.io/blog/kubernetes-is-powerful-but-not-secure-at-least-not-by-default/).
- [What’s New in Calico v3.31: eBPF, NFTables, and More @ Tigera](https://www.tigera.io/blog/whats-new-in-calico-v3-31-ebpf-nftables-and-more/).
- [An In-Depth Look at Istio Ambient Mode with Calico @ Tigera](https://www.tigera.io/blog/an-in-depth-look-at-istio-ambient-mode-with-calico/).]]>
            </summary>
            <updated>2025-12-12T13:09:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/281</id>
            <title type="text"><![CDATA[💀 Sploitus]]></title>
            <link rel="alternate" href="https://sploitus.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/281"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Exploit &amp;amp; Hacktool Search Engine.

Related contents:

- [Sploitus - Le Google des exploits et des outils de hacking @ Korben :fr:](https://korben.info/sploitus-google-exploits-outils-hacking.html).]]>
            </summary>
            <updated>2025-11-12T16:24:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/332</id>
            <title type="text"><![CDATA[Tetragon]]></title>
            <link rel="alternate" href="https://tetragon.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/332"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[eBPF-based Security Observability and Runtime Enforcement.

Tetragon is a flexible Kubernetes-aware security observability and runtime enforcement tool that applies policy and filtering directly with eBPF, allowing for reduced observation overhead, tracking of any process, and real-time enforcement of policies.

- [Tetragon @ GitHub](https://github.com/cilium/tetragon/).

Related contents:

- [Automated Kubernetes Threat Detection with Tetragon and Azure Sentinel @ Saraswathi Lakshman&amp;#039;s Medium](https://saraswathilakshman.medium.com/automated-kubernetes-threat-detection-with-tetragon-and-azure-sentinel-28c32ee152bc).
- [Tetragon: An End-of-Year 2025 Reflection @ Cilium](https://cilium.io/blog/2025/12/31/tetragon-2025-review/).
- [Mon premier contact avec Tetragon @ Le blog de Little Jo :fr:](https://blog.littlejo.link/tetragon/started/).
- [First Contact with Tetragon @ The Little Jo&amp;#039;s Blog](https://blog.littlejo.link/en/tetragon/started/).]]>
            </summary>
            <updated>2026-04-21T07:54:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/336</id>
            <title type="text"><![CDATA[Casvisor]]></title>
            <link rel="alternate" href="https://casvisor.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/336"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An open-source security log auditing &amp;amp; RDP, VNC, SSH and databases management bastion platform.

- [Casvisor @ GitHub](https://github.com/casvisor/casvisor).]]>
            </summary>
            <updated>2026-01-20T15:25:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/345</id>
            <title type="text"><![CDATA[XENA]]></title>
            <link rel="alternate" href="https://xena.network/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/345"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Your Security Partner. Cybersecurity, Redefined.
XENA is an inovative C2 made fully in Go. 

XENA is designed for offensive cybersecurity, particularly for red team operations, penetration testing, and adversary simulations. Making it suitable for professionals conducting security assessments. 

XENA is Cross-Platform Software for Cyber-Security Automation, Adversary Simulations, and Red Team Operations.
XENA strives to be fully integrated security penetration testing framework. It is equipped with a post-exploitation agent, C2 server, and a dark-themed elegant user interface running on Desktop, Web, and Mobile.

- [XENA @ GitHub](https://github.com/zarkones/XENA).]]>
            </summary>
            <updated>2026-01-21T13:12:41+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/355</id>
            <title type="text"><![CDATA[Opengrep]]></title>
            <link rel="alternate" href="https://www.opengrep.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/355"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🔎 Static code analysis engine to find security issues in code. 
Opengrep, a fork of Semgrep, under the LGPL 2.1 license.

Opengrep is an ultra-fast static analysis tool for searching code patterns with the power of semantic grep. Analyze large code bases at the speed of thought with intuitive pattern matching and customizable rules. Find and fix security vulnerabilities, fast – ship more secure code.

Opengrep supports 30+ languages, including:

Apex · Bash · C · C++ · C# · Clojure · Dart · Dockerfile · Elixir · HTML · Go · Java · JavaScript · JSX · JSON · Julia · Jsonnet · Kotlin · Lisp · Lua · OCaml · PHP · Python · R · Ruby · Rust · Scala · Scheme · Solidity · Swift · Terraform · TypeScript · TSX · YAML · XML · Generic (ERB, Jinja, etc.)

- [Opengrep @ GitHub](https://github.com/opengrep/opengrep).
- [Opengrep Rules @ GitHub](https://github.com/opengrep/opengrep-rules).]]>
            </summary>
            <updated>2026-01-21T08:58:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/366</id>
            <title type="text"><![CDATA[Kanvas]]></title>
            <link rel="alternate" href="https://findevil.io/Kanvas-page/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/366"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Kanvas for Incident Response.

A DF/IR case management tool that provides a unified workspace for investigators enabling key workflows to be completed without switching between multiple applications.

- [Kanvas @ GitHub](https://github.com/WithSecureLabs/Kanvas).]]>
            </summary>
            <updated>2026-01-20T15:30:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/367</id>
            <title type="text"><![CDATA[Loki]]></title>
            <link rel="alternate" href="https://github.com/Neo23x0/Loki" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/367"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Simple IOC and YARA Scanner.
Scanner for Simple Indicators of Compromise.]]>
            </summary>
            <updated>2026-01-20T15:30:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/375</id>
            <title type="text"><![CDATA[tsbridge]]></title>
            <link rel="alternate" href="https://github.com/jtdowney/tsbridge" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/375"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A lightweight proxy manager built on Tailscale&amp;#039;s tsnet library that enables multiple HTTPS services on a Tailnet]]>
            </summary>
            <updated>2026-02-11T07:14:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/399</id>
            <title type="text"><![CDATA[Cameradar]]></title>
            <link rel="alternate" href="https://github.com/Ullaakut/cameradar" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/399"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cameradar hacks its way into RTSP videosurveillance cameras.

Related contents:

- [Cameradar - L&amp;#039;outil qui trouve et accède aux caméras de surveillance mal sécurisées @ Korben :fr:](https://korben.info/cameradar-scanner-rtsp-cameras-surveillance-test-securite.html).]]>
            </summary>
            <updated>2026-02-11T07:15:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/400</id>
            <title type="text"><![CDATA[Federated Open Key Service (FOKS)]]></title>
            <link rel="alternate" href="https://foks.pub/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/400"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[FOKS provides a secure, end-to-end encrypted Git hosting service. Your data is encrypted on your machine before it is sent to the server, and the server never sees data or filenames in unencrypted form. This means that even if the server is compromised, your data is safe. FOKS is federated, so the git server can be one that you host, or one that is hosted for you. 

- [Federated Open Key Service (FOKS) @ GitHub](https://github.com/foks-proj/go-foks).

Related contents:

- [Announcing FOKS, the Federated Open Key Service @ FOKS](https://blog.foks.pub/posts/introducing/).]]>
            </summary>
            <updated>2026-02-11T07:15:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/408</id>
            <title type="text"><![CDATA[SOPS: Secrets OPerationS]]></title>
            <link rel="alternate" href="https://getsops.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/408"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SOPS is an editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, age, and PGP

- [SOPS @ GitHub](https://github.com/getsops/sops).

Related contents:

- [pre-commit-hook-ensure-sops @ GitHub](https://github.com/yuvipanda/pre-commit-hook-ensure-sops).
- [Managing Kubernetes Secrets with Mozilla SOPS and AGE @ Cyril Baah&amp;#039;s Medium](https://medium.com/@cbaah123/managing-kubernetes-secrets-with-mozilla-sops-and-age-780c84e6ec5e).]]>
            </summary>
            <updated>2026-03-06T07:15:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/425</id>
            <title type="text"><![CDATA[ProxyAuth]]></title>
            <link rel="alternate" href="https://proxyauth.app/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/425"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[ProxyAuth secures backend APIs through a fast authentication gateway. It encrypts tokens using ChaCha20 + HMAC-SHA256, with config-defined secrets. It features built-in rate limiting (on proxy and auth routes) and uses Argon2 with auto-generated salts for secure password hashing. The service is extremely fast, handling 100,000+ requests per second under load.

- [ProxyAuth @ GitHub](https://github.com/vBlackOut/ProxyAuth).

Related contents:

- [ProxyAuth - Le proxy d&amp;#039;authentification en Rust qui envoie du pâté à 100 000 requêtes/seconde @ Korben :fr:](https://korben.info/proxyauth-proxy-authentification-rust-envoie-pate.html).]]>
            </summary>
            <updated>2025-11-05T15:45:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/440</id>
            <title type="text"><![CDATA[Force Push Secret Scanner]]></title>
            <link rel="alternate" href="https://github.com/trufflesecurity/force-push-scanner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/440"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Scan for secrets in dangling commits on GitHub using GH Archive data. 

This tool scans for secrets in dangling (dereferenced) commits on GitHub created by force push events. A force push occurs when developers overwrite commit history, which often contains mistakes, like hard-coded credentials. This project relies on archived force push event data in the GHArchive to identify the relevant commits.

Related contents:

- [Guest Post: How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets @ Truffle Security](https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets).
- [Comment un hacker a scanné tous les commits &amp;quot;oops&amp;quot; de GitHub et trouvé 25k$ de secrets @ Korben :fr:](https://korben.info/hacker-scanne-tous-commits-oops-github.html).]]>
            </summary>
            <updated>2025-08-28T17:10:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/451</id>
            <title type="text"><![CDATA[CertMate]]></title>
            <link rel="alternate" href="https://github.com/fabriziosalmi/certmate" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/451"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSL Certificate Management System (API + UI).

CertMate is a powerful SSL certificate management system designed for modern infrastructure. Built with multi-DNS provider support, Docker containerization, and comprehensive REST API, it&amp;#039;s the perfect solution for managing certificates across multiple datacenters and cloud environments.]]>
            </summary>
            <updated>2025-08-28T17:13:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/464</id>
            <title type="text"><![CDATA[kubechecks]]></title>
            <link rel="alternate" href="https://kubechecks.readthedocs.io/en/latest/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/464"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Fearless Kubernetes App Updates.
Check your Kubernetes manifests before it hits the cluster.

kubechecks allows users of Github and Gitlab to see exactly what their changes will affect on their current ArgoCD deployments, as well as automatically run various conformance test suites prior to merge.

- [kubechecks @ GitHub](https://github.com/zapier/kubechecks).]]>
            </summary>
            <updated>2025-08-28T17:14:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/467</id>
            <title type="text"><![CDATA[vet]]></title>
            <link rel="alternate" href="https://getvet.sh/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/467"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A safer way to run remote scripts.

Stop blindly piping to bash. vet lets you inspect remote scripts for changes, run them through a linter, and require your explicit approval before they can execute.

 vet is a command-line tool that acts as a safety net for the risky curl | bash pattern. It lets you inspect, diff against previous versions, and lint remote scripts before asking for your explicit approval to execute. Promoting a safer, more transparent way to handle remote code execution. 

- [vet @ GitHub](https://github.com/vet-run/vet).]]>
            </summary>
            <updated>2025-08-28T17:15:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/475</id>
            <title type="text"><![CDATA[Kingfisher]]></title>
            <link rel="alternate" href="https://github.com/mongodb/kingfisher" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/475"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Kingfisher is a blazingly fast secret‑scanning and validation tool built in Rust. It combines Intel’s hardware‑accelerated Hyperscan regex engine with language‑aware parsing via Tree‑Sitter, and ships with hundreds of built‑in rules to detect, validate, and triage secrets before they ever reach production.

Related contents:

- [MongoDB Launches an Open Source Real-Time Secret Scanner @ It&amp;#039;s FOSS News](https://news.itsfoss.com/mongodb-launches-kingfisher/).]]>
            </summary>
            <updated>2025-09-29T05:52:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/488</id>
            <title type="text"><![CDATA[UUSEC WAF :cn:]]></title>
            <link rel="alternate" href="https://uuwaf.uusec.com/#/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/488"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Don&amp;#039;t hit the south wall, don&amp;#039;t turn back.
An industry-leading free, high-performance, AI and semantic technology web application and API security protection product.

UUSEC WAF Web Application Firewall is an industrial grade free, high-performance, and highly scalable web application and API security protection product that supports AI and semantic engines. It is a comprehensive website protection product launched by UUSEC Technology, which first realizes the three-layer defense function of traffic layer, system layer, and runtime layer.

- [UUSEC WAF @ GitHub](https://github.com/Safe3/uuWAF).]]>
            </summary>
            <updated>2025-08-28T17:18:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/547</id>
            <title type="text"><![CDATA[Tinyauth]]></title>
            <link rel="alternate" href="https://tinyauth.app/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/547"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Login screen for your apps.
The simplest way to protect your apps with a login screen.

Tinyauth is a simple authentication middleware that adds a simple login screen or OAuth with Google, Github and any provider to all of your docker apps. It supports all the popular proxies like Traefik, Nginx and Caddy.

- [Tinyauth @ GitHub](https://github.com/steveiliop56/tinyauth).

Related contents:

- [TinyAuth - L&amp;#039;authentification Docker en mode &amp;quot;j&amp;#039;ai pas le temps de me prendre la tête&amp;quot; @ Korben :fr:](https://korben.info/tinyauth-authentification-docker-mode-pas-temps.html).]]>
            </summary>
            <updated>2025-08-28T17:30:00+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/567</id>
            <title type="text"><![CDATA[OWASP Nettacker]]></title>
            <link rel="alternate" href="https://owasp.org/www-project-nettacker/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/567"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management.

OWASP Nettacker project was created to automate information gathering, vulnerability scanning and in general to aid penetration testing engagements. Nettacker is able to run various scans using a variety of methods and generate scan reports(in HTML/TXT/JSON/CSV format) for applications and networks, including discovering open ports, services, bugs, vulnerabilities, misconfigurations, default credentials, subdomains, etc. Nettacker can be run as a command-line utility (including running as a Docker container), API, Web GUI mode or as Maltego transforms.

- [OWASP Nettacker @ GitHub](https://github.com/OWASP/Nettacker).]]>
            </summary>
            <updated>2025-08-28T17:32:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/568</id>
            <title type="text"><![CDATA[Doors95]]></title>
            <link rel="alternate" href="https://doors95.de/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/568"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Interactive security awareness game simulating a retro Windows 95 environment to teach users about online scams and phishing attacks. 🏆 Hackaburg 2025 Winner.

Doors95 is an interactive browser game built to teach users about dangers they can encounter while doing (daily) tasks on a computer.
You are placed onto a simulated computer desktop inspired by Windows 95 and are guided through the different missions by our AI assistant Skippy. The main objective is to complete the task at hand without getting infected with viruses.

- [Doors95 @ GitHub](https://github.com/darius-it/doors95).]]>
            </summary>
            <updated>2025-08-28T17:32:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/570</id>
            <title type="text"><![CDATA[SpeculationControl]]></title>
            <link rel="alternate" href="https://github.com/Microsoft/SpeculationControl" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/570"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SpeculationControl is a PowerShell script that summarizes the state of configurable Windows mitigations for various speculative execution side channel vulnerabilities, such as CVE-2017-5715 (Spectre variant 2) and CVE-2017-5754 (Meltdown).

Related contents:

- [SpeculationControl - Un module PowerShell anti-Spectre / Meltdown @ Korben :fr:](https://korben.info/speculationcontrol-module-powershell-spectre-meltdown.html).]]>
            </summary>
            <updated>2025-08-28T17:34:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/590</id>
            <title type="text"><![CDATA[zizmor]]></title>
            <link rel="alternate" href="https://zizmor.sh/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/590"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[zizmor is a static analysis tool for GitHub Actions. It can find many common security issues in typical GitHub Actions CI/CD setups.

- [zizmor @ GitHub](https://github.com/zizmorcore/zizmor).

Related contents:

- [How to Harden GitHub Actions: The Unofficial Guide @ Wiz](https://www.wiz.io/blog/github-actions-security-guide).
- [How to detect vulnerable GitHub Actions at scale with Zizmor @ Grafana Labs Blog](https://grafana.com/blog/2025/06/26/how-to-detect-vulnerable-github-actions-at-scale-with-zizmor/).]]>
            </summary>
            <updated>2025-09-04T09:38:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/700</id>
            <title type="text"><![CDATA[MalwareBazaar]]></title>
            <link rel="alternate" href="https://bazaar.abuse.ch/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/700"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Malware sample exchange.

MalwareBazaar is a platform from abuse.ch and Spamhaus, dedicated to sharing malware samples with the infosec community, antivirus vendors, and threat intelligence providers. Upload malware samples and explore the database for valuable intelligence. Set alerts to track newly observed malware, use APIs to seamlessly push or pull signals, and automate bulk queries.

Related contents:

- [Découverte de MalwareBazaar : Ça ressemble à quoi, un malware ? @ IT-Connect :fr:](https://www.it-connect.fr/decouverte-de-malwarebazaar-ca-ressemble-a-quoi-un-malware/).]]>
            </summary>
            <updated>2025-08-28T17:54:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/751</id>
            <title type="text"><![CDATA[Vuls]]></title>
            <link rel="alternate" href="https://vuls.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/751"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Agentless Vulnerability Scanner for Linux/FreeBSD.

 Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices.

- [Vuls @ GitHub](https://github.com/future-architect/vuls).]]>
            </summary>
            <updated>2025-08-28T18:03:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/764</id>
            <title type="text"><![CDATA[Pipask]]></title>
            <link rel="alternate" href="https://github.com/feynmanix/pipask" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/764"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Safer python package installs with audit and consent 𝘣𝘦𝘧𝘰𝘳𝘦 install.

Pipask is a drop-in replacement for pip that performs security checks before installing a package. Unlike pip, which needs to download and execute code from source distribution first to get dependency metadata, pipask relies on metadata from PyPI whenever possible. If 3rd party code execution is necessary, pipask asks for consent first. The actual installation is handed over to pip if installation is approved.]]>
            </summary>
            <updated>2025-08-28T18:06:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/798</id>
            <title type="text"><![CDATA[Harden Windows Safely]]></title>
            <link rel="alternate" href="https://github.com/HotCakeX/Harden-Windows-Security" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/798"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Personal, Enterprise, Government and Military security level]]>
            </summary>
            <updated>2025-08-28T18:10:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/832</id>
            <title type="text"><![CDATA[Authgear ONCE]]></title>
            <link rel="alternate" href="https://www.authgear.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/832"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Own Your IAM with a Perpetual License.
 Open source alternative to Auth0 / Firebase Auth.

Authgear is an open-source extensible turnkey solution for all of your consumer authentication needs. Authgear gets you started in 5 minutes with developer-friendly SDKs and a comprehensive portal.

- [Authgear @ GitHub](https://github.com/authgear/authgear-server).]]>
            </summary>
            <updated>2025-08-28T18:16:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/843</id>
            <title type="text"><![CDATA[CVE2CAPEC]]></title>
            <link rel="alternate" href="https://galeax.github.io/CVE2CAPEC/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/843"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Generate a MITRE ATT&amp;amp;CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&amp;amp;CK Techniques data is updated daily. 

- [CVE2CAPEC @ GitHub](https://github.com/Galeax/CVE2CAPEC).]]>
            </summary>
            <updated>2025-08-28T18:18:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/887</id>
            <title type="text"><![CDATA[Patrowl :fr:]]></title>
            <link rel="alternate" href="https://patrowl.io/en/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/887"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SaaS External Security Posture Management.

Related contents:

- [Patrowl, prix du FIC 2025 @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/patrowl-prix-du-fic-2025/).]]>
            </summary>
            <updated>2025-08-28T18:26:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/890</id>
            <title type="text"><![CDATA[CVE Foundation]]></title>
            <link rel="alternate" href="https://www.thecvefoundation.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/890"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The CVE Foundation has been formally established to ensure the long-term viability, stability, and independence of the Common Vulnerabilities and Exposures (CVE) Program, a critical pillar of the global cybersecurity infrastructure for 25 years.

Related contents:

- [Inventaire des vulnérabilités : le programme du Mitre s’en va et puis revient @ LeMagIT :fr:](https://www.lemagit.fr/actualites/366622793/Inventaire-des-vulnerabilites-le-programme-du-Mitre-sen-va-et-puis-revient).]]>
            </summary>
            <updated>2025-08-28T18:26:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/925</id>
            <title type="text"><![CDATA[Vulnerability Database :eu:]]></title>
            <link rel="alternate" href="https://euvd.enisa.europa.eu/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/925"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[As per the NIS2 Directive, ENISA is mandated to develop and maintain the European vulnerability database.

Access to reliable and timely information about vulnerabilities affecting Information and Communication Technology (ICT) products and services contributes to an enhanced cybersecurity risk management. Sources of publicly available information about vulnerabilities are an important tool for users of these services, competent authorities, and the broader cybersecurity community. ENISA has established a European Vulnerability Database (EUVD) where entities, regardless of whether they fall within the scope of the NIS2 Directive, and their suppliers of network and information systems, as well as competent authorities, most notably CSIRTs, can voluntarily disclose and register publicly known vulnerabilities to allow users to take appropriate mitigating measures.]]>
            </summary>
            <updated>2025-08-28T18:31:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/935</id>
            <title type="text"><![CDATA[Teller]]></title>
            <link rel="alternate" href="https://github.com/tellerops/teller" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/935"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cloud native secrets management for developers - never leave your command line for secrets. 

Never leave your terminal to use secrets while developing, testing, and building your apps.

Instead of custom scripts, tokens in your .zshrc files, visible EXPORTs in your bash history, misplaced .env.production files and more around your workstation -- just use teller and connect it to any vault, key store, or cloud service you like (Teller support Hashicorp Vault, AWS Secrets Manager, Google Secret Manager, and many more).]]>
            </summary>
            <updated>2025-08-28T18:34:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/937</id>
            <title type="text"><![CDATA[MCP-Shield]]></title>
            <link rel="alternate" href="https://github.com/riseandignite/mcp-shield" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/937"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security scanner for MCP servers

MCP-Shield scans your installed MCP (Model Context Protocol) servers and detects vulnerabilities like tool poisoning attacks, exfiltration channels and cross-origin escalations.]]>
            </summary>
            <updated>2025-08-28T18:34:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/976</id>
            <title type="text"><![CDATA[Deceptifeed]]></title>
            <link rel="alternate" href="https://github.com/r-smith/deceptifeed" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/976"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Honeypot servers with an integrated threat feed.

Deceptifeed is a honeypot and threat feed server. It runs multiple deceptive network services (honeypots), while the threat feed lists IP addresses that have interacted with the honeypots. Additionally, Deceptifeed provides real-time visibility into honeypot activity, allowing you to monitor logs and interactions as they occur.]]>
            </summary>
            <updated>2025-08-28T18:40:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/998</id>
            <title type="text"><![CDATA[DNSDiag]]></title>
            <link rel="alternate" href="https://dnsdiag.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/998"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[DNS Measurement, Troubleshooting and Security Auditing Toolset.

Ever been wondering if your ISP is hijacking your DNS traffic? Ever observed any misbehavior with your DNS responses? Ever been redirected to wrong address and suspected something is wrong with your DNS? Here we have a set of tools to perform basic audits on your DNS requests and responses to make sure your DNS is working as you expect.

- [DNSDiag @ GitHub](https://github.com/farrokhi/dnsdiag).

Related contents:

- [Basic Network Troubleshooting @ Signs of Triviality](https://www.netmeister.org/blog/basic-network-troubleshooting.html).]]>
            </summary>
            <updated>2025-08-28T18:43:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1002</id>
            <title type="text"><![CDATA[Fix Inventory by Some Engineering Inc.]]></title>
            <link rel="alternate" href="https://fixinventory.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1002"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Fix Inventory is an open-source cloud asset inventory tool for infrastructure and security engineers.

Fix Inventory helps you identify and remove the most critical risks in AWS, GCP, Azure and Kubernetes. 

Fix Inventory enables a broad set of exploration and automation scenarios. Its foundation is a graph-based data model, which exposes resource metadata and dependency relationships between your service&amp;#039;s assets.

A powerful CLI allows you to search, explore, and manage your cloud resources.

- [Fix Inventory](https://github.com/someengineering/fixinventory).

Related contents:

- [Fix Inventory - L&amp;#039;alternative open source aux scanners de sécurité cloud à 100 000 boules l&amp;#039;année @ Korben :fr:](https://korben.info/fix-inventory-scanner-securite-cloud-open-source.html).]]>
            </summary>
            <updated>2025-08-28T18:44:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1010</id>
            <title type="text"><![CDATA[PhishTool]]></title>
            <link rel="alternate" href="https://phishtool.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1010"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PhishTool gives human analysts the power to reverse engineer phishing emails, to better defend against them. PhishTool is to phishing emails as a disassembler is to malware or a forensic toolkit is to file systems.

Related contents:

- [📧PhishTool Community - Forensic email analysis &amp;amp; incident response @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_security-cybersecurity-blueteam-activity-7314284297127952384-fMOa/).]]>
            </summary>
            <updated>2025-08-28T18:46:41+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1017</id>
            <title type="text"><![CDATA[Warpgate]]></title>
            <link rel="alternate" href="https://warpgate.null.page/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1017"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The last bastion

Secure access to your internal SSH, HTTPS, MySQL and Postgres servers with SSO and RBAC.

- [Warpgate @ GitHub](https://github.com/warp-tech/warpgate).

Related contents:

- [ Warpgate : Fini la galère des accès SSH et BDD : J’ai trouvé la perle rare ! 🚀 @ Le Geek Heureux :fr:](https://legeekheureux.fr/warpgate-fini-la-galere-des-acces-ssh-et-bdd-jai-trouve-la-perle-rare-%F0%9F%9A%80/).
- [Warpgate - You shall not pass! @ À l&amp;#039;encre rouillée :fr:](https://david.drugeon-hamon.bzh/blog/2025/11/warpgate/).]]>
            </summary>
            <updated>2025-11-05T10:42:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1028</id>
            <title type="text"><![CDATA[The Update Framework (TUF)]]></title>
            <link rel="alternate" href="https://theupdateframework.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1028"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A framework for securing software update systems.

The Update Framework (TUF) maintains the security of software update systems, providing protection even against attackers that compromise the repository or signing keys. TUF provides a flexible framework and specification that developers can adopt into any software update system.

- [The Update Framework specification @ GitHub](https://github.com/theupdateframework/specification).
- [python-tuf @ GitHub](https://github.com/theupdateframework/python-tuf).

Related contents:

- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).
- [Secure publication of Datadog Agent integrations with TUF and in-toto @ Datadog](https://www.datadoghq.com/blog/engineering/secure-publication-of-datadog-agent-integrations-with-tuf-and-in-toto/).]]>
            </summary>
            <updated>2025-08-28T18:48:41+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1029</id>
            <title type="text"><![CDATA[OpenSSF Scorecard]]></title>
            <link rel="alternate" href="https://openssf.org/projects/scorecard/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1029"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenSSF Scorecard assesses open source projects for security risks through a series of automated checksIt was created by OSS developers to help improve the health of critical projects that the community depends on.

You can use it to proactively assess and make informed decisions about accepting security risks within your codebase. You can also use the tool to evaluate other projects and dependencies, and work with maintainers to improve codebases you might want to integrate.

Scorecard is an automated tool that assesses a number of important heuristics (&amp;quot;checks&amp;quot;) associated with software security and assigns each check a score of 0-10. You can use these scores to understand specific areas to improve in order to strengthen the security posture of your project. You can also assess the risks that dependencies introduce, and make informed decisions about accepting these risks, evaluating alternative solutions, or working with the maintainers to make improvements.

- [OpenSSF Scorecard @ GitHub](https://github.com/ossf/scorecard).

Related contents:

- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).]]>
            </summary>
            <updated>2025-08-28T18:48:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1030</id>
            <title type="text"><![CDATA[Package Analysis – Open Source Security Foundation]]></title>
            <link rel="alternate" href="https://openssf.org/package-analysis/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1030"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Package Analysis project analyses the capabilities of packages available on open source repositories. The project looks for behaviors that indicate malicious software:

- What files do they access?
- What addresses do they connect to?
- What commands do they run?

- [Package Feeds @ GitHub](https://github.com/ossf/package-feeds).

Related contents:

- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).]]>
            </summary>
            <updated>2025-08-28T18:48:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1031</id>
            <title type="text"><![CDATA[in-toto]]></title>
            <link rel="alternate" href="https://in-toto.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1031"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A framework to secure the integrity of software supply chains.

in-toto is designed to ensure the integrity of a software product from initiation to end-user installation. It does so by making it transparent to the user what steps were performed, by whom and in what order.

- [in-toto](https://in-toto.github.io/).
- [in-toto @ GitHub](https://github.com/in-toto/in-toto).

Related contents:

- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).
- [Secure publication of Datadog Agent integrations with TUF and in-toto @ Datadog](https://www.datadoghq.com/blog/engineering/secure-publication-of-datadog-agent-integrations-with-tuf-and-in-toto/).]]>
            </summary>
            <updated>2025-08-28T18:48:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1032</id>
            <title type="text"><![CDATA[Supply-Chain Firewall]]></title>
            <link rel="alternate" href="https://github.com/DataDog/supply-chain-firewall/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1032"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A tool for preventing the installation of malicious PyPI and npm packages 🔥.

Supply-Chain Firewall is a command-line tool for preventing the installation of malicious PyPI and npm packages. It is intended primarily for use by engineers to protect their development workstations from compromise in a supply-chain attack.

Related contents:

- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).]]>
            </summary>
            <updated>2025-08-28T18:48:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1033</id>
            <title type="text"><![CDATA[Malicious Software Packages Dataset]]></title>
            <link rel="alternate" href="https://github.com/DataDog/malicious-software-packages-dataset/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1033"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An open-source dataset of malicious software packages found in the wild, 100% vetted by humans. 

This repository is an open-source dataset of 5938 malicious software packages (and counting) identified by Datadog, as part of our security research efforts in software supply-chain security. Most of the malicious packages have been identified by GuardDog.

Related contents:

- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).]]>
            </summary>
            <updated>2025-08-28T18:50:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1034</id>
            <title type="text"><![CDATA[GuardDog]]></title>
            <link rel="alternate" href="https://github.com/DataDog/guarddog" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1034"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🐍 🔍 GuardDog is a CLI tool to Identify malicious PyPI and npm packages.

GuardDog is a CLI tool that allows to identify malicious PyPI and npm packages or Go modules. It runs a set of heuristics on the package source code (through Semgrep rules) and on the package metadata.
GuardDog can be used to scan local or remote PyPI and npm packages or Go modules using any of the available heuristics.

Related contents:

- [Finding malicious PyPI packages through static code analysis: Meet GuardDog @ Datadog Security Labs](https://securitylabs.datadoghq.com/articles/guarddog-identify-malicious-pypi-packages/).
- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).]]>
            </summary>
            <updated>2025-08-28T18:50:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1043</id>
            <title type="text"><![CDATA[MSAPatcher]]></title>
            <link rel="alternate" href="https://github.com/builtbybel/MSAPatcher" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1043"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Bypass Microsoft Account creation during Windows 11/10 install.

With Microsoft’s recent Windows 11 updates, the bypass for the network requirement (NRO) was &amp;quot;effectively&amp;quot; blocked, forcing users into an online account creation. MSAPatcher brings back the simplicity of the bypassnro.cmd one-liner, allowing you to bypass the NRO without having to manually add registry keys or deal with complex workarounds.

Related contents:

- [Windows 11 sans compte Microsoft - Comment contourner le dernier blocage ? @ Korben :fr:](https://korben.info/windows-11-installation-sans-compte-microsoft-contournement.html).]]>
            </summary>
            <updated>2025-08-28T18:50:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1074</id>
            <title type="text"><![CDATA[SSLyze]]></title>
            <link rel="alternate" href="https://github.com/nabla-c0d3/sslyze" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1074"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSLyze is a fast and powerful SSL/TLS scanning tool and Python library.

SSLyze can analyze the SSL/TLS configuration of a server by connecting to it, in order to ensure that it uses strong encryption settings (certificate, cipher suites, elliptic curves, etc.), and that it is not vulnerable to known TLS attacks (Heartbleed, ROBOT, OpenSSL CCS injection, etc.).]]>
            </summary>
            <updated>2025-08-28T18:55:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1081</id>
            <title type="text"><![CDATA[GPOddity]]></title>
            <link rel="alternate" href="https://github.com/synacktiv/GPOddity" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1081"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).

Related contents:

- [GPOddity: Et si vos GPO devenaient votre pire cauchemar Active Directory ? @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_%F0%9D%97%9A%F0%9D%97%A3%F0%9D%97%A2%F0%9D%97%B1%F0%9D%97%B1%F0%9D%97%B6%F0%9D%98%81%F0%9D%98%86-et-si-vos-gpo-devenaient-activity-7313070210100387840-ouHJ/).]]>
            </summary>
            <updated>2025-08-28T18:56:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1109</id>
            <title type="text"><![CDATA[pwndbg]]></title>
            <link rel="alternate" href="https://pwndbg.re/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1109"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Exploit Development and Reverse Engineering with GDB &amp;amp; LLDB Made Easy.

pwndbg (/paʊnˈdiˌbʌɡ/) is a GDB and LLDB plug-in that makes debugging suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers.

- [pwndbg @ GitHub](https://github.com/pwndbg/pwndbg).

Related contents:

- [🛠️ Make Debugging Great Again! 🛠️ @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_make-debugging-great-again-activity-7312010477159469056-UP9S/).
- [Pwndbg - Le débogueur qui a décidé que GDB c&amp;#039;était trop nul @ Korben :fr:](https://korben.info/pwndbg-debogueur-tui-gdb-lldb.html).]]>
            </summary>
            <updated>2025-09-08T10:31:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1117</id>
            <title type="text"><![CDATA[La plainte en ligne pour les arnaques sur internet (THESEE) :fr:]]></title>
            <link rel="alternate" href="https://www.masecurite.interieur.gouv.fr/fr/demarches-en-ligne/thesee-arnaques-internet-plainte-en-ligne" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1117"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[La plainte en ligne pour les arnaques sur internet (THESEE)

Pour les victimes d&amp;#039;escroqueries sur internet :  faux sites de vente, piratage de comptes de messagerie, extorsion d&amp;#039;argent pour débloquer un ordinateur... vous pouvez déposer une plainte en ligne grâce au dispositif THESEE.

Related contents:

- [Episode \#493 - Investigations Numériques Judiciaires @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/investigations-numeriques-judiciaires/).]]>
            </summary>
            <updated>2025-08-28T19:02:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1144</id>
            <title type="text"><![CDATA[tinc]]></title>
            <link rel="alternate" href="https://tinc-vpn.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1144"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet. tinc is Free Software and licensed under the GNU General Public License version 2 or later. Because the VPN appears to the IP level network code as a normal network device, there is no need to adapt any existing software. This allows VPN sites to share information with each other over the Internet without exposing any information to others.

- [tinc @ GitHub](https://github.com/gsliepen/tinc).]]>
            </summary>
            <updated>2025-08-28T19:06:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1147</id>
            <title type="text"><![CDATA[wstunnel]]></title>
            <link rel="alternate" href="https://github.com/erebe/wstunnel" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1147"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available.

Most of the time when you are using a public network, you are behind some kind of firewall or proxy. One of their purpose is to constrain you to only use certain kind of protocols and consult only a subset of the web. Nowadays, the most widespread protocol is http and is de facto allowed by third party equipment.

Wstunnel uses the websocket protocol which is compatible with http in order to bypass firewalls and proxies. Wstunnel allows you to tunnel whatever traffic you want and access whatever resources/site you need.

Related contents:

- [Tunneling corporate firewalls for developers @ FrostKimi&amp;#039;s Secrets](https://blog.frost.kiwi/tunneling-corporate-firewalls/).]]>
            </summary>
            <updated>2025-08-28T19:06:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1149</id>
            <title type="text"><![CDATA[Corkscrew]]></title>
            <link rel="alternate" href="https://github.com/bryanpkc/corkscrew" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1149"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Corkscrew is a tool for tunneling SSH through HTTP proxies, but... you might find another use for it.

Related contents:

- [Tunneling corporate firewalls for developers @ FrostKimi&amp;#039;s Secrets](https://blog.frost.kiwi/tunneling-corporate-firewalls/).]]>
            </summary>
            <updated>2025-08-28T19:07:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1150</id>
            <title type="text"><![CDATA[Proxytunnel]]></title>
            <link rel="alternate" href="https://proxytunnel.sourceforge.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1150"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Stealth tunneling through HTTP(S) proxies.

This is proxytunnel, a program that connects stdin and stdout to an origin server somewhere in the Internet through an industry standard HTTPS proxy. I originally wrote this program to be used as an extension to SSH, to be able to SSH to my box at home. In this file, I will describe the use with SSH. If you want to use it with some other application, feel free, and let me know!

- [Proxytunnel @ GitHub](https://github.com/proxytunnel/proxytunnel).

Related contents:

- [Tunneling corporate firewalls for developers @ FrostKimi&amp;#039;s Secrets](https://blog.frost.kiwi/tunneling-corporate-firewalls/).]]>
            </summary>
            <updated>2025-08-28T19:07:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1163</id>
            <title type="text"><![CDATA[opkssh (OpenPubkey SSH)]]></title>
            <link rel="alternate" href="https://github.com/openpubkey/opkssh/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1163"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[opkssh is a tool which enables ssh to be used with OpenID Connect allowing SSH access management via identities like alice@example.com instead of long-lived SSH keys. It does not replace ssh, but rather generates ssh public keys that contain PK Tokens and configures sshd to verify the PK Token in the ssh public key. These PK Tokens contain standard OpenID Connect ID Tokens. This protocol builds on the OpenPubkey which adds user public keys to OpenID Connect without breaking compatibility with existing OpenID Provider.

Related contents:

- [Open-sourcing OpenPubkey SSH (OPKSSH): integrating single sign-on with SSH @ The Cloudflare Blog](https://blog.cloudflare.com/open-sourcing-openpubkey-ssh-opkssh-integrating-single-sign-on-with-ssh/).]]>
            </summary>
            <updated>2025-08-28T19:10:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1165</id>
            <title type="text"><![CDATA[MemProcFS-Analyzer]]></title>
            <link rel="alternate" href="https://github.com/LETHAL-FORENSICS/MemProcFS-Analyzer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1165"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automated Forensic Analysis of Windows Memory Dumps for DFIR.

MemProcFS-Analyzer.ps1 is a PowerShell script utilized to simplify the usage of MemProcFS and to optimize your memory analysis workflow.]]>
            </summary>
            <updated>2025-08-28T19:10:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1180</id>
            <title type="text"><![CDATA[glpwnme]]></title>
            <link rel="alternate" href="https://github.com/Orange-Cyberdefense/glpwnme" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1180"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[GLPI vulnerabilities checking tool.

glpwnme is a tool used to check for vulnerabilities on running instance of glpi.

Related contents:

- [🔍 Lors de mes audits et tests d’intrusion, je tombe très souvent sur des environnements GLPI… et bien souvent, c’est mal géré ! @ Hamza Kondah&amp;#039;s  LinkedIn :fr:](https://www.linkedin.com/posts/kondah_lors-de-mes-audits-et-tests-dintrusion-activity-7309983476911407105-MdfI/).]]>
            </summary>
            <updated>2025-08-28T19:12:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1189</id>
            <title type="text"><![CDATA[Writeup NoobOps :fr:]]></title>
            <link rel="alternate" href="https://writeup.noobops.fr/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1189"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Wr1t3Up d3 Hip5kull

Joueur de CTF sur diverses plateformes, l’idée de ce site est de mettre à disposition de tous, les diverses résolutions de machines effectuées.
Passionné par la cybersécurité et l’IT, les CTFs me permettent d’apprendre énormément sur les failles et l’exploitation de ces dernières.]]>
            </summary>
            <updated>2025-08-28T19:14:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1198</id>
            <title type="text"><![CDATA[FuzzySully :fr:]]></title>
            <link rel="alternate" href="https://github.com/ANSSI-FR/fuzzysully" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1198"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Fuzzowski-based OPCUA fuzzer.

Fuzzing should never be conducted on production equipment or systems. This testing technique can cause unexpected behavior, system crashes, data corruption, or security vulnerabilities. Always perform fuzzing in a controlled, isolated environment to ensure the safety and stability of production systems.

FuzzySully is an OPC UA fuzzer built upon Fuzzowski. It is a specialized testing tool designed to identify vulnerabilities and bugs in OPC UA (Open Platform Communications Unified Architecture) implementations. These fuzzers typically operate by generating and sending a large number of malformed or unexpected messages to an OPC UA server or client, with the goal of triggering unexpected behavior or crashes.

Related contents:

- [L’ANSSI partage en open source un outil de test du protocole industriel OPC UA @ Agence nationale de la sécurité des systèmes d&amp;#039;information :fr:](https://cyber.gouv.fr/actualites/lanssi-partage-en-open-source-un-outil-de-test-du-protocole-industriel-opc-ua?ref=veillecyber.fr).]]>
            </summary>
            <updated>2025-08-28T19:15:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1233</id>
            <title type="text"><![CDATA[Akira Ransomware Decrypter]]></title>
            <link rel="alternate" href="https://github.com/yohanes/akira-bruteforce" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1233"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[recover data from the Akira ransomware without paying the ransom.]]>
            </summary>
            <updated>2025-08-28T19:22:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1279</id>
            <title type="text"><![CDATA[Rayhunter]]></title>
            <link rel="alternate" href="https://github.com/EFForg/rayhunter" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1279"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Rust tool to detect cell site simulators on an orbic mobile hotspot.
Rayhunter is an IMSI Catcher Catcher for the Orbic mobile hotspot.

Related contents:

- [Hotspots &amp;amp; Routers @ Orbic](https://orbic.us/collections/hotspots-routers).
- [Rayhunter - L&amp;#039;outil open-source qui détecte si la police espionne votre téléphone @ Korben :fr:](https://korben.info/rayhunter-detecteur-espionnage-mobile-eff-opensource.html).]]>
            </summary>
            <updated>2025-08-28T19:29:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1290</id>
            <title type="text"><![CDATA[The Loki Framework]]></title>
            <link rel="alternate" href="https://github.com/malwaredojo/loki" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1290"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automated Command Line Identity Generation Tool for OSINT Investigators.
Command Line Sock Puppet Creator for Investigators.

Loki can create a sock puppet identity, that you can use to create a fake online presence to start your investigations. As an OSINT, Private or any other Investigator who seeks to conduct OSINT investigations; you need a sock puppet which cannot be traced back to you. Setting up a sock puppet is easy; only if you know where to look for.]]>
            </summary>
            <updated>2025-08-28T19:31:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1291</id>
            <title type="text"><![CDATA[RustScan]]></title>
            <link rel="alternate" href="https://github.com/bee-san/RustScan" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1291"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🤖 The Modern Port Scanner 🤖

The Modern Port Scanner. Find ports quickly (3 seconds at its fastest). Run scripts through our scripting engine (Python, Lua, Shell supported).]]>
            </summary>
            <updated>2025-08-28T19:31:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1348</id>
            <title type="text"><![CDATA[Adalanche]]></title>
            <link rel="alternate" href="https://github.com/lkarlslund/adalanche" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1348"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[_Adalanche_ is an Attack Graph Visualizer and Explorer for Active Directory.
It shows the permissions users and groups have in an Active Directory.
It&amp;#039;s useful for visualizing and exploring who can take over accounts, machines,
or the entire domain.
It can find and show misconfigurations.

Related contents:

- [⚠️⚠️⚠️ Plongez au Cœur des Attaques de votre Active Directory !
  @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_plongez-au-c%C5%93ur-des-attaques-de-votre-activity-7304403087190884352-3TBM/).]]>
            </summary>
            <updated>2025-08-28T19:41:07+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1350</id>
            <title type="text"><![CDATA[OASIS]]></title>
            <link rel="alternate" href="https://github.com/psyray/oasis" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1350"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Ollama Automated Security Intelligence Scanner.

 🛡️ An AI-powered security auditing tool that leverages Ollama models to detect and analyze potential security vulnerabilities in your code.

Advanced code security analysis through the power of AI

Related contents:

- [OASIS - Sécurisez votre code avec l&amp;#039;IA et Ollama @ Korben :fr:](https://korben.info/oasis-outil-ia-securite-code-ollama.html).]]>
            </summary>
            <updated>2025-08-28T19:41:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1351</id>
            <title type="text"><![CDATA[eBPF]]></title>
            <link rel="alternate" href="https://ebpf.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1351"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Dynamically program the kernel for efficient networking, observability, tracing, and security.

eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in a privileged context such as the operating system kernel. It is used to safely and efficiently extend the capabilities of the kernel without requiring to change kernel source code or load kernel modules.

Related contents:

- [Episode 605 - Goodbye World @ Linux Unplugged](https://linuxunplugged.com/605).]]>
            </summary>
            <updated>2025-08-28T19:41:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1359</id>
            <title type="text"><![CDATA[Maliby]]></title>
            <link rel="alternate" href="https://github.com/tinyhttp/malibu" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1359"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🏄 Framework-agnostic CSRF middleware for modern Node.js.

This middleware helps web developers fight CSRF attacks. Bear in mind, by solely using this middleware, we can&amp;#039;t guarantee your app will be free from CSRF attacks. Refer to CSRF Prevention Cheat Sheet and pillarjs/understanding-csrf for more details.]]>
            </summary>
            <updated>2025-08-28T19:43:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1385</id>
            <title type="text"><![CDATA[Email Validator Service]]></title>
            <link rel="alternate" href="https://rapid-email-verifier.fly.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1385"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A completely free and open source email validation API that never stores your data. Built to support solopreneurs and the developer community.

A high-performance, cost-effective email validation service designed for indie hackers and small startups. The service validates email addresses in real-time, checking syntax, domain existence, MX records, and detecting disposable email providers. The main focus is on precision instead of recall, meaning instead of edge cases the focus is on having the biggest coverage.

- [Email Validator Service @ GitHub](https://github.com/umuterturk/email-verifier).]]>
            </summary>
            <updated>2025-08-28T19:47:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1389</id>
            <title type="text"><![CDATA[2FAuth]]></title>
            <link rel="alternate" href="https://2fauth.app/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1389"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[2FAuth is a web based self-hosted alternative to One Time Passcode (OTP) generators like Google Authenticator, designed for both mobile and desktop.

- [2FAuth @ GitHub](https://github.com/Bubka/2FAuth/).
- [2FAuth documentation](https://docs.2fauth.app/).

Related contents:

- [Aegis 2FAuth Importer @ GitHub](https://github.com/shalak/aegis-2fauth-importer).]]>
            </summary>
            <updated>2025-08-28T19:47:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1395</id>
            <title type="text"><![CDATA[Seal OS]]></title>
            <link rel="alternate" href="https://www.seal.security/solutions/seal-os" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1395"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Vulnerability-proof your Linux Operating Systems
Deploy pristine, secure Linux images–whether containerized, running on a virtual machine,
or deployed on bare metal.

Related contents:

- [Announcing Seal OS: Vulnerability Remediation for Any Linux @ Seal Security](https://www.seal.security/blog/announcing-seal-os-a-holistic-open-source-vulnerability-remediation-solution-for-any-linux-environment-with-long-term-support).]]>
            </summary>
            <updated>2025-08-28T19:49:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1432</id>
            <title type="text"><![CDATA[ThreatMapper]]></title>
            <link rel="alternate" href="https://github.com/deepfence/ThreatMapper" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1432"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Source Cloud Native Application Protection Platform (CNAPP).

Deepfence ThreatMapper hunts for threats in your production platforms, and ranks these threats based on their risk-of-exploit. It uncovers vulnerable software components, exposed secrets and deviations from good security practice. ThreatMapper uses a combination of agent-based inspection and agent-less monitoring to provide the widest possible coverage to detect threats.]]>
            </summary>
            <updated>2025-08-28T19:55:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1446</id>
            <title type="text"><![CDATA[Riot]]></title>
            <link rel="alternate" href="https://tryriot.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1446"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Where companies get their teams secured.

Riot is the leading employee security posture management platform,
keeping thousands of the world&amp;#039;s leading companies safe from hackers.

Related contents:

- [#310.ad - Devenir CEO: Devenir CEO d&amp;#039;une boite tech avec Benjamin Netter @ &amp;lt;ifttd&amp;gt; :fr:](https://www.ifttd.io/episodes/devenir-ceo).]]>
            </summary>
            <updated>2025-08-28T19:57:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1460</id>
            <title type="text"><![CDATA[AntiSquat]]></title>
            <link rel="alternate" href="https://github.com/redhuntlabs/antisquat" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1460"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AntiSquat leverages AI techniques such as natural language processing (NLP), large language models (ChatGPT) and more to empower detection of typosquatting and phishing domains.

Related contents:

- [ 🚨🚨 AntiSquat : l’IA qui traque les faux sites avant qu’ils ne vous piégent ! 🚨🚨 @ Laurent Biagotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_cybersaezcuritaez-phishing-typosquatting-activity-7298965818971684864-Whqm/).]]>
            </summary>
            <updated>2025-08-28T19:59:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1461</id>
            <title type="text"><![CDATA[Criminal IP]]></title>
            <link rel="alternate" href="https://www.criminalip.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1461"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cybersecurity Search Engine.

Criminal IP is an OSINT search engine specialized in attack surface assessment and threat hunting.

It offers extensive cyber threat intelligence, including device reputation, geolocation, IP reputation for C2 or scanners, domain safety, malicious link detection, and APT attack vectors via search and API.]]>
            </summary>
            <updated>2025-08-28T19:59:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1496</id>
            <title type="text"><![CDATA[Warpgate]]></title>
            <link rel="alternate" href="https://github.com/warp-tech/warpgate" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1496"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Smart SSH, HTTPS and MySQL bastion that requires no additional client-side software.]]>
            </summary>
            <updated>2025-08-28T20:05:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1517</id>
            <title type="text"><![CDATA[Kunai]]></title>
            <link rel="alternate" href="https://why.kunai.rocks/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1517"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Threat-hunting tool for Linux . Bring your Linux Threat-Hunting capabilities to the next level.

Kunai is a powerful tool designed to bring actionable insights for tasks such as security monitoring and threat hunting on Linux systems. Think of it as the Linux counterpart to Sysmon on Windows, tailored for comprehensive and precise event monitoring.

- [Kunai @ GitHub](https://github.com/kunai-project/kunai).

Related contents:

- [nukunai @ GitHub](https://github.com/pushou/nukunai).
- [Episode \#503 consacré à Kunai, un outil open source de monitoring pour Linux @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/kunai/).]]>
            </summary>
            <updated>2025-10-10T06:09:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1519</id>
            <title type="text"><![CDATA[Hawk]]></title>
            <link rel="alternate" href="https://github.com/T0pCyber/hawk" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1519"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Powershell Based tool for gathering information related to O365 intrusions and potential Breaches]]>
            </summary>
            <updated>2025-08-28T20:09:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1523</id>
            <title type="text"><![CDATA[Gixy]]></title>
            <link rel="alternate" href="https://gixy.getpagespeed.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1523"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[NGINX configuration static analyzer.

Gixy is a tool to analyze Nginx configuration. The main goal of Gixy is to prevent security misconfiguration and automate flaw detection.

- [Gixy @ GitHub](https://github.com/dvershinin/gixy).]]>
            </summary>
            <updated>2025-08-28T20:11:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1541</id>
            <title type="text"><![CDATA[PEASS-ng]]></title>
            <link rel="alternate" href="https://github.com/peass-ng/PEASS-ng/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1541"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Privilege Escalation Awesome Scripts SUITE new generation.

Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS.

These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.

- [🚨 LinPEAS + LLMs = GAME 𝖮̶𝖵̶𝖤̶𝖱̶ CHANGER pour la cybersécurité ? @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_pentest-cybersecurity-ethicalhacking-activity-7297517717606072320-6jRP/).]]>
            </summary>
            <updated>2025-08-28T20:13:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1553</id>
            <title type="text"><![CDATA[WPProbe]]></title>
            <link rel="alternate" href="https://github.com/Chocapikk/wpprobe" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1553"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A fast WordPress plugin enumeration tool.

WPProbe is a fast and efficient WordPress plugin scanner that leverages REST API enumeration (?rest_route) to detect installed plugins without brute-force.

Unlike traditional scanners that hammer websites with requests, WPProbe takes a smarter approach by querying the exposed REST API. This technique allows us to identify plugins stealthily, reducing detection risks and speeding up the scan process.]]>
            </summary>
            <updated>2025-08-28T20:15:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1561</id>
            <title type="text"><![CDATA[Kanidm]]></title>
            <link rel="alternate" href="https://github.com/kanidm/kanidm" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1561"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Kanidm is a simple and secure identity management platform, allowing other applications and services to offload the challenge of authenticating and storing identities to Kanidm.]]>
            </summary>
            <updated>2025-08-28T20:16:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1586</id>
            <title type="text"><![CDATA[Clear NDR]]></title>
            <link rel="alternate" href="https://docs.clearndr.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1586"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Community, Open Source Suricata based NDR

Part of Network-based threat detection and response solutions from Stamus Networks™

- [Stamus control @ GitHub](https://github.com/StamusNetworks/stamusctl).

Related contents:

- [ 👑 SELKS est mort, vive ClearNDR ! 👑 @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_cybersecurity-ndr-soc-activity-7296060989186146305-rOfE/).]]>
            </summary>
            <updated>2025-08-28T20:20:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1596</id>
            <title type="text"><![CDATA[Avilla Forensics]]></title>
            <link rel="alternate" href="https://github.com/AvillaDaniel/AvillaForensics" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1596"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Avilla Forensics is a free mobile forensic tool created in February 2021 to assist investigators in collecting information and evidence from mobile devices. Developed by Daniel Avilla, a police officer from São Paulo, the tool provides powerful features for logical data extraction and backup conversion into formats compatible with advanced forensic analysis software, such as IPED and Cellebrite Physical Analyser.]]>
            </summary>
            <updated>2025-08-28T20:23:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1608</id>
            <title type="text"><![CDATA[Lucille]]></title>
            <link rel="alternate" href="https://github.com/jasonxtn/Lucille" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1608"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Information Gatherer &amp;amp; Webapps Exploiter. a Python-based tool to streamline and centralize some pentesting tasks.

Lucille is a comprehensive web application security testing tool designed for cybersecurity professionals. built with Python, Lucille offers a suite of user-friendly tools, it aims to provide an efficient and practical tools streamlining pentesting tasks and centralizing various audit and exploitation techniques.

- [ 🚀 Cet outil transforme n’importe qui en expert du pentest web ! 🚀 @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_github-pentest-cybersecurity-activity-7294973494876938240-tKFt/).]]>
            </summary>
            <updated>2025-08-28T20:24:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1610</id>
            <title type="text"><![CDATA[mitmrouter]]></title>
            <link rel="alternate" href="https://github.com/nmatt0/mitmrouter" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1610"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Bash script to automate setup of Linux router useful for IoT device traffic analysis and SSL mitm]]>
            </summary>
            <updated>2025-08-28T20:24:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1616</id>
            <title type="text"><![CDATA[HExHTTP]]></title>
            <link rel="alternate" href="https://github.com/c0dejump/HExHTTP" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1616"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Header Exploitation HTTP.

HExHTTP is a tool designed to perform tests on HTTP headers and analyze the results to identify vulnerabilities and interesting behaviors.

Related contents:

- [ 🔥 HExHTTP : Le Couteau Suisse du Hack HTTP ! 🔥 @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_pentest-bugbounty-cybersecurity-activity-7294273741864198144-0V8a/).]]>
            </summary>
            <updated>2025-08-28T20:25:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1647</id>
            <title type="text"><![CDATA[Shellhub]]></title>
            <link rel="alternate" href="https://www.shellhub.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1647"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Seamless, technology-driven remote access from anywhere, at any time.
Take control of your servers and devices from any location while boosting security through our centralized SSH gateway tailored for edge and cloud computing.

- [Shellhub @ GitHub](https://github.com/shellhub-io/shellhub).]]>
            </summary>
            <updated>2025-08-28T20:31:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1661</id>
            <title type="text"><![CDATA[SploitScan]]></title>
            <link rel="alternate" href="https://github.com/xaitax/SploitScan" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1661"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits. 

SploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability. Empowering cybersecurity professionals with the capability to swiftly identify and apply known and test exploits. It&amp;#039;s particularly valuable for professionals seeking to enhance their security measures or develop robust detection strategies against emerging threats.]]>
            </summary>
            <updated>2025-08-28T20:32:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1675</id>
            <title type="text"><![CDATA[Raven]]></title>
            <link rel="alternate" href="https://github.com/qeeqbox/raven" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1675"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized).

Advanced Cyber Threat Map (Simplified, customizable and responsive. It uses D3.js with TOPO JSON, has 247 countries, ~100,000 cities, and can be used in an isolated environment without external lookups!.]]>
            </summary>
            <updated>2025-08-28T20:35:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1676</id>
            <title type="text"><![CDATA[BlackStone]]></title>
            <link rel="alternate" href="https://github.com/micro-joan/BlackStone" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1676"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Pentesting Reporting Tool.

BlackStone project or &amp;quot;BlackStone Project&amp;quot; is a tool created in order to automate the work of drafting and submitting a report on audits of ethical hacking or pentesting.

In this tool we can register in the database the vulnerabilities that we find in the audit, classifying them by internal, external audit or wifi, in addition, we can put your description and recommendation, as well as the level of severity and effort for its correction. This information will then help us generate in the report a criticality table as a global summary of the vulnerabilities found.

Related contents:

- [BlackStone, la pépite des rapports de test d&amp;#039;intrusions @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_osint-pentest-saezcuritaeznumaezrique-activity-7289225295671296001-9DsA/).]]>
            </summary>
            <updated>2025-08-28T20:35:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1693</id>
            <title type="text"><![CDATA[promptfoo]]></title>
            <link rel="alternate" href="https://www.promptfoo.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1693"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure &amp;amp; reliable LLMs.
Test &amp;amp; secure your LLM apps.
Open-source LLM testing used by 51,000+ developers.

 Test your prompts, agents, and RAGs. Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with command line and CI/CD integration. 

- [promptfoo @ GitHub](https://github.com/promptfoo/promptfoo).

Related contents:

- [L’IA Deepseek censurée à propos de la Chine ? @ Choses à Savoir TECH :fr:](https://shows.acast.com/choses-a-savoir-technologie/episodes/lia-deepseek-censuree-a-propos-de-la-chine).
- [Promptfoo - Fini le doigt mouillé pour tester vos LLM @ Korben :fr:](https://korben.info/promptfoo-tester-evaluer-llm.html).]]>
            </summary>
            <updated>2026-03-23T15:24:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1697</id>
            <title type="text"><![CDATA[Challenges Kids :fr:]]></title>
            <link rel="alternate" href="https://www.challenges-kids.fr/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1697"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Bienvenue, vous êtes au bon endroit pour apprendre
le hacking avec les enfants en s&amp;#039;amusant !

Related contents:

- [Episode \#489 consacré au livre J’apprends à hacker – A partir de 9 ans @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/japprends-a-hacker-a-partir-de-9-ans/).
- [J&amp;#039;apprends à hacker - A partir de 9 ans par Sara SELLOS &amp;amp; Nicolas FOUVILLE @ Dunod :fr:](https://www.dunod.com/sciences-techniques/j-apprends-hacker-partir-9-ans-30-defis-pour-decouvrir-cybersecurite-et-dejouer).]]>
            </summary>
            <updated>2025-08-28T20:39:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1699</id>
            <title type="text"><![CDATA[SocialBox]]></title>
            <link rel="alternate" href="https://github.com/Cyb0r9/SocialBox" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1699"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi]]>
            </summary>
            <updated>2025-08-28T20:39:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1705</id>
            <title type="text"><![CDATA[FireHOL]]></title>
            <link rel="alternate" href="https://firehol.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1705"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Linux firewalling and traffic shaping for humans.

FireHOL is a language (and a program to run it) which builds secure, stateful firewalls from easy to understand, human-readable configurations. The configurations stay readable even for very complex setups.

- [FireHOL @ GitHub](https://github.com/firehol/firehol).
- [FireHOL IP Lists](https://iplists.firehol.org/).
- [FireHOL IP Lists @ GitHub](https://github.com/firehol/blocklist-ipsets).

Related contents:

- [FireHOL - La protection IP ultime pour votre pare-feu @ Korben :fr:](https://korben.info/firehol-protection-ip-pare-feu.html).]]>
            </summary>
            <updated>2025-08-28T20:40:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1709</id>
            <title type="text"><![CDATA[Pi.Alert]]></title>
            <link rel="alternate" href="https://github.com/pucherot/Pi.Alert" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1709"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of &amp;quot;always connected&amp;quot; devices]]>
            </summary>
            <updated>2025-08-28T20:40:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1711</id>
            <title type="text"><![CDATA[NucleiFuzzer]]></title>
            <link rel="alternate" href="https://github.com/0xKayala/NucleiFuzzer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1711"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[NucleiFuzzer is a robust automation tool designed for efficiently detecting web application vulnerabilities, including XSS, SQLi, SSRF, and Open Redirects, leveraging advanced scanning and URL enumeration techniques.

Related contents:

- [ 🚀 Bug Bounty &amp;amp; Pentest : Ce tool va booster vos scans comme JAMAIS ! @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_saezcuritaez-bugbounty-websec-activity-7291719505393709056--jIU/).]]>
            </summary>
            <updated>2025-08-28T20:41:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1735</id>
            <title type="text"><![CDATA[Avant de Cliquer :fr:]]></title>
            <link rel="alternate" href="https://avantdecliquer.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1735"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[l&amp;#039;humain au cœur de la cybersécurité.
La sensibilisation à la cybersécurité réinventée
qui divise par 10 le risque de cyberattaque

A l’aide d’un programme de sensibilisation au phishing
basé sur l’apprentissage par l’action,
créé sur mesure pour chaque utilisateur
et animé sur la durée sans intervention de votre part]]>
            </summary>
            <updated>2025-08-28T20:45:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1738</id>
            <title type="text"><![CDATA[Tailpipe]]></title>
            <link rel="alternate" href="https://tailpipe.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1738"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[select * from logs;

Open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, right from your terminal.

- [Tailpipe @ GitHub](https://github.com/turbot/tailpipe).]]>
            </summary>
            <updated>2025-08-28T20:45:47+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1772</id>
            <title type="text"><![CDATA[ShadowHound]]></title>
            <link rel="alternate" href="https://github.com/Friends-Security/ShadowHound" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1772"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirectory module (ADWS) or System.DirectoryServices class (LDAP). 

ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for introducing known-malicious binaries like SharpHound. It leverages native PowerShell capabilities to minimize detection risks and offers two methods for data collection.

Related contents:

- [🚨 Pentester d&amp;#039;Active Directory: cet outil est pour toi ! 🚨 @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_pentest-activedirectory-bloodhound-activity-7290016018054213632-X1yy/).]]>
            </summary>
            <updated>2025-08-28T20:51:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1774</id>
            <title type="text"><![CDATA[ldap-scanner]]></title>
            <link rel="alternate" href="https://github.com/GoSecure/ldap-scanner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1774"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Checks for signature requirements over LDAP. The script will establish a connection to the target host(s) and request authentication without signature capability. If this is accepted, it means that the target hosts allows unsigned LDAP sessions and NTLM relay attacks are possible to this LDAP service (whenever signing is not requested by the client).]]>
            </summary>
            <updated>2025-08-28T20:51:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1775</id>
            <title type="text"><![CDATA[PowerShell-Hunter]]></title>
            <link rel="alternate" href="https://github.com/MHaggis/PowerShell-Hunter/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1775"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PowerShell-Hunter is a growing collection of PowerShell-based threat hunting tools designed to help defenders investigate and detect malicious activity in Windows environments. This project aims to provide security analysts with powerful, flexible tools that leverage PowerShell&amp;#039;s native capabilities for threat hunting.

Related contents:

- [⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips \[27 January\] @ Cybersecurity Newsletters&amp;#039; LinkedIn](https://www.linkedin.com/pulse/thn-weekly-recap-top-cybersecurity-threats-tools-tips-27-d6olc/).]]>
            </summary>
            <updated>2025-08-28T20:51:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1776</id>
            <title type="text"><![CDATA[Extension Auditor]]></title>
            <link rel="alternate" href="https://www.extensionauditor.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1776"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Browser Extension Security Auditor.

Scan Browser Extensions. Detect Hidden Threats. Don&amp;#039;t sacrifice privacy for convenience.
Scan your browser extensions completely on-device.

Related contents:

- [⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips \[27 January\] @ Cybersecurity Newsletters&amp;#039; LinkedIn](https://www.linkedin.com/pulse/thn-weekly-recap-top-cybersecurity-threats-tools-tips-27-d6olc/).]]>
            </summary>
            <updated>2025-08-28T20:51:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1791</id>
            <title type="text"><![CDATA[francenum.gouv.fr :fr:]]></title>
            <link rel="alternate" href="https://www.francenum.gouv.fr/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1791"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Le portail de la tranformation numérique des entreprises.

Related contents:

- [Episode \#488: financements de projets cyber @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/financements-de-projets-cyber/).]]>
            </summary>
            <updated>2025-08-28T20:55:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1813</id>
            <title type="text"><![CDATA[Cyberbro]]></title>
            <link rel="alternate" href="https://cyberbro.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1813"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A simple application that extracts your Indicators of Compromise (IoCs) from garbage input and checks their reputation using multiple CTI services.

This project aims to provide a simple and efficient way to check the reputation of your observables using multiple services, without having to deploy a complex solution.

- [Cyberbro @ GitHub](https://github.com/stanfrbd/cyberbro).]]>
            </summary>
            <updated>2025-08-28T20:59:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1824</id>
            <title type="text"><![CDATA[Kraken]]></title>
            <link rel="alternate" href="https://github.com/jasonxtn/kraken" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1824"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[All-in-One Toolkit for BruteForce Attacks.

A Python-based tool to centralize and streamline BruteForce Attacks.

Related contents:

- [ 🚨 PENTEST: Kraken, le GAME CHANGER de la Cybersécurité en Python ! 🚨 @ Laurent Biagiotti&amp;#039;s LinkedIn](https://www.linkedin.com/posts/laurent-biagiotti-19779284_cybersaezcuritaez-innovation-pythontool-activity-7289569552508534784-NR25/).]]>
            </summary>
            <updated>2025-08-28T21:00:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1826</id>
            <title type="text"><![CDATA[Endlessh]]></title>
            <link rel="alternate" href="https://github.com/skeeto/endlessh" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1826"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSH tarpit that slowly sends an endless banner.

Endlessh is an SSH tarpit that very slowly sends an endless, random SSH banner. It keeps SSH clients locked up for hours or even days at a time. The purpose is to put your real SSH server on another port and then let the script kiddies get stuck in this tarpit instead of bothering a real server.

Related contents:

- [fail2ban-endlessh @ GitHub](https://github.com/itskenny0/fail2ban-endlessh).
- [Endlessh - Le bourbier des script kiddies @ Korben :fr:](https://korben.info/endlessh-script-kiddies-trap.html).]]>
            </summary>
            <updated>2026-03-27T20:55:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1837</id>
            <title type="text"><![CDATA[Trapster]]></title>
            <link rel="alternate" href="https://trapster.cloud/en/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1837"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Complete Honeypot Solution (Deceptive Security).
They think they&amp;#039;re attacking, but they&amp;#039;re already trapped.

A honeypot acts like a trap: it detects threats without disrupting your operations and without generating false positives. Trapster - one alert, one threat.

- [Trapster Community @ GitHub](https://github.com/0xBallpoint/trapster-community).

Related contents:

- [Comment piéger des cyber-criminels ? (et les espionner 🍯) @ Underscore_&amp;#039;s YouTube :fr:](https://www.youtube.com/watch?v=kE3rGmoSOqs).]]>
            </summary>
            <updated>2025-08-28T21:03:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1854</id>
            <title type="text"><![CDATA[linWinPwn]]></title>
            <link rel="alternate" href="https://github.com/lefayjey/linWinPwn" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1854"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[linWinPwn is a bash script that wraps a number of Active Directory tools for enumeration (LDAP, RPC, ADCS, MSSQL, Kerberos), vulnerability checks (noPac, ZeroLogon, MS17-010, MS14-068), object modifications (password change, add user to group, RBCD, Shadow Credentials) and password dumping (secretsdump, lsassy, nanodump, DonPAPI). The script streamlines the use of a large number of tools: impacket, bloodhound, netexec, enum4linux-ng, ldapdomaindump, lsassy, smbmap, kerbrute, adidnsdump, certipy, silenthound, bloodyAD, DonPAPI and many others.

Related contents:

- [ 🚨 LinWinPwn : Testez votre Active Directory! 🚨 @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_cybersecurity-kalilinux-pentesting-activity-7288473430792826880-ADc-/).]]>
            </summary>
            <updated>2025-08-28T21:04:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1861</id>
            <title type="text"><![CDATA[pisshoff]]></title>
            <link rel="alternate" href="https://github.com/w4/pisshoff" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1861"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🧸 fully isolated honeypot ssh server using thrussh.

A very simple SSH server using thrussh that exposes mocked versions of a bash shell, some commands and SSH subsystems to act as a honeypot for would-be crackers.

All actions undertaken on the connection by the client are recorded in JSON format in an audit log file.]]>
            </summary>
            <updated>2025-08-28T21:06:00+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1886</id>
            <title type="text"><![CDATA[🔍 LFIer]]></title>
            <link rel="alternate" href="https://github.com/Cybersecurity-Ethical-Hacker/lfier" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1886"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications. 

🔍 LFIer is a tool engineered to detect Local File Inclusion (LFI) vulnerabilities in web applications. It scans URLs with parameters, injects various payloads, and checks for indicators in the responses to identify potential LFI vulnerabilities. Leveraging asynchronous programming, LFIer ensures efficient and accurate scanning, even in environments protected by WAFs or cloud-based defenses.

Related contents:

- [ 🚀 𝗟𝗙𝗜𝗲𝗿 : L’outil INDISPENSABLE pour détecter les failles LFI ! @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_cybersaezcuritaez-pentest-lfier-activity-7287034791554633728-dELj/).]]>
            </summary>
            <updated>2025-08-28T21:12:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1887</id>
            <title type="text"><![CDATA[DLest]]></title>
            <link rel="alternate" href="https://github.com/PhrozenIO/DLest" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1887"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Microsoft Windows DLL Export Browser (Enumerate Exports, COM Methods and Properties) with Advanced Search Features. 

DLest is specifically designed to assist developers and malware analysts with the analysis and manipulation of exported functions in Portable Executable (PE) files, particularly DLLs. With DLest, you can easily enumerate exported functions using a variety of methods, including drag and drop, opening a folder, or recursively scanning a folder with regular expression filtering to only include PE files with specific export function names.

Related contents:

- [ 🚨Voici un petit outil Open Source très intéresssant autour de l&amp;#039;analyse de malware et de la rétro-ingénierie @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_security-cybersecurity-opensource-activity-7287356917004292096-ysAH/).]]>
            </summary>
            <updated>2025-08-28T21:12:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1891</id>
            <title type="text"><![CDATA[BruteShark]]></title>
            <link rel="alternate" href="https://github.com/odedshimon/BruteShark" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1891"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Network Analysis Tool.

BruteShark is a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files, but it also capable of directly live capturing from a network interface). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to perform an offline Brute Force attack.]]>
            </summary>
            <updated>2025-08-28T21:12:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1893</id>
            <title type="text"><![CDATA[Timesketch]]></title>
            <link rel="alternate" href="https://github.com/google/timesketch" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1893"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Collaborative forensic timeline analysis.

Timesketch is an open-source tool for collaborative forensic timeline analysis. Using sketches you and your collaborators can easily organize your timelines and analyze them all at the same time. Add meaning to your raw data with rich annotations, comments, tags and stars.]]>
            </summary>
            <updated>2025-08-28T21:12:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1911</id>
            <title type="text"><![CDATA[Virus-Builder]]></title>
            <link rel="alternate" href="https://github.com/Cyber-Dioxide/Virus-Builder" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1911"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive]]>
            </summary>
            <updated>2025-08-28T21:16:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1925</id>
            <title type="text"><![CDATA[Mellivora]]></title>
            <link rel="alternate" href="https://github.com/Nakiami/mellivora?tab=readme-ov-file" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1925"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Mellivora is a CTF engine written in PHP.]]>
            </summary>
            <updated>2025-08-28T21:17:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1948</id>
            <title type="text"><![CDATA[fsociety]]></title>
            <link rel="alternate" href="https://fsociety.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1948"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Modular Penetration Testing Framework.

- [fsociety @ GitHub](https://github.com/fsociety-team/fsociety).
- [Fsociety Hacking Tools Pack @ GitHub](https://github.com/Manisso/fsociety).]]>
            </summary>
            <updated>2025-08-28T21:21:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1956</id>
            <title type="text"><![CDATA[Kraken]]></title>
            <link rel="alternate" href="https://github.com/jasonxtn/Kraken" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1956"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[All-in-One Toolkit for BruteForce Attacks.
A Python-based tool to centralize and streamline BruteForce Attacks.

Kraken is a powerful, Python-based tool designed to centralize and streamline various brute-forcing tasks. Kraken provides a suite of tools for cybersecurity professionals to efficiently perform brute-force attacks across a range of protocols and services.]]>
            </summary>
            <updated>2025-08-28T21:22:07+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1988</id>
            <title type="text"><![CDATA[LackSynth]]></title>
            <link rel="alternate" href="https://github.com/aielte-research/HackSynth" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1988"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[LLM Agent and Evaluation Framework for Autonomous Penetration Testing.

We introduce HackSynth, a novel Large Language Model (LLM)-based agent capable of autonomous penetration testing. HackSynth&amp;#039;s dual-module architecture includes a Planner and a Summarizer, which enable it to generate commands and process feedback iteratively. To benchmark HackSynth, we propose two new Capture The Flag (CTF)-based benchmark sets utilizing the popular platforms PicoCTF and OverTheWire. These benchmarks include two hundred challenges across diverse domains and difficulties, providing a standardized framework for evaluating LLM-based penetration testing agents.]]>
            </summary>
            <updated>2025-08-28T21:28:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1989</id>
            <title type="text"><![CDATA[MLOKit]]></title>
            <link rel="alternate" href="https://github.com/xforcered/MLOKit" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1989"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[MLOps Attack Toolkit

MLOKit is a toolkit that can be used to attack MLOps platforms by taking advantage of the available REST API. This tool allows the user to specify an attack module, along with specifying valid credentials (API key or stolen access token) for the respective MLOps platform. The attack modules supported include reconnaissance, data extraction and model extraction. MLOKit was built in a modular approach, so that new modules can be added in the future by the information security community.]]>
            </summary>
            <updated>2025-08-28T21:28:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1995</id>
            <title type="text"><![CDATA[SwordPhish]]></title>
            <link rel="alternate" href="https://societe-generale.github.io/swordphish-awareness/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1995"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Swordphish is a platform allowing to create and manage fake phishing campaigns.

The goal of Swordphish is to raise awareness of your users regarding phishing easily and in a secure way.

- [SwordPhish @ GitHub](https://github.com/societe-generale/swordphish-awareness).

Related contents:

- [Episode \#486: Interview de Frederic Le Bastard et de Franck Bonnard Du Groupe La Poste @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/groupe-la-poste/).]]>
            </summary>
            <updated>2025-08-28T21:29:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1996</id>
            <title type="text"><![CDATA[ALFA: The Insurance Fraud Agency]]></title>
            <link rel="alternate" href="https://www.alfa.asso.fr/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1996"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Created in 1989, the Insurance Fraud Control Agency – ALFA – is a non-profit association under the 1901 law, whose purpose is to promote the fight against fraud in the insurance sector. To date, the association has more than 340 members. ALFA actively participates in the fight against insurance fraud, by developing prevention actions and means of detecting fraudulent claims. The association also provides insurance companies with: studies, technical documentation, developed methodologies, as well as IT resources for exchanging information and a network of certified investigators.

Related contents:

- [Episode \#486: Interview de Frederic Le Bastard et de Franck Bonnard Du Groupe La Poste @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/groupe-la-poste/).]]>
            </summary>
            <updated>2025-08-28T21:29:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2023</id>
            <title type="text"><![CDATA[HuntDB]]></title>
            <link rel="alternate" href="https://huntdb.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2023"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Vulnerability Intelligence Platform. Track and Monitor CVEs in Real-Time

Stay ahead of security threats with our comprehensive vulnerability intelligence platform. Monitor, analyze, and respond to CVEs affecting your infrastructure.]]>
            </summary>
            <updated>2025-08-28T21:33:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2028</id>
            <title type="text"><![CDATA[Hackropole]]></title>
            <link rel="alternate" href="https://hackropole.fr/en/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2028"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Welcome to Hackropole. This platform allows you to replay the challenges of the France Cybersecurity Challenge all year round to discover and train in various areas of cybersecurity. 

Related contents:

- [Hackropole - La plateforme française de challenges cybersécurité @ Korben :fr:](https://korben.info/hackropole-plateforme-apprentissage-cybersecurite-france.html).]]>
            </summary>
            <updated>2025-08-28T21:34:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2033</id>
            <title type="text"><![CDATA[VolWeb]]></title>
            <link rel="alternate" href="https://github.com/k1nd0ne/VolWeb" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2033"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A centralized and enhanced memory analysis platform.

VolWeb is a digital forensic memory analysis platform that leverages the power of the Volatility 3 framework. It is dedicated to aiding in investigations and incident responses.

Related contents:

- [📍VolWeb - A centralized and enhanced memory analysis platform @ Laurent M.&amp;#039;s LinkedIn :fr](https://www.linkedin.com/posts/laurent-minne_github-security-cybersecurity-activity-7284234388748337153-CdlB/).]]>
            </summary>
            <updated>2025-08-28T21:36:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2098</id>
            <title type="text"><![CDATA[The Bastion]]></title>
            <link rel="alternate" href="https://ovh.github.io/the-bastion/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2098"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Authentication, authorization, traceability and auditability for SSH accesses. 

A so-called bastion is a machine used as a single entry point by operational teams (such as sysadmins, developers, devops, database admins, etc.) to securely connect to other machines of an infrastructure, usually using ssh.

The bastion provides mechanisms for authentication, authorization, traceability and auditability for the whole infrastructure.
 
- [The Bastion @ GitHub](https://github.com/ovh/the-bastion).

Related contents:

- [The Bastion d&amp;#039;OVH, le Fort Knox du SSH qui ne fait confiance à personne @ Korben :fr:](https://korben.info/the-bastion-ovh-ssh-securise-open-source.html).]]>
            </summary>
            <updated>2025-08-28T21:46:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2107</id>
            <title type="text"><![CDATA[ARM - AttackRuleMap]]></title>
            <link rel="alternate" href="https://attackrulemap.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2107"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Mapping of open-source detection rules and atomic tests. 

The goal of this project is to bridge the gap between Atomic Red Team&amp;#039;s adversary simulations and open-source detection rules. By doing so, this project aims to help security professionals simulate attacks and evaluate their detection strategies more effectively. 🔒

- [AttackRuleMap @ GitHub](https://github.com/krdmnbrk/AttackRuleMap).]]>
            </summary>
            <updated>2025-08-28T21:48:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2113</id>
            <title type="text"><![CDATA[onesixtyone]]></title>
            <link rel="alternate" href="https://github.com/trailofbits/onesixtyone" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2113"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Fast SNMP Scanner.

onesixtyone takes a different approach to SNMP scanning. It takes advantage of the fact that SNMP is a connectionless protocol and sends all SNMP requests as fast as it can. Then the scanner waits for responses to come back and logs them, in a fashion similar to Nmap ping sweeps. By default onesixtyone waits for 10 milliseconds between sending packets, which is adequate for 100MBs switched networks. The user can adjust this value via the -w command line option. If set to 0, the scanner will send packets as fast as the kernel would accept them, which may lead to packet drop.]]>
            </summary>
            <updated>2025-08-28T21:48:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2117</id>
            <title type="text"><![CDATA[CF-Hero]]></title>
            <link rel="alternate" href="https://github.com/musana/CF-Hero" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2117"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications]]>
            </summary>
            <updated>2025-08-28T21:49:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2130</id>
            <title type="text"><![CDATA[Ethical Hacking and Penetration Testing]]></title>
            <link rel="alternate" href="https://github.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2130"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This repository is all about tips on ethical hacking and penetration testing!]]>
            </summary>
            <updated>2025-08-28T21:52:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2131</id>
            <title type="text"><![CDATA[Resolver]]></title>
            <link rel="alternate" href="https://github.com/Jo-spec849/Resolver" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2131"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Fast Enumeration Tool using Shodan.

This is a Python script developed to assist in the reconnaissance process during penetration testing.

Related contents:

- [ 🚀 Resolver : Accélérez votre reconnaissance avec Shodan ! 🚀 @ Maori S.&amp;#039; LinkedIn :fr:](https://www.linkedin.com/posts/maory-schroder_osint-pentesting-cybersecurity-activity-7282637206253416449-YDs7/).]]>
            </summary>
            <updated>2025-08-28T21:52:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2132</id>
            <title type="text"><![CDATA[AIL-Framework]]></title>
            <link rel="alternate" href="https://github.com/supdevinci/ail-framework-docker" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2132"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AIL-Framework is a powerful open-source project designed for online data analysis and web crawling, tailored for cybersecurity researchers and analysts.

Related contents:

- [1 Tools en 5 commandes @ Laurent Biagotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_1-%F0%9D%97%A7%F0%9D%97%BC%F0%9D%97%BC%F0%9D%97%B9%F0%9D%98%80-en-5-%F0%9D%97%96%F0%9D%97%BC%F0%9D%97%BA%F0%9D%97%BA%F0%9D%97%AE%F0%9D%97%BB%F0%9D%97%B1%F0%9D%97%B2%F0%9D%98%80-et-activity-7281937762511929344-MiOX/).]]>
            </summary>
            <updated>2025-08-28T21:52:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2138</id>
            <title type="text"><![CDATA[D4TA-HUNTER]]></title>
            <link rel="alternate" href="https://github.com/micro-joan/D4TA-HUNTER" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2138"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[D4TA-HUNTER is a tool created in order to automate the collection of information about the employees of a company that is going to be audited for ethical hacking.

In addition, in this tool we can find in the &amp;quot;search company&amp;quot; section by inserting the domain of a company, emails of employees, subdomains and IP&amp;#039;s of servers.]]>
            </summary>
            <updated>2025-08-28T21:52:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2151</id>
            <title type="text"><![CDATA[Group3r]]></title>
            <link rel="alternate" href="https://github.com/Group3r/Group3r" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2151"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.

Like its ancestors, Group3r is a tool for pentesters and red teamers to rapidly enumerate relevant settings in AD Group Policy, and to identify exploitable misconfigurations in same. It does this by talking LDAP to Domain Controllers, parsing GPO config files off the domain SYSVOL share, and also by looking at other files (usually on file shares) that are referenced within GPOs, like scripts, MSI packages, exes, etc.]]>
            </summary>
            <updated>2025-08-28T21:54:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2153</id>
            <title type="text"><![CDATA[vulnerable-AD]]></title>
            <link rel="alternate" href="https://github.com/safebuffer/vulnerable-AD" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2153"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Create a vulnerable active directory that&amp;#039;s allowing you to test most of the active directory attacks in a local lab]]>
            </summary>
            <updated>2025-08-28T21:56:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2155</id>
            <title type="text"><![CDATA[KeePass Enhanced Security Configuration]]></title>
            <link rel="alternate" href="https://github.com/onSec-fr/Keepass-Enhanced-Security-Configuration" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2155"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Make your keepass more secure using the not very-well known KeePass enforced configuration file.

Related contents:

- [Comment durcir la configuration de KeePass ? @ IT-Connect :fr:](https://www.it-connect.fr/comment-durcir-la-configuration-de-keepass/).]]>
            </summary>
            <updated>2025-08-28T21:56:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2157</id>
            <title type="text"><![CDATA[ADcheck]]></title>
            <link rel="alternate" href="https://github.com/CobblePot59/ADcheck" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2157"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Assess the security of your Active Directory with few or all privileges. 

Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle, ORADAD, or even PurpleKnight (with some bonuses).

Related contents:

- [Renforcez la sécurité de votre Active Directory avec ADcheck @ ATTEIB H.(BirackInit)&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/atteib-h-birackinit-83a657221_%F0%9D%90%91%F0%9D%90%9E%F0%9D%90%A7%F0%9D%90%9F%F0%9D%90%A8%F0%9D%90%AB%F0%9D%90%9C%F0%9D%90%9E%F0%9D%90%B3-%F0%9D%90%A5%F0%9D%90%9A-%F0%9D%90%AC%F0%9D%90%9E%F0%9D%90%9C%F0%9D%90%AE%F0%9D%90%AB%F0%9D%90%A2%F0%9D%90%AD%F0%9D%90%9E-activity-7280568542926671873-t8Op/).]]>
            </summary>
            <updated>2025-08-28T21:56:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2179</id>
            <title type="text"><![CDATA[Tirreno]]></title>
            <link rel="alternate" href="https://www.tirreno.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2179"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Know Your User™

Open source user analytics
for sovereign cybersecurity.

Tirreno is open-source user analytics software.

Tirreno is a universal analytic tool for monitoring online platforms, web applications, SaaS, communities, IoT, mobile applications, intranets, and e-commerce websites. It is effective against external threats associated with partners or customers, as well as internal risks posed by employees or suppliers.

- [Tirreno @ GitHub](https://github.com/TirrenoTechnologies/tirreno).]]>
            </summary>
            <updated>2025-08-28T22:00:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2190</id>
            <title type="text"><![CDATA[GoSearch]]></title>
            <link rel="alternate" href="https://github.com/ibnaleem/gosearch" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2190"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🔍 OSINT tool for searching people&amp;#039;s digital footprint and leaked passwords across various social networks, written in Go. 

Related contents:

 - [GoSearch - 18 milliards de mots de passe compromis à portée de terminal @ Korben :fr:](https://korben.info/gosearch-milliards-mots-passe-compromis-portee.html).]]>
            </summary>
            <updated>2025-08-28T22:01:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2191</id>
            <title type="text"><![CDATA[GPOZaurr]]></title>
            <link rel="alternate" href="https://github.com/EvotecIT/GPOZaurr" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2191"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[GPOZaurr is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them. GPOZaurr provides 360 degrees of information about Group Policies and their settings.]]>
            </summary>
            <updated>2025-08-28T22:01:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2195</id>
            <title type="text"><![CDATA[TheHive]]></title>
            <link rel="alternate" href="https://strangebee.com/thehive/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2195"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[a Scalable, Open Source and Free Security Incident Response Platform.

TheHive is a scalable 3-in-1 open source and free Security Incident Response Platform designed to make life easier for SOCs, CSIRTs, CERTs and any information security practitioner dealing with security incidents that need to be investigated and acted upon swiftly. It is the perfect companion to MISP. You can synchronize it with one or multiple MISP instances to start investigations out of MISP events. You can also export an investigation&amp;#039;s results as a MISP event to help your peers detect and react to attacks you&amp;#039;ve dealt with. Additionally, when TheHive is used in conjunction with Cortex, security analysts and researchers can easily analyze tens if not hundred of observables.

- [TheHive @ GitHub](https://github.com/TheHive-Project/TheHive).

Source: [Savez-vous ce qui est un OpenVOC ? @ Florian Dudaev&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/cyberflood_soc-voc-vulnerability-activity-7274743353609445377-8WOr/).]]>
            </summary>
            <updated>2025-08-28T22:02:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2196</id>
            <title type="text"><![CDATA[CISA Vulnrichment project]]></title>
            <link rel="alternate" href="https://github.com/cisagov/vulnrichment" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2196"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A repo to conduct vulnerability enrichment.

The CISA Vulnrichment project is the public repository of CISA&amp;#039;s enrichment of public CVE records through CISA&amp;#039;s ADP (Authorized Data Publisher) container. In this phase of the project, CISA is assessing new and recent CVEs and adding key SSVC decision points. Once scored, some higher-risk CVEs will also receive enrichment of CWE and/or CVSS data points, where possible.]]>
            </summary>
            <updated>2025-08-28T22:02:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2201</id>
            <title type="text"><![CDATA[eurydice]]></title>
            <link rel="alternate" href="https://github.com/ANSSI-FR/eurydice?tab=readme-ov-file" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2201"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A user-friendly solution to transfer files through a physical diode using the Lidi utility, complete with data retention, file history, user accounts and admin management. Provides a scriptable API and a web interface.]]>
            </summary>
            <updated>2025-08-28T22:04:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2202</id>
            <title type="text"><![CDATA[Misconfiguration Manager]]></title>
            <link rel="alternate" href="https://github.com/subat0mik/Misconfiguration-Manager" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2202"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.]]>
            </summary>
            <updated>2025-08-28T22:04:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2211</id>
            <title type="text"><![CDATA[Skuld Stealer]]></title>
            <link rel="alternate" href="https://github.com/hackirby/skuld" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2211"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Go-written Malware targeting Windows systems, extracting User Data from Discord, Browsers, Crypto Wallets and more, from every user on every disk. (PoC. For Educational Purposes only).

Next-Gen Stealer written in Go. Stealing from Discord, Chromium-Based &amp;amp; Firefox-Based Browsers, Crypto Wallets and more, from every user on every disk. (PoC. For educational purposes only)]]>
            </summary>
            <updated>2025-08-28T22:04:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2214</id>
            <title type="text"><![CDATA[🍯 T-Pot]]></title>
            <link rel="alternate" href="https://github.com/telekom-security/tpotce" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2214"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The All In One Multi Honeypot Platform 🐝.

T-Pot is the all in one, optionally distributed, multiarch (amd64, arm64) honeypot plattform, supporting 20+ honeypots and countless visualization options using the Elastic Stack, animated live attack maps and lots of security tools to further improve the deception experience.]]>
            </summary>
            <updated>2025-08-28T22:05:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2226</id>
            <title type="text"><![CDATA[Vanir]]></title>
            <link rel="alternate" href="https://github.com/google/vanir" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2226"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Missing Patch Scanner.

Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target system. By default, Vanir pulls up-to-date CVEs from Open Source Vulnerabilities (OSV) together with their corresponding signatures so that users can transparently scan missing patches for an up-to-date list of CVEs.]]>
            </summary>
            <updated>2025-08-28T22:08:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2227</id>
            <title type="text"><![CDATA[jwt-cli]]></title>
            <link rel="alternate" href="https://github.com/mike-engel/jwt-cli" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2227"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A super fast CLI tool to decode and encode JWTs built in Rust.

jwt-cli is a command line tool to help you work with JSON Web Tokens (JWTs). Like most JWT command line tools out there, you can decode almost any JWT header and claims body. Unlike any that I&amp;#039;ve found, however, jwt-cli allows you to encode a new JWT with nearly any piece of data you can think of. Custom header values (some), custom claim bodies (as long as it&amp;#039;s JSON, it&amp;#039;s game), and using any secret you need.]]>
            </summary>
            <updated>2025-08-28T22:08:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2241</id>
            <title type="text"><![CDATA[GPOHunter]]></title>
            <link rel="alternate" href="https://github.com/PShlyundin/GPOHunter" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2241"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Active Directory Group Policy Security Analyzer.

A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities. 

GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory Group Policy Objects (GPOs). It automates security checks and provides detailed reports on potential vulnerabilities, helping administrators secure their environments.]]>
            </summary>
            <updated>2025-08-28T22:09:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2242</id>
            <title type="text"><![CDATA[Seedkeeper]]></title>
            <link rel="alternate" href="https://seedkeeper.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2242"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure password &amp;amp; seedphrase manager on smartcard 🔐

Seedkeeper lets you effortlesly store all your passwords and protect your digital life so you can sleep on both ears.

Source: [SeedKeeper - La carte à puce qui sécurise vos mots de passe @ Korben :fr:](https://korben.info/seedkeeper-carte-securisee-sauvegarde-crypto.html).]]>
            </summary>
            <updated>2025-08-28T22:09:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2247</id>
            <title type="text"><![CDATA[🔒 Patterns: OWASP CRS and Bad Bot Detection for Web Servers]]></title>
            <link rel="alternate" href="https://github.com/fabriziosalmi/patterns" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2247"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automated OWASP CRS and Bad Bot Detection for Caddy, Nginx, Apache, Traefik and HaProxy.

Automate the scraping of OWASP Core Rule Set (CRS) patterns and convert them into Apache, Nginx, Caddy, Traefik, and HAProxy WAF configurations.
Additionally, Bad Bot/User-Agent detection is integrated to block malicious web crawlers and scrapers.]]>
            </summary>
            <updated>2025-08-28T22:10:36+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2291</id>
            <title type="text"><![CDATA[Pentoo]]></title>
            <link rel="alternate" href="https://www.pentoo.ch/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2291"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based off Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable livecd.]]>
            </summary>
            <updated>2025-08-28T22:18:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2292</id>
            <title type="text"><![CDATA[BlackArch Linux]]></title>
            <link rel="alternate" href="https://blackarch.org/index.html" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2292"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Penetration Testing Distribution.

BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2828 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs.]]>
            </summary>
            <updated>2025-08-28T22:18:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2293</id>
            <title type="text"><![CDATA[Mobile Security Framework (MobSF)]]></title>
            <link rel="alternate" href="https://mobsf.github.io/docs/#/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2293"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. 

Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. MobSF can be used for a variety of use cases such as mobile application security, penetration testing, malware analysis, and privacy analysis. The Static Analyzer supports popular mobile app binaries like APK, IPA, APPX and source code. Meanwhile, the Dynamic Analyzer supports both Android and iOS applications and offers a platform for interactive instrumented testing, runtime data and network traffic analysis. MobSF seamlessly integrates with your DevSecOps or CI/CD pipeline, facilitated by REST APIs and CLI tools, enhancing your security workflow with ease.

- [Mobile Security Framework (MobSF) @ GitHub](https://github.com/MobSF/Mobile-Security-Framework-MobSF).]]>
            </summary>
            <updated>2025-08-28T22:18:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2376</id>
            <title type="text"><![CDATA[ADRecon]]></title>
            <link rel="alternate" href="https://github.com/adrecon/ADRecon" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2376"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.

- [ADRecon, un outil en PowerShell pour collecter des informations sur l’Active Directory @ IT-Connect :fr:](https://www.it-connect.fr/decouverte-reconnaissance-active-directory-adrecon/).]]>
            </summary>
            <updated>2025-08-28T22:32:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2413</id>
            <title type="text"><![CDATA[Piston]]></title>
            <link rel="alternate" href="https://github.com/engineer-man/piston" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2413"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A high performance general purpose code execution engine.

Piston is a high performance general purpose code execution engine. It excels at running untrusted and possibly malicious code without fear from any harmful effects.]]>
            </summary>
            <updated>2025-08-28T22:38:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2450</id>
            <title type="text"><![CDATA[picklescan]]></title>
            <link rel="alternate" href="https://github.com/mmaitre314/picklescan" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2450"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security scanner detecting Python Pickle files performing suspicious actions]]>
            </summary>
            <updated>2025-08-28T22:45:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2456</id>
            <title type="text"><![CDATA[Hemmelig.app]]></title>
            <link rel="alternate" href="https://hemmelig.app/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2456"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Paste a password, confidential message, or private data.
Keep your sensitive information out of chat logs, emails, and more with encrypted secrets. 

 Hemmelig is a encrypted sharing platform that enables secure transmission of sensitive information. All encryption occurs client-side using TweetNaCl, ensuring your data remains encrypted before it reaches our servers. The platform supports both personal and organizational use cases, with features like IP restrictions, expiration controls, and optional password protection. Whether you&amp;#039;re sharing credentials, sensitive messages, or confidential files, Hemmelig strives to ensure your data remains private and secure. 

- [Hemmelig.app @ GitHub](https://github.com/HemmeligOrg/Hemmelig.app).]]>
            </summary>
            <updated>2025-08-28T22:45:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2468</id>
            <title type="text"><![CDATA[Dotenv]]></title>
            <link rel="alternate" href="https://www.dotenv.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2468"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secrets for developers.

Dotenv is a zero-dependency module that loads environment variables from a .env file into process.env. Storing configuration in the environment separate from code is based on The Twelve-Factor App methodology.

- [Dotenv @ GitHub](https://github.com/motdotla/dotenv).]]>
            </summary>
            <updated>2025-08-28T22:48:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2487</id>
            <title type="text"><![CDATA[brainstorm]]></title>
            <link rel="alternate" href="https://github.com/Invicti-Security/brainstorm/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2487"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery.

This tool enhances traditional web fuzzing by using local AI language models (via Ollama) to generate intelligent guesses for potential paths and filenames. 

- [Brainstorm tool release: Optimizing web fuzzing with local LLMs @ invicti](https://www.invicti.com/blog/security-labs/brainstorm-tool-release-optimizing-web-fuzzing-with-local-llms/).]]>
            </summary>
            <updated>2025-08-28T22:50:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2493</id>
            <title type="text"><![CDATA[Clear NDR - Community (previously SELKS)]]></title>
            <link rel="alternate" href="https://www.stamus-networks.com/clear-ndr-community" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2493"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Turn-key Suricata-based Network Detection and Response System.
SELKS is now Clear NDR - Community

As the next generation open source turnkey Suricata implementation from Stamus Networks, the Clear NDR - Community edition is the successor to SELKS. We incorporated many lessons learned from the 10 years of SELKS innovation and user feedback into this platform.]]>
            </summary>
            <updated>2025-08-28T22:52:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2495</id>
            <title type="text"><![CDATA[Coercer]]></title>
            <link rel="alternate" href="https://github.com/p0dalirius/Coercer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2495"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods. 

- [🎄CyberAdvent Day 12: Force SMB and HTTP authentications with Coercer! @ Rémi Gascou (Podalirius)&amp;#039;s LinkedIn](https://www.linkedin.com/posts/remigascou_cyberadvent-day-12-force-smb-and-http-activity-7272872352550457344-gSDP/).]]>
            </summary>
            <updated>2025-08-28T22:52:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2498</id>
            <title type="text"><![CDATA[Zenarmor]]></title>
            <link rel="alternate" href="https://www.zenarmor.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2498"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Proudly Introducing the era of Instant Firewalls!

Get instant security whenever and wherever you have network access!]]>
            </summary>
            <updated>2025-08-28T22:53:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2515</id>
            <title type="text"><![CDATA[watchTowr]]></title>
            <link rel="alternate" href="https://watchtowr.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2515"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Your Persistent Adversary.
Real Attack Surface Management, within the watchTowr Platform.
The future of Continuous Automated Red Teaming and Attack Surface Management.

- [ 🚨 PoC Exploit 🚨 L&amp;#039;exploit zero-day et PoC de Mitel MiCollab dévoilé @ Almamy Diakho&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/almamy-diakho-63397b146_micollab-mitel-exploit-activity-7270701198809169920-c87L/).]]>
            </summary>
            <updated>2025-08-28T22:56:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2531</id>
            <title type="text"><![CDATA[ChainReactor]]></title>
            <link rel="alternate" href="https://github.com/ucsb-seclab/chainreactor" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2531"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. The project models the problem as a sequence of actions to achieve privilege escalation from initial access to a target system. 

- [ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning @ Usenix association](https://www.usenix.org/conference/usenixsecurity24/presentation/de-pasquale).]]>
            </summary>
            <updated>2025-08-28T22:58:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2552</id>
            <title type="text"><![CDATA[Tamanoir]]></title>
            <link rel="alternate" href="https://github.com/pythops/tamanoir" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2552"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A KeyLogger using eBPF 🐝]]>
            </summary>
            <updated>2025-08-28T23:02:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2561</id>
            <title type="text"><![CDATA[Oversight]]></title>
            <link rel="alternate" href="https://github.com/user1342/Oversight" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2561"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.]]>
            </summary>
            <updated>2025-08-28T23:03:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2562</id>
            <title type="text"><![CDATA[PermCheck]]></title>
            <link rel="alternate" href="https://github.com/eXistenZNL/PermCheck" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2562"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PermCheck is a little tool that checks if the files in a project have the executable bit set properly. It&amp;#039;s available for PHP versions 5.6 and up (Version 1.0 goes back to PHP 5.3), and is very light on dependencies, so you should be able to add it to nearly any project.]]>
            </summary>
            <updated>2025-08-28T23:03:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2573</id>
            <title type="text"><![CDATA[Privastead]]></title>
            <link rel="alternate" href="https://github.com/privastead/privastead" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2573"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Privastead is a privacy-preserving home security camera solution that uses end-to-end encryption]]>
            </summary>
            <updated>2025-08-28T23:05:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2604</id>
            <title type="text"><![CDATA[PEASS-ng]]></title>
            <link rel="alternate" href="https://github.com/peass-ng/PEASS-ng" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2604"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Privilege Escalation Awesome Scripts SUITE (with colors).
Privilege Escalation Awesome Scripts SUITE new generation.

Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS.

These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.]]>
            </summary>
            <updated>2025-08-28T23:10:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2614</id>
            <title type="text"><![CDATA[DOMPurify]]></title>
            <link rel="alternate" href="https://cure53.de/purify" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2614"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, SVG and MathML.
DOMPurify works with a secure default, but offers a lot of configurability and hooks.

- [DOMPurify @ GitHub](https://github.com/cure53/DOMPurify).
- [Exploring the DOMPurify library: Bypasses and Fixes (1/2) @ /mizu.re](https://mizu.re/post/exploring-the-dompurify-library-bypasses-and-fixes).]]>
            </summary>
            <updated>2025-08-28T23:13:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2618</id>
            <title type="text"><![CDATA[sigconverter.io]]></title>
            <link rel="alternate" href="https://sigconverter.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2618"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[sigma rule converter. An opensource sigma conversion tool built using pysigma.

Welcome to sigconverter.io, a user-friendly converter for Sigma rules. This project is designed to keep in sync with the pySigma project&amp;#039;s backends. Inspired by uncoder.io, it aims to provide an easy-to-use interface for converting Sigma rules.

- [sigconverter.io @ GitHub](https://github.com/magicsword-io/sigconverter.io).]]>
            </summary>
            <updated>2025-08-28T23:13:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2621</id>
            <title type="text"><![CDATA[OSAKA]]></title>
            <link rel="alternate" href="https://github.com/ANSSI-FR/osaka" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2621"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Advanced Kubernetes Architecture Security Tool

This tool allows to perform the reconstruction of complex attack paths by graph generation in a Kubernetes cluster. It uses Neo4j for the storage of objects and relationships in database as well as neodash for visualization. The language Cypher as MySQL allows queries to the database to retrieve graphs. It can be used by security auditors to quickly identify attack paths or security experts to monitor theses paths.

- [Episode \#482 - UYBHYS 2024 @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/uybhys-2024/).]]>
            </summary>
            <updated>2025-08-28T23:13:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2623</id>
            <title type="text"><![CDATA[humble]]></title>
            <link rel="alternate" href="https://github.com/rfc-st/humble" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2623"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.]]>
            </summary>
            <updated>2025-08-28T23:13:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2629</id>
            <title type="text"><![CDATA[enum4linux-ng]]></title>
            <link rel="alternate" href="https://github.com/cddmp/enum4linux-ng" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2629"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.

enum4linux-ng.py is a rewrite of Mark Lowe&amp;#039;s (former Portcullis Labs now Cisco CX Security Labs) enum4linux.pl, a tool for enumerating information from Windows and Samba systems, aimed for security professionals and CTF players. The tool is mainly a wrapper around the Samba tools nmblookup, net, rpcclient and smbclient.]]>
            </summary>
            <updated>2025-08-28T23:14:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2630</id>
            <title type="text"><![CDATA[SSH Configuration Auditor]]></title>
            <link rel="alternate" href="https://www.ssh-audit.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2630"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSH server &amp;amp; client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc) 

This free tool audits the configuration of an SSH server or client and highlights the areas needing improvement.

Too many admins overlook SSH configuration when setting up new systems. Unfortunately, the defaults for many operating systems are optimized for compatibility, not security.

- [ssh-audit @ GitHub](https://github.com/jtesta/ssh-audit).
- [SSH Hardening Guides @ SSH Configuration Auditor](https://www.ssh-audit.com/hardening_guides.html).]]>
            </summary>
            <updated>2025-08-28T23:15:07+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2638</id>
            <title type="text"><![CDATA[ComplianceAsCode/content]]></title>
            <link rel="alternate" href="https://complianceascode.readthedocs.io/en/latest/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2638"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security automation content in SCAP, Bash, Ansible, and other formats.

The purpose of this project is to create security policy content for various platforms — Red Hat Enterprise Linux, Fedora, Ubuntu, Debian, SUSE Linux Enterprise Server (SLES),... — as well as products — Firefox, Chromium, ... We aim to make it as easy as possible to write new and maintain existing security content in all the commonly used formats.

- [ComplianceAsCode/content @ GitHub](https://github.com/ComplianceAsCode/content).]]>
            </summary>
            <updated>2025-08-28T23:17:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2639</id>
            <title type="text"><![CDATA[Am I Isolated]]></title>
            <link rel="alternate" href="https://github.com/edera-dev/am-i-isolated" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2639"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Validate the isolation posture of your container environment.

Am I Isolated is a security posture benchmarking tool.

It evaluates a given runtime environment and attempts to look for things which may be a security problem, as well as providing suggestions for solving the security problem.]]>
            </summary>
            <updated>2025-08-28T23:17:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2656</id>
            <title type="text"><![CDATA[DefectDojo]]></title>
            <link rel="alternate" href="https://www.defectdojo.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2656"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Source DevSecOps.  CI/CD and DevSecOps Automation

The leading application vulnerability management tool.
Built for both DevSecOps and traditional application security.
 DevSecOps, ASPM, Vulnerability Management. All on one platform. 

DefectDojo is a DevSecOps, ASPM (application security posture management), and vulnerability management tool. DefectDojo orchestrates end-to-end security testing, vulnerability tracking, deduplication, remediation, and reporting.

- [DefectDojo @ GitHub](https://github.com/DefectDojo/django-DefectDojo).

Source: [Savez-vous ce qui est un OpenVOC ? @ Florian Dudaev&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/cyberflood_soc-voc-vulnerability-activity-7274743353609445377-8WOr/).]]>
            </summary>
            <updated>2025-08-28T23:19:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2659</id>
            <title type="text"><![CDATA[Game Of Active Directory]]></title>
            <link rel="alternate" href="https://orange-cyberdefense.github.io/GOAD/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2659"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Game Of Active Directory is a free pentest active directory LAB(s) project.

The purpose of this tool is to give pentesters a vulnerable Active directory environment ready to use to practice usual attack techniques. The idea behind this project is to give you an environment where you can try and train your pentest skills without having the pain to build all by yourself. This repository was build for pentest practice 🙂

- [Game Of Active Directory @ GitHub](https://github.com/Orange-Cyberdefense/GOAD).

Related contents:

- [Dracarys @ Mayfly](https://mayfly277.github.io/posts/Dracarys-lab/).]]>
            </summary>
            <updated>2026-03-12T11:10:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2660</id>
            <title type="text"><![CDATA[Artifactory]]></title>
            <link rel="alternate" href="https://jfrog.com/artifactory/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2660"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Universal Artifact Repository Manager.

Definitive artifact management for flexible development and trusted delivery at any scale.

 JFrog Artifactory is the single solution for housing and managing all the artifacts, binaries, packages, files, containers, and components for use throughout your software supply chain.
JFrog Artifactory serves as your central hub for DevOps, integrating with your tools and processes to improve automation, increase integrity, and incorporate best practices along the way. 

- [Anatomie d&amp;#039;une faille @ GDG France&amp;#039;s YouTube :fr:](https://www.youtube.com/watch?v=ccnSpR-CSHA).]]>
            </summary>
            <updated>2025-08-28T23:21:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2662</id>
            <title type="text"><![CDATA[Docker Scout]]></title>
            <link rel="alternate" href="https://docs.docker.com/scout/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2662"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Docker Scout is a solution for proactively enhancing your software supply chain security. By analyzing your images, Docker Scout compiles an inventory of components, also known as a Software Bill of Materials (SBOM). The SBOM is matched against a continuously updated vulnerability database to pinpoint security weaknesses.

- [Enhancing Container Security with Docker Scout and Secure Repositories @ Docker blog ](https://www.docker.com/blog/enhancing-container-security-with-docker-scout-and-secure-repositories/).]]>
            </summary>
            <updated>2025-08-28T23:21:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2679</id>
            <title type="text"><![CDATA[NachoVPN]]></title>
            <link rel="alternate" href="https://github.com/AmberWolfCyber/NachoVPN" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2679"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A tasty, but malicious SSL-VPN server 🌮

NachoVPN is a Proof of Concept that demonstrates exploitation of SSL-VPN clients, using a rogue VPN server.

It uses a plugin-based architecture so that support for additional SSL-VPN products can be contributed by the community. It currently supports various popular corporate VPN products, such as Cisco AnyConnect, SonicWall NetExtender, Palo Alto GlobalProtect, and Ivanti Connect Secure.

- [Introducing NachoVPN: One VPN Server to Pwn Them All @ AmberWolf](https://blog.amberwolf.com/blog/2024/november/introducing-nachovpn---one-vpn-server-to-pwn-them-all/).]]>
            </summary>
            <updated>2025-08-28T23:23:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2695</id>
            <title type="text"><![CDATA[zscan]]></title>
            <link rel="alternate" href="https://github.com/zcyberseclab/zscan" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2695"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network configurations across your infrastructure.]]>
            </summary>
            <updated>2025-08-28T23:25:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2707</id>
            <title type="text"><![CDATA[Squealer]]></title>
            <link rel="alternate" href="https://github.com/owenrumney/squealer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2707"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Telling tales on you for leaking secrets!.

Squealer scans a git repository or filesystem for secrets that are being leaked deep within the commit history.]]>
            </summary>
            <updated>2025-08-28T23:27:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2708</id>
            <title type="text"><![CDATA[secure.py]]></title>
            <link rel="alternate" href="https://github.com/TypeError/secure" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2708"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Lightweight modern Python library to add security headers (CSP, HSTS, etc.) to Django, Flask, FastAPI, and more. Secure defaults or fully customizable.]]>
            </summary>
            <updated>2025-08-28T23:29:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2712</id>
            <title type="text"><![CDATA[garak]]></title>
            <link rel="alternate" href="https://github.com/NVIDIA/garak" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2712"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[the LLM vulnerability scanner. Generative AI Red-teaming &amp;amp; Assessment Kit

garak checks if an LLM can be made to fail in a way we don&amp;#039;t want. garak probes for hallucination, data leakage, prompt injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses. If you know nmap, it&amp;#039;s nmap for LLMs.]]>
            </summary>
            <updated>2025-08-28T23:29:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2714</id>
            <title type="text"><![CDATA[PCI Security Standards Council]]></title>
            <link rel="alternate" href="https://www.pcisecuritystandards.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2714"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Protect Payment Data with Industry-driven Security Standards, Training, and Programs.

- [Échange avec un ancien RSSI. Aujourd&amp;#039;hui auditeur PCI DSS (QSA) | \#6 @ Cybersécurité All Day :fr:](https://cybersecuriteallday.fr/episode/echange-avec-un-ancien-rssi-aujourdhui-auditeur-pci-dss-qsa-61).
- [Building a PCI-DSS Compliant GKE Framework for Financial Institutions: Data Protection, Governance &amp;amp; Audit Logging @ DevOps.dev&amp;#039;s Medium](https://blog.devops.dev/building-a-pci-dss-compliant-gke-framework-for-financial-institutions-data-protection-governance-0deaa1b72893).]]>
            </summary>
            <updated>2026-04-27T12:46:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2720</id>
            <title type="text"><![CDATA[bpftrace]]></title>
            <link rel="alternate" href="https://github.com/bpftrace/bpftrace" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2720"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[High-level tracing language for Linux.

bpftrace is a high-level tracing language for Linux. bpftrace uses LLVM as a backend to compile scripts to eBPF-bytecode and makes use of libbpf and bcc for interacting with the Linux BPF subsystem, as well as existing Linux tracing capabilities: kernel dynamic tracing (kprobes), user-level dynamic tracing (uprobes), tracepoints, etc. The bpftrace language is inspired by awk, C, and predecessor tracers such as DTrace and SystemTap. 

- [bpftrace: a scriptable magnifying glass with X-ray vision for Linux @ Flox](https://flox.dev/blog/bpftrace--a-scriptable-magnifying-glass-with-x-ray-vision-for-linux/).]]>
            </summary>
            <updated>2025-08-28T23:29:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2725</id>
            <title type="text"><![CDATA[SOFA]]></title>
            <link rel="alternate" href="https://sofa.macadmins.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2725"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SOFA supports MacAdmins by efficiently tracking and surfacing information on updates for macOS and iOS.

SOFA supports MacAdmins by efficiently tracking and surfacing information on updates for macOS and iOS.

- [SOFA @ GitHub](https://github.com/macadmins/sofa).]]>
            </summary>
            <updated>2025-08-28T23:30:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2768</id>
            <title type="text"><![CDATA[Talisman]]></title>
            <link rel="alternate" href="https://thoughtworks.github.io/talisman/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2768"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Using a pre-commit hook, Talisman validates the outgoing changeset for things that look suspicious — such as tokens, passwords, and private keys. 

Talisman is a tool that scans git changesets to ensure that potential secrets or sensitive information do not leave the developer&amp;#039;s workstation.
It validates the outgoing changeset for things that look suspicious - such as potential SSH keys, authorization tokens, private keys etc.

- [Talisman @ GitHub](https://github.com/thoughtworks/talisman).]]>
            </summary>
            <updated>2025-08-28T23:37:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2776</id>
            <title type="text"><![CDATA[OpenAEV]]></title>
            <link rel="alternate" href="https://openaev.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2776"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Adversary Exposure Validation Platform. Formerly OpenBAS (Open Breach and Attack Simulation Platform).

OpenAEV is an open source platform allowing organizations to plan, schedule and conduct cyber adversary simulation campaign and tests.

- [OpenBas Documentation](https://docs.openbas.io/latest/)
- [OpenAEV @ GitHub](https://github.com/OpenAEV-Platform/openaev).]]>
            </summary>
            <updated>2025-09-08T08:31:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2782</id>
            <title type="text"><![CDATA[PhishTool]]></title>
            <link rel="alternate" href="https://www.phishtool.com/products/community" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2782"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PhishTool automatically retrieves all of the relevant metadata from a phishing email, providing you with the most comprehensive technical view of a phishing email possible. This combined with our OSINT and heuristic detection, makes PhishTool one seriously powerful tool.]]>
            </summary>
            <updated>2025-08-28T23:41:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2792</id>
            <title type="text"><![CDATA[Nuke It From Orbit]]></title>
            <link rel="alternate" href="https://github.com/lkarlslund/nifo" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2792"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[remove AV/EDR with physical access.
tl;dr: unprivileged user -&amp;gt; Defender removal on physical machine.

With a precision of a brain surgeon wielding a chainsaw, nifo can obliterate most AV/EDR products from endpoints or servers running the worlds most popular operating system, even if they&amp;#039;re BitLocker protected - if you have physical access to the device and it&amp;#039;s not totally locked down (BIOS password + SecureBoot + Harddrive Password + No USB Boot).]]>
            </summary>
            <updated>2025-08-28T23:41:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2793</id>
            <title type="text"><![CDATA[KubeHound]]></title>
            <link rel="alternate" href="https://kubehound.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2793"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tool for building Kubernetes attack paths. 

KubeHound creates a graph of attack paths in a Kubernetes cluster, allowing you to identify direct and multi-hop routes an attacker is able to take, visually or through complex graph queries.

- [KubeHound @ GitHub](https://github.com/DataDog/KubeHound).]]>
            </summary>
            <updated>2025-08-28T23:42:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2799</id>
            <title type="text"><![CDATA[Privacy Guides]]></title>
            <link rel="alternate" href="https://www.privacyguides.org/en/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2799"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Independent Privacy &amp;amp; Security Resources. The collaborative privacy advocacy community.
Protect your data against global mass surveillance programs. 

Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer team members and contributors. Our website is free of advertisements and not affiliated with any of the listed providers.

- [Privacy Guides @ GitHub](https://github.com/privacyguides/privacyguides.org).]]>
            </summary>
            <updated>2025-08-28T23:43:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2800</id>
            <title type="text"><![CDATA[HardenSysvol]]></title>
            <link rel="alternate" href="https://github.com/dakhama-mehdi/Harden-Sysvol" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2800"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[HardenSysvol is an open-source tool developed by the HardenAD Community to complement Active Directory audit tools by analyzing GPOs and scripts on Sysvol folder. It is ready-to-use, easy to deploy, and requires no complex configurations (no elevated privileges or EDR deactivation needed).

- [Sécurité Active Directory : détectez les vulnérabilités dans les GPO et les scripts avec HardenSysvol ! @ IT-Connect :fr:](https://www.it-connect.fr/securite-active-directory-hardensysvol-scanner-vulnerabilites-partage-sysvol/).
- [Audit AD : débusquez les vulnérabilités dans les scripts et les GPO @ IT-Connect&amp;#039;s YouTube :fr:](https://www.youtube.com/watch?v=lCEUoO39GtE).]]>
            </summary>
            <updated>2025-08-28T23:43:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2801</id>
            <title type="text"><![CDATA[GitDorker]]></title>
            <link rel="alternate" href="https://github.com/obheda12/GitDorker" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2801"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Python program to scrape secrets from GitHub through usage of a large repository of dorks. 

GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I&amp;#039;ve compiled from various sources to provide an overview of sensitive information stored on github given a search query.

The Primary purpose of GitDorker is to provide the user with a clean and tailored attack surface to begin harvesting sensitive information on GitHub. GitDorker can be used with additional tools such as GitRob or Trufflehog on interesting repos or users discovered from GitDorker to produce best results.]]>
            </summary>
            <updated>2025-08-28T23:43:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2809</id>
            <title type="text"><![CDATA[Monkey365]]></title>
            <link rel="alternate" href="https://silverhack.github.io/monkey365/#" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2809"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Monkey365 is an Open Source security tool that can be used to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft Entra ID security configuration reviews without the significant overhead of learning tool APIs or complex admin panels from the start.

- [Monkey365 @ GitHub](https://github.com/silverhack/monkey365).
- [⚙Monkey365 - Open Source security tool @ Lauren M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_security-cybersecurity-microsoft-activity-7264536663907831808-7-UF/)]]>
            </summary>
            <updated>2025-08-28T23:45:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2818</id>
            <title type="text"><![CDATA[Whispr]]></title>
            <link rel="alternate" href="https://github.com/narenaryan/whispr" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2818"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A multi-vault secret injection tool for safely injecting secrets into app environment.

Whispr (Pronounced as whisper) is a CLI tool to safely inject secrets from your favorite secret vault (Ex: AWS Secrets Manager, Azure Key Vault etc.) into your app&amp;#039;s environment. This is very useful for enabling secure local software development.]]>
            </summary>
            <updated>2025-08-28T23:46:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2821</id>
            <title type="text"><![CDATA[Thinkst Canary]]></title>
            <link rel="alternate" href="https://canary.tools/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2821"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Most companies discover they&amp;#039;ve been breached way too late. Thinkst Canary fixes this: just 3 minutes of setup; no ongoing overhead; nearly 0 false positives, and you can detect attackers long before they dig in. Check out why our Hardware, VM and Cloud-based Canaries are deployed and loved on all 7 continents...

- [Episode \#480: Technologie de tromperie @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/technologie-de-tromperie/).]]>
            </summary>
            <updated>2025-08-28T23:46:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2822</id>
            <title type="text"><![CDATA[MokN]]></title>
            <link rel="alternate" href="https://www.mokn.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2822"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Phish-back your credentials to attackers using contextualized deceptive technology.

- [Episode \#480: Technologie de tromperie @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/technologie-de-tromperie/).]]>
            </summary>
            <updated>2025-08-28T23:46:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2845</id>
            <title type="text"><![CDATA[Leonidas]]></title>
            <link rel="alternate" href="https://github.com/WithSecureLabs/leonidas" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2845"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automated Attack Simulation in the Cloud, complete with detection use cases. 

This is the repository containing Leonidas, a framework for executing attacker actions in the cloud. It provides a YAML-based format for defining cloud attacker tactics, techniques and procedures (TTPs) and their associated detection properties. These definitions can then be compiled into:]]>
            </summary>
            <updated>2025-08-28T23:50:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2846</id>
            <title type="text"><![CDATA[CloudBrute]]></title>
            <link rel="alternate" href="https://github.com/0xsha/cloudbrute" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2846"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Awesome cloud enumerator

A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode). The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike.]]>
            </summary>
            <updated>2025-08-28T23:50:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2862</id>
            <title type="text"><![CDATA[EvilnoVNC]]></title>
            <link rel="alternate" href="https://github.com/JoelGMSec/EvilnoVNC" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2862"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[EvilnoVNC is a Ready to go Phishing Platform.

Unlike other phishing techniques, EvilnoVNC allows 2FA bypassing by using a real browser over a noVNC connection.

In addition, this tool allows us to see in real time all of the victim&amp;#039;s actions, access to their downloaded files and the entire browser profile, including cookies, saved passwords, browsing history and much more.]]>
            </summary>
            <updated>2025-08-28T23:53:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2871</id>
            <title type="text"><![CDATA[SmuggleShield]]></title>
            <link rel="alternate" href="https://github.com/RootUp/SmuggleShield" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2871"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Basic protection against HTML smuggling attempts.

SmuggleShield is an experimental browser extension that aims to prevent basic HTML smuggling attacks by detecting common patterns. While this is not a comprehensive or bulletproof solution, it is an attempt to provide an additional layer of security during browsing. The project is still in the testing phase!]]>
            </summary>
            <updated>2025-08-28T23:54:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2872</id>
            <title type="text"><![CDATA[AuditForge]]></title>
            <link rel="alternate" href="https://auditforge.feriadesoftware.cl/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2872"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automate Your Audit Reports with AuditForge.

AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report. 
Save time, increase efficiency, and maintain data confidentiality with our open-source auditing software.

- [AuditForge @ GitHub](https://github.com/caverav/auditforge).]]>
            </summary>
            <updated>2025-08-28T23:55:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2876</id>
            <title type="text"><![CDATA[LockPass  by LockSelf :fr:]]></title>
            <link rel="alternate" href="https://www.lockself.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2876"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[French password management web service

- [LockPass : le gestionnaire de mots de passe souverain conçu pour les entreprises ! @ IT-Connect :fr:](https://www.it-connect.fr/lockpass-le-gestionnaire-de-mots-de-passe-souverain-concu-pour-les-entreprises/).]]>
            </summary>
            <updated>2025-08-28T23:55:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2879</id>
            <title type="text"><![CDATA[Cyberbro]]></title>
            <link rel="alternate" href="https://github.com/stanfrbd/cyberbro" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2879"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A good private alternative for Cybergordon (custom API).

Check if an observable (IP, hash, domain, URL) is malicious using VirusTotal, AbuseIPDB, IPInfo, Spur.us, IP Quality Score, MDE and Google Safe Browsing.
Comprehensive report with search and filter features (type, country, risk, detection, proxy/VPN).]]>
            </summary>
            <updated>2025-08-28T23:57:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2895</id>
            <title type="text"><![CDATA[Bjorn]]></title>
            <link rel="alternate" href="https://github.com/infinition/Bjorn" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2895"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potential vulnerabilities. Bjorn can perform brute force attacks, file stealing, host zombification, and supports custom attack scripts.]]>
            </summary>
            <updated>2025-08-28T23:58:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2901</id>
            <title type="text"><![CDATA[🦊 CloudFox 🦊]]></title>
            <link rel="alternate" href="https://github.com/BishopFox/cloudfox" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2901"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automating situational awareness for cloud penetration tests.

CloudFox helps you gain situational awareness in unfamiliar cloud environments. It’s an open source command line tool created to help penetration testers and other offensive security professionals find exploitable attack paths in cloud infrastructure.

- [Introducing CloudFox @ Bishop Fox](https://bishopfox.com/blog/introducing-cloudfox).]]>
            </summary>
            <updated>2025-08-28T23:59:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2903</id>
            <title type="text"><![CDATA[safehttpx]]></title>
            <link rel="alternate" href="https://github.com/gradio-app/safehttpx" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2903"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A small Python library created to help developers protect their applications from Server Side Request Forgery (SSRF) attacks. It implements an asynchronous GET method called safehttpx.get(), which is a wrapper around httpx.AsyncClient.get() while performing DNS validation on the supplied URL using Google DNS.]]>
            </summary>
            <updated>2025-08-29T00:01:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2904</id>
            <title type="text"><![CDATA[Flask-Vault]]></title>
            <link rel="alternate" href="https://github.com/multiversecoder/Flask-Vault" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2904"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Flask-Vault is a robust library that empowers Flask applications to securely store and manage sensitive credentials. It provides a set of CLI commands for storing secrets using AES-GCM symmetric encryption, ensuring that vital information like API keys and database credentials remain protected. 

Flask-Vault provides several cli commands and Python functions to store secrets that you do not want to keep in the clear, using symmetric encryption with AES-GCM. These commands and functions allow you to safely read/write very important credentials such as API keys, database credentials, etc.]]>
            </summary>
            <updated>2025-08-29T00:01:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2919</id>
            <title type="text"><![CDATA[twyn]]></title>
            <link rel="alternate" href="https://github.com/elementsinteractive/twyn" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2919"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security tool against dependency typosquatting attacks.

Twyn is a security tool that compares the name of your dependencies against a set of the most popular ones, in order to determine if there is any similarity between them, preventing you from using a potentially illegitimate one. In short, Twyn protects you against typosquatting attacks.]]>
            </summary>
            <updated>2025-08-29T00:02:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2920</id>
            <title type="text"><![CDATA[sastsweep]]></title>
            <link rel="alternate" href="https://github.com/chebuya/sastsweep" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2920"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets .

sastsweep is a tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such as popularity and project size, enabling targeted vulnerability research. It automatically detects potential vulnerabilities using semgrep and provides a streamlined HTML report, allowing researchers to quickly drill down to the affected portion of the codebase.]]>
            </summary>
            <updated>2025-08-29T00:02:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2928</id>
            <title type="text"><![CDATA[TrailScraper]]></title>
            <link rel="alternate" href="https://github.com/flosell/trailscraper" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2928"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A command-line tool to get valuable information out of AWS CloudTrail and a general purpose toolbox for working with IAM policies]]>
            </summary>
            <updated>2025-08-29T00:06:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2929</id>
            <title type="text"><![CDATA[Cloud Custodian]]></title>
            <link rel="alternate" href="https://cloudcustodian.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2929"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources.

Cloud Custodian enables you to manage your cloud resources by filtering, tagging, and then applying actions to them. The YAML DSL allows defininition of rules to enable well-managed cloud infrastructure that&amp;#039;s both secure and cost optimized. 

Cloud Custodian, also known as c7n, is a rules engine for managing public cloud accounts and resources. It allows users to define policies to enable a well managed cloud infrastructure, that&amp;#039;s both secure and cost optimized. It consolidates many of the adhoc scripts organizations have into a lightweight and flexible tool, with unified metrics and reporting.

- [Cloud Custodian @ GitHub](https://github.com/cloud-custodian/cloud-custodian/).]]>
            </summary>
            <updated>2025-08-29T00:06:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2933</id>
            <title type="text"><![CDATA[detect-secrets]]></title>
            <link rel="alternate" href="https://github.com/Yelp/detect-secrets" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2933"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An enterprise friendly way of detecting and preventing secrets in code. 

detect-secrets is an aptly named module for (surprise, surprise) detecting secrets within a code base.]]>
            </summary>
            <updated>2025-08-29T00:06:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2934</id>
            <title type="text"><![CDATA[GitGuardian]]></title>
            <link rel="alternate" href="https://www.gitguardian.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2934"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Git Security Scanning &amp;amp; Secrets Detection.

- [ggshield @ GitHub](https://github.com/GitGuardian/ggshield).
- [Doctolib divise par deux ses incidents de sécurité liés aux secrets@ LeMagIT :fr:](https://www.lemagit.fr/etude/Doctolib-divise-par-deux-ses-incidents-de-securite-lies-aux-secrets).]]>
            </summary>
            <updated>2025-08-29T00:06:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2936</id>
            <title type="text"><![CDATA[SenCy-Crise :fr:]]></title>
            <link rel="alternate" href="https://www.cybermalveillance.gouv.fr/gestion-de-crise/sency-crise" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2936"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Assistance aux victimes de cybermalveillance.

Les experts en gestion de crise cyber du Comcyber-MI appuyés par les réservistes de la gendarmerie nationale se sont associés à Cybermalveillance.gouv.fr pour accompagner les petites et moyennes entreprises, associations et collectivités à faire face aux cyberattaques.
Ce MOOC comprend des outils et conseils simples à mettre en oeuvre pour mettre en place ou améliorer le dispositif de gestion de crise cyber au sein de votre organisation.]]>
            </summary>
            <updated>2025-08-29T00:07:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2956</id>
            <title type="text"><![CDATA[vulnerable-apps]]></title>
            <link rel="alternate" href="https://github.com/vulnerable-apps" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2956"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Over 100 forks of deliberately vulnerable web applications and APIs.]]>
            </summary>
            <updated>2025-08-29T00:09:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2957</id>
            <title type="text"><![CDATA[Iscariot Suite]]></title>
            <link rel="alternate" href="https://gitlab.com/badsectorlabs/iscariot-suite" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2957"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Iscariot Suite is a collection of tools to enhance and augment trusted open-source and commercial Blue Team/Sysadmin products, turning them into traitorware to achieve offensive security goals. The Iscariot Suite takes its name from the famous traitor Judas Iscariot, who - according to biblical tradition - betrayed Jesus.]]>
            </summary>
            <updated>2025-08-29T00:09:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2958</id>
            <title type="text"><![CDATA[GTFOBins]]></title>
            <link rel="alternate" href="https://gtfobins.github.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2958"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.

- [GTFOBins @ GitHub](https://github.com/GTFOBins/GTFOBins.github.io).
- [GTFOBins : Evitez les erreurs de configuration dangereuses sous Linux @ IT-Connect :fr:](https://www.it-connect.fr/gtfobins-evitez-les-erreurs-de-configuration-dangereuses-sous-linux/).]]>
            </summary>
            <updated>2025-08-29T00:09:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2973</id>
            <title type="text"><![CDATA[CERT-FR :fr:]]></title>
            <link rel="alternate" href="https://www.cert.ssi.gouv.fr/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2973"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Centre gouvernemental de veille, d&amp;#039;alerte et de réponse aux attaques informatiques]]>
            </summary>
            <updated>2025-08-29T00:12:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2998</id>
            <title type="text"><![CDATA[Immich Public Proxy]]></title>
            <link rel="alternate" href="https://github.com/alangrainger/immich-public-proxy" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2998"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Share your Immich photos and albums in a safe way without exposing your Immich instance to the public. 

Related contents:

- [Episode 615: 25.05 Reasons to NixOS @ Linux Unplugged](https://linuxunplugged.com/615).]]>
            </summary>
            <updated>2025-08-29T00:16:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3026</id>
            <title type="text"><![CDATA[Shuffle Automation]]></title>
            <link rel="alternate" href="https://shuffler.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3026"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An Open Source SOAR solution. A general purpose security automation platform. Our focus is on collaboration and resource sharing. 

Shuffle is an open source automation platform, built for and by the security professionals. Security operations is complex, but it doesn&amp;#039;t have to be. Built to work well with MSSP&amp;#039;s and other service providers in mind.

- [Shuffle Automation @ GitHub](https://github.com/Shuffle/Shuffle).

Source: [Savez-vous ce qui est un OpenVOC ? @ Florian Dudaev&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/cyberflood_soc-voc-vulnerability-activity-7274743353609445377-8WOr/).]]>
            </summary>
            <updated>2025-08-29T00:20:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3031</id>
            <title type="text"><![CDATA[DFIR-IRIS:  Incident Response Investigation System]]></title>
            <link rel="alternate" href="https://dfir-iris.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3031"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open-Source Collaborative Incident Response Platform.
Created by incident responders for incident responders.

Iris is a web collaborative platform aiming to help incident responders sharing technical details during investigations.

- [DFIR-IRIS @ GitHub](https://github.com/dfir-iris/iris-web).]]>
            </summary>
            <updated>2025-08-29T00:21:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3032</id>
            <title type="text"><![CDATA[Graylog]]></title>
            <link rel="alternate" href="https://graylog.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3032"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Threat Detection &amp;amp; Incident Response Done Right.
SIEM, Log Management &amp;amp; API Protection.

Graylog is a free and open log management platform.

- [Graylog @ GitHub](https://github.com/Graylog2/graylog2-server).

Related contents:

- [Centralisation des logs : un atout clé pour la sécurité d’un SI @ IT-Connect :fr:](https://www.it-connect.fr/centralisation-des-logs-un-outil-pour-la-securite/).
- [Déployez Graylog sur Debian 12 pour centraliser et analyser vos logs facilement @ IT-Connect :fr:](https://www.it-connect.fr/tuto-graylog-sur-debian-centraliser-et-analyser-logs/).]]>
            </summary>
            <updated>2025-08-29T00:22:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3040</id>
            <title type="text"><![CDATA[IsMalicious Cybersecurity API]]></title>
            <link rel="alternate" href="https://ismalicious.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3040"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Check if an IP address or domain is malicious.

isMalicious is a cybersecurity API that helps protect your web applications from malicious or suspicious actors.]]>
            </summary>
            <updated>2025-08-29T00:24:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3041</id>
            <title type="text"><![CDATA[Rawsec&amp;#039;s CyberSecurity Inventory]]></title>
            <link rel="alternate" href="https://inventory.raw.pm/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3041"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An inventory of tools and resources about CyberSecurity.

- [Rawsec&amp;#039;s Cybersecurity Inventory @ GitHub](https://gitlab.com/rawsec/rawsec-cybersecurity-list).]]>
            </summary>
            <updated>2025-08-29T00:24:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3055</id>
            <title type="text"><![CDATA[Ligolo-ng]]></title>
            <link rel="alternate" href="https://github.com/nicocha30/ligolo-ng" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3055"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. 

Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS).

- [How to Tunnel and Pivot Networks using Ligolo-ng @ Software Sinner&amp;#039;s Medium](https://software-sinner.medium.com/how-to-tunnel-and-pivot-networks-using-ligolo-ng-cf828e59e740).
- [Pivoting réseau avec #ligolo-ng Comprendre le #pivoting @ Frozenk&amp;#039;s YouTube :fr:](https://www.youtube.com/watch?v=ggwL9a9tP9g).]]>
            </summary>
            <updated>2025-08-29T00:25:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3066</id>
            <title type="text"><![CDATA[Penelope]]></title>
            <link rel="alternate" href="https://github.com/brightio/penelope" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3066"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Penelope Shell Handler.

Penelope is a shell handler designed to be easy to use and intended to replace netcat when exploiting RCE vulnerabilities. It is compatible with Linux and macOS and requires Python 3.6 or higher. It is a standalone script that does not require any installation or external dependencies, and it is intended to remain this way.]]>
            </summary>
            <updated>2025-08-29T00:28:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3067</id>
            <title type="text"><![CDATA[ADSpider]]></title>
            <link rel="alternate" href="https://github.com/DrunkF0x/ADSpider" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3067"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Monitor changes in Active Directory with replication metadata.

Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update Sequence Number (USN) to filter current properties of objects.

- [🛠ADSpider - Monitor changes in Active Directory with replication metadata @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_security-cybersecurity-activedirectory-activity-7256926504373075968-fW5J/).]]>
            </summary>
            <updated>2025-08-29T00:28:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3072</id>
            <title type="text"><![CDATA[pwnlook]]></title>
            <link rel="alternate" href="https://github.com/amjcyber/pwnlook" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3072"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails configured in it.]]>
            </summary>
            <updated>2025-08-29T00:28:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3085</id>
            <title type="text"><![CDATA[Vulnhuntr]]></title>
            <link rel="alternate" href="https://github.com/protectai/vulnhuntr" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3085"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Zero shot vulnerability discovery using LLMs. A tool to identify remotely exploitable vulnerabilities using LLMs and static code analysis.

Vulnhuntr leverages the power of LLMs to automatically create and analyze entire code call chains starting from remote user input and ending at server output for detection of complex, multi-step, security-bypassing vulnerabilities that go far beyond what traditional static code analysis tools are capable of performing. 

Related contents:

- [VulnHuntr - L&amp;#039;IA qui trouve des failles 0day dans votre code Python @ Korben :fr:](https://korben.info/vulnhuntr-ia-detecteur-vulnerabilites-0day-python.html).]]>
            </summary>
            <updated>2025-08-29T00:30:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3090</id>
            <title type="text"><![CDATA[SafeLine]]></title>
            <link rel="alternate" href="https://safepoint.cloud/landing/safeline" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3090"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[the Best WAF for Webmaster. Secure Everything on Your Web Applications.A simple, lightweight, self-hosted WAF that protects your website from cyber attacks.

 serve as a reverse proxy to protect your web services from attacks and exploits. 

- [SafeLine @ GitHub](https://github.com/chaitin/SafeLine).

Related contents:

- [SafeLine WAF: Self-Hosted Bot Protection | Deploy and Secure Your Apps! @ Techdox&amp;#039;s YouTube](https://www.youtube.com/watch?v=vy6QeCsHrcs).
- [SafeLine WAF — Self-Hosted Web Application Firewall for Your Homelab @ Akash Rajpurohit! 👋 ](https://akashrajpurohit.com/blog/safeline-waf-protecting-your-web-applications-with-selfhosted-security/).
- [How to Protect Your SaaS from Bot Attacks with SafeLine WAF @ The Hacker News](https://thehackernews.com/2026/03/how-to-protect-your-saas-from-bot.html).]]>
            </summary>
            <updated>2026-03-02T14:33:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3098</id>
            <title type="text"><![CDATA[EMBA]]></title>
            <link rel="alternate" href="https://www.securefirmware.de/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3098"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The firmware security analyzer.

EMBA is designed as the central firmware analysis and SBOM tool for penetration testers, product security teams, developers and responsible product managers. It supports the complete security analysis process starting with firmware extraction, doing static analysis and dynamic analysis via emulation, building the SBOM and finally generating a web report. EMBA automatically discovers possible weak spots and vulnerabilities in firmware. Examples are insecure binaries, old and outdated software components, potentially vulnerable scripts, or hard-coded passwords. EMBA is a command line tool with the possibility to generate an easy-to-use web report for further analysis.]]>
            </summary>
            <updated>2025-08-29T00:32:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3107</id>
            <title type="text"><![CDATA[Safe C++]]></title>
            <link rel="alternate" href="https://safecpp.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3107"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The goal of this proposal is to advance a superset of C++ with a rigorously safe subset. Begin a new project, or take an existing one, and start writing safe code in C++. Code in the safe context exhibits the same strong safety guarantees as code written in Rust.

- [Episode 592 - C++ Safety Dance @ &amp;lt;Coder Radio&amp;gt;](https://coder.show/592).
- [What is the new safe C++ proposal and what do programmers need to know? @ TNW](https://thenextweb.com/news/safe-c-proposal-what-programmers-need-to-know).]]>
            </summary>
            <updated>2025-08-29T00:34:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3112</id>
            <title type="text"><![CDATA[LOST - Living Off Security Tools]]></title>
            <link rel="alternate" href="https://0xanalyst.github.io/Project-Lost/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3112"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Living Off The Land Security Tools is a curated list of Security Tools used by adversaries to bypass security controls and carry out attacks. 

- [Living Off Security Tools (LOST) @ GitHub](https://github.com/0xAnalyst/Project-Lost).]]>
            </summary>
            <updated>2025-08-29T00:36:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3113</id>
            <title type="text"><![CDATA[WinPmem]]></title>
            <link rel="alternate" href="https://github.com/Velocidex/WinPmem" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3113"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The multi-platform memory acquisition tool. 

WinPmem has been the default open source memory acquisition driver for windows for a long time. It used to live in the Rekall project, but has recently been separated into its own repository.]]>
            </summary>
            <updated>2025-08-29T00:36:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3115</id>
            <title type="text"><![CDATA[The Volatility Foundation]]></title>
            <link rel="alternate" href="https://volatilityfoundation.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3115"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Volatility Memory Forensics - Promoting Accessible Memory Analysis Tools Within the Memory Forensics Community.

Memory analysis has become one of the most important topics to the future of digital investigations, and The Volatility Framework has become the world’s most widely used memory forensics tool - relied upon by law enforcement, military, academia, and commercial investigators around the world. The Volatility Foundation helps keep Volatility going so that it may be used in perpetuity, free and open to all.]]>
            </summary>
            <updated>2025-08-29T00:36:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3116</id>
            <title type="text"><![CDATA[Linpmem]]></title>
            <link rel="alternate" href="https://github.com/Velocidex/Linpmem" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3116"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Linpmem is a linux memory acquisition tool. Linpmem is a Linux x64-only tool for reading physical memory.

Like its Windows counterpart, Winpmem, this is not a traditional memory dumper. Linpmem offers an API for reading from any physical address, including reserved memory and memory holes, but it can also be used for normal memory dumping. Furthermore, the driver offers a variety of access modes to read physical memory, such as byte, word, dword, qword, and buffer access mode, where buffer access mode is appropriate in most standard cases. If reading requires an aligned byte/word/dword/qword read, Linpmem will do precisely that.]]>
            </summary>
            <updated>2025-08-29T00:36:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3124</id>
            <title type="text"><![CDATA[LTESniffer]]></title>
            <link rel="alternate" href="https://github.com/SysSec-KAIST/LTESniffer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3124"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An Open-source LTE Downlink/Uplink Eavesdropper.

LTESniffer is a tool that can capture the LTE wireless messages that are sent between a cell tower and smartphones connected to it. LTESniffer supports capturing the messages in both directions, from the tower to the smartphones, and from the smartphones back to the cell tower.

It first decodes the Physical Downlink Control Channel (PDCCH) to obtain the Downlink Control Informations (DCIs) and Radio Network Temporary Identifiers (RNTIs) of all active users. Using decoded DCIs and RNTIs, LTESniffer further decodes the Physical Downlink Shared Channel (PDSCH) and Physical Uplink Shared Channel (PUSCH) to retrieve uplink and downlink data traffic.]]>
            </summary>
            <updated>2025-08-29T00:37:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3162</id>
            <title type="text"><![CDATA[Node Version Audit]]></title>
            <link rel="alternate" href="https://www.github.developerdan.com/node-version-audit/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3162"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Node Version Audit is a convenience tool to easily check a given Node.js version against a regularly updated list of CVE exploits, new releases, and end of life dates.

Node Version Audit is not: exploit detection/mitigation, vendor-specific version tracking, a replacement for staying informed on Node.js releases and security exploits. 

- [Node Version Audit @ GitHub](https://github.com/lightswitch05/node-version-audit).]]>
            </summary>
            <updated>2025-08-29T00:44:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3163</id>
            <title type="text"><![CDATA[s3cme]]></title>
            <link rel="alternate" href="https://github.com/mchmarny/s3cme" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3163"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Sample Go app repo with test and release pipelines optimized for software supply chain security (S3C).

 Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko generative SBOM, cosign attestation, and SLSA build provenance]]>
            </summary>
            <updated>2025-08-29T00:44:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3169</id>
            <title type="text"><![CDATA[Casbin]]></title>
            <link rel="alternate" href="https://casbin.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3169"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir.

- [Casbin @ GitHub](https://github.com/casbin/casbin).]]>
            </summary>
            <updated>2025-08-29T00:44:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3178</id>
            <title type="text"><![CDATA[Argus]]></title>
            <link rel="alternate" href="https://github.com/jasonxtn/Argus" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3178"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Ultimate Information Gathering Toolkit. A Python-based toolkit for Information Gathering and Reconnaissance.

Argus is an all-in-one, Python-powered toolkit designed to streamline the process of information gathering and reconnaissance. With a user-friendly interface and a suite of powerful modules, Argus empowers you to explore networks, web applications, and security configurations efficiently and effectively.]]>
            </summary>
            <updated>2025-08-29T00:46:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3197</id>
            <title type="text"><![CDATA[Hack4Values]]></title>
            <link rel="alternate" href="https://hack4values.eu/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3197"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Pro Bono Bug Hunting &amp;amp; Volunteer Hackers. Helping those who help.

Volunteer hackers to help nonprofits and NGOs strengthen their digital security.

- [Episode \#476 - Les Assises 2024 @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/les-assises-2024/).]]>
            </summary>
            <updated>2025-08-29T00:49:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3208</id>
            <title type="text"><![CDATA[dockcheck]]></title>
            <link rel="alternate" href="https://github.com/mag37/dockcheck" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3208"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CLI tool to automate docker image updates. Selective, notifications, autoprune, no pre-pulling.]]>
            </summary>
            <updated>2025-08-29T00:52:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3222</id>
            <title type="text"><![CDATA[Cosign]]></title>
            <link rel="alternate" href="https://github.com/sigstore/cosign" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3222"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Code signing and transparency for containers and binaries.
Signing OCI containers (and other artifacts) using Sigstore!
Cosign aims to make signatures invisible infrastructure.

Related contents:

- [Sécuriser la Supply Chain avec Cosign @ DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/supply-chain/cosign/).
- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).]]>
            </summary>
            <updated>2025-08-29T00:53:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3224</id>
            <title type="text"><![CDATA[CapibaraZero]]></title>
            <link rel="alternate" href="https://github.com/CapibaraZero/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3224"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CapibaraZero aim to be a cheap alternative to FlipperZero™. It&amp;#039;s based on ESP32 boards especially on ESP32-S3 but we want to port firmware to all ESP family boards.]]>
            </summary>
            <updated>2025-08-29T00:53:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3228</id>
            <title type="text"><![CDATA[Arch]]></title>
            <link rel="alternate" href="https://archgw.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3228"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Intelligent Prompt Gateway.

Arch is an intelligent prompt gateway. Engineered with (fast) LLMs for the secure handling, robust observability, and seamless integration of prompts with APIs - all outside business logic. Built by the core contributors of Envoy proxy, on Envoy. 

Arch is an intelligent Layer 7 gateway designed to protect, observe, and personalize LLM applications (agents, assistants, co-pilots) with your APIs.

- [Arch @ GitHub](https://github.com/katanemo/arch).]]>
            </summary>
            <updated>2025-08-29T00:54:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3235</id>
            <title type="text"><![CDATA[Halberd]]></title>
            <link rel="alternate" href="https://www.vectra.ai/blog/halberd-the-open-source-tool-democratizing-multi-cloud-security-testing" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3235"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Open-Source Tool Democratizing Multi-Cloud Security Testing by Arpan Sarkar.

Multi-Cloud Security Testing Tool to execute a comprehensive array of attack techniques across multiple surfaces via a simple web interface. 

Halberd is a powerful, multi-cloud security testing tool. Born out of the need for a unified, easy-to-use tool, Halberd enables you to proactively assess your cloud defenses by executing a comprehensive array of attack techniques across Entra ID, M365, Azure, and AWS. With its intuitive web interface, you can simulate real-world attacks, generate valuable telemetry, and validate your security controls with ease &amp;amp; speed.

- [Halberd @ GitHub](https://github.com/vectra-ai-research/Halberd).]]>
            </summary>
            <updated>2025-08-29T00:56:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3236</id>
            <title type="text"><![CDATA[Gato]]></title>
            <link rel="alternate" href="https://github.com/praetorian-inc/gato" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3236"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Gato, or GitHub Attack Toolkit, is an enumeration and attack tool that allows both blue teamers and offensive security practitioners to identify and exploit pipeline vulnerabilities within a GitHub organization&amp;#039;s public and private repositories.]]>
            </summary>
            <updated>2025-08-29T00:56:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3237</id>
            <title type="text"><![CDATA[VulnAPI]]></title>
            <link rel="alternate" href="https://vulnapi.cerberauth.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3237"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[API Security Vulnerability Scanner designed to help you secure your APIs. 

Your First Line of Defense in API Security. Scan your APIs for vulnerabilities with VulnAPI.

Help developers and security professionals quickly and efficiently scan their APIs for security vulnerabilities and weaknesses.

- [VulnAPI @ GitHub](https://github.com/cerberauth/vulnapi)]]>
            </summary>
            <updated>2025-08-29T00:56:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3257</id>
            <title type="text"><![CDATA[The JSON Web Token Toolkit]]></title>
            <link rel="alternate" href="https://github.com/ticarpi/jwt_tool" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3257"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens 

- [Dans +80% des cas où je teste la sécurité d&amp;#039;API, je trouve des problèmes de droit ou d&amp;#039;autorisation. Alors voici 2 plugins Burpsuite à connaître 👇 @ Corentin M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/corentin-margraff_dans-80-des-cas-o%C3%B9-je-teste-la-s%C3%A9curit%C3%A9-activity-7251857443847073792-tMUS/).]]>
            </summary>
            <updated>2025-08-29T01:00:47+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3258</id>
            <title type="text"><![CDATA[autorize]]></title>
            <link rel="alternate" href="https://github.com/PortSwigger/autorize" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3258"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perform an automatic authorization tests.

- [Dans +80% des cas où je teste la sécurité d&amp;#039;API, je trouve des problèmes de droit ou d&amp;#039;autorisation. Alors voici 2 plugins Burpsuite à connaître 👇 @ Corentin M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/corentin-margraff_dans-80-des-cas-o%C3%B9-je-teste-la-s%C3%A9curit%C3%A9-activity-7251857443847073792-tMUS/).]]>
            </summary>
            <updated>2025-08-29T01:00:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3259</id>
            <title type="text"><![CDATA[AuthMatrix]]></title>
            <link rel="alternate" href="https://github.com/PortSwigger/auth-matrix" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3259"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.

- [Dans +80% des cas où je teste la sécurité d&amp;#039;API, je trouve des problèmes de droit ou d&amp;#039;autorisation. Alors voici 2 plugins Burpsuite à connaître 👇 @ Corentin M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/corentin-margraff_dans-80-des-cas-o%C3%B9-je-teste-la-s%C3%A9curit%C3%A9-activity-7251857443847073792-tMUS/).]]>
            </summary>
            <updated>2025-08-29T01:00:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3266</id>
            <title type="text"><![CDATA[Dependency-Track]]></title>
            <link rel="alternate" href="https://dependencytrack.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3266"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Software Bill of Materials (SBOM) Analysis.

- [Dependency-Track @ GitHub](https://github.com/DependencyTrack/dependency-track).
- [Démarrer avec Dependency Track @ Culture et Outils DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/analyser-code/dependency-track/).]]>
            </summary>
            <updated>2025-08-29T01:00:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3268</id>
            <title type="text"><![CDATA[OpenClarity]]></title>
            <link rel="alternate" href="https://openclarity.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3268"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenClarity is an open source platform to enhance security and observability of cloud native applications and infrastructure.

OpenClarity is an open source tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and security threats such as vulnerabilities, exploits, malware, rootkits, misconfigurations and leaked secrets.

- [OpenClarity @ GitHub](https://github.com/openclarity/openclarity).

Related contents:

- [voici un outil Open Source autour de la sécurité et l&amp;#039;observabilité @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_security-cybersecurity-cloud-activity-7251843590824325120-PqKO/).]]>
            </summary>
            <updated>2025-08-29T01:00:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3276</id>
            <title type="text"><![CDATA[eBPF for Windows]]></title>
            <link rel="alternate" href="https://github.com/microsoft/ebpf-for-windows" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3276"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[eBPF implementation that runs on top of Windows.

eBPF is a well-known technology for providing programmability and agility, especially for extending an OS kernel, for use cases such as DoS protection and observability. This project is a work-in-progress that allows existing eBPF toolchains and APIs familiar in the Linux ecosystem to be used on top of Windows. That is, this project takes existing eBPF projects as submodules and adds the layer in between to make them run on top of Windows.

- [eBPF Is Coming for Windows @ The New Stack](https://thenewstack.io/ebpf-is-coming-for-windows/).]]>
            </summary>
            <updated>2025-08-29T01:02:47+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3284</id>
            <title type="text"><![CDATA[KubeClarity]]></title>
            <link rel="alternate" href="https://github.com/openclarity/kubeclarity" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3284"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems. It scans both runtime K8s clusters and CI/CD pipelines for enhanced software supply chain security.]]>
            </summary>
            <updated>2025-08-29T01:04:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3285</id>
            <title type="text"><![CDATA[discover]]></title>
            <link rel="alternate" href="https://github.com/leebaird/discover" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3285"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.]]>
            </summary>
            <updated>2025-08-29T01:04:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3286</id>
            <title type="text"><![CDATA[Slack Watchman]]></title>
            <link rel="alternate" href="https://github.com/PaperMtn/slack-watchman" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3286"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Slack enumeration and exposed secrets detection tool. Monitoring and enumerating Slack for exposed secrets]]>
            </summary>
            <updated>2025-08-29T01:04:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3311</id>
            <title type="text"><![CDATA[Hayabusa (隼)]]></title>
            <link rel="alternate" href="https://github.com/Yamato-Security/hayabusa" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3311"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.]]>
            </summary>
            <updated>2025-08-29T01:08:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3313</id>
            <title type="text"><![CDATA[Docker Containers Security]]></title>
            <link rel="alternate" href="https://tbhaxor.com/docker-containers-security/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3313"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Docker is one of the most popular services to run containerized applications and it utilizes containerd and runc at a low level. This became popular because of its ease of use and intuitive experience. There are some misconfigurations that are left in the setup that can easily be exploited and few of them even let you break out of the containerized environment.

In this series, I will be explaining to you the basic concepts of the docker internals and how you can exploit certain misconfigurations to gain root user access or breakout of the containerization via both remote and local exploits. Also later in this course, you will learn how to secure your existing docker environment by following best practices from the experts.]]>
            </summary>
            <updated>2025-08-29T01:08:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3314</id>
            <title type="text"><![CDATA[Ghostport]]></title>
            <link rel="alternate" href="https://github.com/vxfemboy/ghostport" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3314"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features customizable signatures, efficient async handling, and easy traffic redirection. 

Ghostport is a sophisticated port spoofing tool designed to confuse and mislead port scanners. It&amp;#039;s a Rust implementation inspired by the concept of portspoof, offering enhanced performance and flexibility.]]>
            </summary>
            <updated>2025-08-29T01:08:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3317</id>
            <title type="text"><![CDATA[Octoscan]]></title>
            <link rel="alternate" href="https://github.com/synacktiv/octoscan" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3317"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Octoscan is a static vulnerability scanner for GitHub action workflows. 

- [action octoscan @ GitHub](https://github.com/synacktiv/action-octoscan).]]>
            </summary>
            <updated>2025-08-29T01:09:00+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3330</id>
            <title type="text"><![CDATA[Twistr is a Domain name permutation and enumeration library powered by Rust. It aims to directly port the well-known dnstwist tool allowing for fast and flexible interfacing capabilities with the core libraries based on client&amp;#039;s requirements.]]></title>
            <link rel="alternate" href="https://github.com/haveibeensquatted/twistrs" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3330"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Twistr is a Domain name permutation and enumeration library powered by Rust. It aims to directly port the well-known dnstwist tool allowing for fast and flexible interfacing capabilities with the core libraries based on client&amp;#039;s requirements.]]>
            </summary>
            <updated>2025-08-29T01:12:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3331</id>
            <title type="text"><![CDATA[Have I Been Squatted?]]></title>
            <link rel="alternate" href="https://haveibeensquatted.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3331"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Check if your domain has been typosquatted]]>
            </summary>
            <updated>2025-08-29T01:12:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3343</id>
            <title type="text"><![CDATA[Venator]]></title>
            <link rel="alternate" href="https://github.com/nianticlabs/venator" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3343"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A flexible detection platform that simplifies rule management and deployment with K8s CronJob and Helm. Venator is flexible enough to run standalone or with other job schedulers like Nomad.

Venator is optimized for Kubernetes deployment but is flexible enough to run standalone or with other job schedulers like Nomad. It provides a highly adaptable detection engine that prioritizes simplicity, extensibility, and ease of maintenance. Supporting multiple query engines and publishers, Venator allows you to easily switch between different data lakes or services with minimal changes, avoiding vendor lock-in and dependence on specific SIEM solutions for signal generation.]]>
            </summary>
            <updated>2025-08-29T01:13:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3346</id>
            <title type="text"><![CDATA[Ax Framework]]></title>
            <link rel="alternate" href="https://ax-framework.gitbook.io/wiki" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3346"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbitrary binaries and scripts using any of our seven supported cloud providers.

The Ax Framework is a free and open-source tool utilized by Bug Hunters and Penetration Testers to efficiently operate in multiple cloud environments. It helps build and deploy repeatable infrastructure tailored for offensive security purposes.

- [Ax Framework @ GitHub](https://github.com/attacksurge/ax).]]>
            </summary>
            <updated>2025-08-29T01:13:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3347</id>
            <title type="text"><![CDATA[Lambda Watchdog]]></title>
            <link rel="alternate" href="https://lambdawatchdog.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3347"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Your CVE dashboard for AWS Lambda!]]>
            </summary>
            <updated>2025-08-29T01:14:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3379</id>
            <title type="text"><![CDATA[LOLESXi]]></title>
            <link rel="alternate" href="https://lolesxi-project.github.io/LOLESXi/#" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3379"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[LOLESXi features a comprehensive list of binaries/scripts natively available in VMware ESXi that adversaries have utilised in their operations. The information on this site is compiled from open-source threat research.

- [LOLESXi @ GitHub](https://github.com/LOLESXi-Project/LOLESXi/).]]>
            </summary>
            <updated>2025-08-29T01:20:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3388</id>
            <title type="text"><![CDATA[Segugio]]></title>
            <link rel="alternate" href="https://github.com/reecdeep/segugio" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3388"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracting the malware&amp;#039;s final stage configuration.
Segugio was created to address the need for speeding up the extraction of IoCs from malicious artifacts within the analysis environment.
Malware analysis often involves time-consuming activities like static and dynamic analysis, which require extensive knowledge in reverse engineering and code analysis.]]>
            </summary>
            <updated>2025-08-29T01:21:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3389</id>
            <title type="text"><![CDATA[WhoYouCalling]]></title>
            <link rel="alternate" href="https://github.com/H4NM/WhoYouCalling" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3389"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Records an executable&amp;#039;s network activity into a Full Packet Capture file (.pcap) and much more. 

Monitors network activity made by a process through the use of Windows Event Tracing (ETW) and Full Packet Capture (FPC). Filters a generated .pcap file with BPF based on the detected network activity made by the process. This application makes process network monitoring hella&amp;#039; easy.]]>
            </summary>
            <updated>2025-08-29T01:21:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3392</id>
            <title type="text"><![CDATA[FOSSA]]></title>
            <link rel="alternate" href="https://fossa.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3392"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Comprehensive Open Source Security and SBOM Management. Secure Your Products From Repo to Release.

Stop vulnerabilities, automate compliance, and mitigate third-party risk in your applications.

- [FOSSA CLI @ GitHub](https://github.com/fossas/fossa-cli).]]>
            </summary>
            <updated>2025-08-29T01:21:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3400</id>
            <title type="text"><![CDATA[K8sGPT]]></title>
            <link rel="alternate" href="https://k8sgpt.ai/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3400"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Giving Kubernetes Superpowers to everyone.

k8sgpt is a tool for scanning your Kubernetes clusters, diagnosing, and triaging issues in simple English.
It has SRE experience codified into its analyzers and helps to pull out the most relevant information to enrich it with AI.

- [K8sGPT @ GitHub](https://github.com/k8sgpt-ai/k8sgpt).
- [Veille de la semaine du 23 septembre 2024 @ Veille de la semaine&amp;#039;s Substack :fr:](https://guikingone.substack.com/p/veille-de-la-semaine-du-23-septembre).]]>
            </summary>
            <updated>2025-08-29T01:22:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3417</id>
            <title type="text"><![CDATA[PyRASP]]></title>
            <link rel="alternate" href="https://pyrasp.paracyberbellum.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3417"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Runtime Application Self Protection agent for Python applications and serverless functions. Relies on AI, syntax analysis, and underlying OS capabilities to seamlessly provides accurate protection from within, without updates.

PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django) and Serverless Functions (AWS Lambda, Azure and Google Cloud Functions). 

- [PyRASP @ GitHub](https://github.com/rbidou/pyrasp).
- [Episode \#474 - Renaud Bidou – PyRASP @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/renaud-bidou-pyrasp/).]]>
            </summary>
            <updated>2025-08-29T01:26:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3423</id>
            <title type="text"><![CDATA[Cuckoo3]]></title>
            <link rel="alternate" href="https://cuckoo-hatch.cert.ee/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3423"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Malware analysis tool.
Cuckoo3 is a Python 3 open source automated malware analysis system. 

Cuckoo3 is an open-source tool to test suspicious files or links in a controlled environment.
It will test them in a sandboxed platform emulator(s) and generate a report, showing what the files or websites did during the test.

- [Cuckoo3 @ GitHub](https://github.com/cert-ee/cuckoo3).]]>
            </summary>
            <updated>2025-08-29T01:27:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3436</id>
            <title type="text"><![CDATA[CloudShovel]]></title>
            <link rel="alternate" href="https://github.com/saw-your-packet/CloudShovel" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3436"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CloudShovel is a tool designed to search for sensitive information within public or private Amazon Machine Images (AMIs). It automates the process of launching instances from target AMIs, mounting their volumes, and scanning for potential secrets or sensitive data.]]>
            </summary>
            <updated>2025-08-29T01:29:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3464</id>
            <title type="text"><![CDATA[ArcherySec]]></title>
            <link rel="alternate" href="https://www.archerysec.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3464"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OPEN SOURCE ORCHESTRATION AND CORRELATION TOOL.  ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec. 

Automate Your Application Security Orchestration And Correlation (ASOC) Using ArcherySec.

ArcherySec allow to interact with continuous integration/continuous delivery (CI/CD) toolchains to specify testing, and control the release of a given build based on results. Its include prioritization functions, enabling you to focus on the most critical vulnerabilities. ArcherySec uses popular open source tools to perform comprehensive scanning for web application and network. The developers can also utilize the tool for implementation of their DevOps CI/CD environment.

- [ArcherySec @ GitHub](https://github.com/archerysec/archerysec).
- [🚨 ArcherySec - La plateforme open source incontournable pour l&amp;#039;orchestration de la sécurité des applications 🛡️ @ Souleiman S.&amp;#039; LinkedIn :fr:](https://www.linkedin.com/posts/souleiman-s-497469156_cybersaezcuritaez-opensource-vulnaezrabilitaezs-activity-7244677201982369792-792I/).]]>
            </summary>
            <updated>2025-08-29T01:34:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3491</id>
            <title type="text"><![CDATA[Mageni]]></title>
            <link rel="alternate" href="https://www.mageni.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3491"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free and open-source vulnerability scanner.

Mageni is an open source vulnerability management platform. Mageni provides a faster, enjoyable, and leaner vulnerability management experience for modern cybersecurity programs.

- [Mageni @ GitHub](https://github.com/mageni/mageni).]]>
            </summary>
            <updated>2025-08-29T01:38:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3493</id>
            <title type="text"><![CDATA[Nostr]]></title>
            <link rel="alternate" href="https://nostr.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3493"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[a simple protocol for decentralizing social media that has a chance of working.
a truly censorship-resistant alternative to Twitter that has a chance of working.

A better internet is possible: decentralize Twitter, eBay, IoT and other stuff.

Smart-client/dumb-server architecture that can create the free and open internet we were promised.

- [Nostr @ GitHub](https://github.com/nostr-protocol/nostr).
- [Nostr Apps](https://nostrapps.com/).
- [Nature&amp;#039;s many attempts to evolve a Nostr @ Squishy](https://newsletter.squishy.computer/p/natures-many-attempts-to-evolve-a).
- [Use Protocols, Not Services @ ~~p](https://notnotp.com/notes/use-protocols-not-services/).]]>
            </summary>
            <updated>2026-02-17T12:53:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3542</id>
            <title type="text"><![CDATA[eCapture]]></title>
            <link rel="alternate" href="https://ecapture.cc/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3542"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64. 

- [eCapture @ GitHub](https://github.com/gojue/ecapture).
- [115 - RADIUS/UDP Considered Harmful @ Feisty Duck&amp;#039;s Cryptography &amp;amp; Security Newsletter](https://www.feistyduck.com/newsletter/issue_115_radius_udp_considered_harmful).]]>
            </summary>
            <updated>2025-08-29T01:47:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3561</id>
            <title type="text"><![CDATA[Athena OS]]></title>
            <link rel="alternate" href="https://athenaos.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3561"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Dive into a new Pentesting Experience with Athena OS!

Athena OS is an open-source, NixOS-based distribution intended to build a new concept of pentesting operating system. Its purpose is to offer a different experience than the most used pentesting distributions by providing reproducibility, flexibility, isolation, default packages that fit with the user needs, diverse hacking resources and learning materials.

- [Athena OS @ GitHub](https://github.com/Athena-OS).]]>
            </summary>
            <updated>2025-08-29T01:50:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3564</id>
            <title type="text"><![CDATA[Spraykatz]]></title>
            <link rel="alternate" href="https://github.com/aas-n/spraykatz" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3564"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Credentials gathering tool automating remote procdump and parse of lsass process. 

Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments.

It simply tries to procdump machines and parse dumps remotely in order to avoid detections by antivirus softwares as much as possible.

- [Spraykatz, alat penguji Windows @ ZdanSec](https://zidansec.com/spraykatz-alat-penguji-windows).]]>
            </summary>
            <updated>2025-08-29T01:50:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3575</id>
            <title type="text"><![CDATA[Zircolite]]></title>
            <link rel="alternate" href="https://wagga40.github.io/Zircolite/#/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3575"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Zircolite is a standalone tool written in Python 3. It allows to use SIGMA rules on : MS Windows EVTX (EVTX, XML and JSONL format), Auditd logs, Sysmon for Linux and EVTXtract logs.

- [Zircolite @ GitHub](https://github.com/wagga40/Zircolite).]]>
            </summary>
            <updated>2025-08-29T01:53:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3578</id>
            <title type="text"><![CDATA[linux-smart-enumeration]]></title>
            <link rel="alternate" href="https://github.com/diego-treitos/linux-smart-enumeration" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3578"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Linux enumeration tool for pentesting and CTFs with verbosity levels.

This shell script will show relevant information about the security of the local Linux system, helping to escalate privileges. From version 2.0 it is mostly POSIX compliant and tested with shellcheck and posh.

It can also monitor processes to discover recurrent program executions. It monitors while it is executing all the other tests so you save some time. By default it monitors during 1 minute but you can choose the watch time with the -p parameter.]]>
            </summary>
            <updated>2025-08-29T01:53:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3591</id>
            <title type="text"><![CDATA[ASNmap]]></title>
            <link rel="alternate" href="https://github.com/projectdiscovery/asnmap" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3591"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Go CLI and Library for quickly mapping organization network ranges using ASN information.]]>
            </summary>
            <updated>2025-08-29T01:55:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3594</id>
            <title type="text"><![CDATA[Secator]]></title>
            <link rel="alternate" href="https://docs.freelabz.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3594"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[secator is a task and workflow runner used for security assessments. It supports dozens of well-known security tools and is designed to improve productivity for pentesters and security researchers.

- [Secator @ GitHub](https://github.com/freelabz/secator).]]>
            </summary>
            <updated>2025-08-29T01:55:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3595</id>
            <title type="text"><![CDATA[graudit]]></title>
            <link rel="alternate" href="https://github.com/wireghoul/graudit" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3595"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[grep rough audit - source code auditing tool.

graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. It&amp;#039;s comparable to other static analysis applications like RATS, SWAAT and flaw-finder while keeping the technical requirements to a minimum and being very flexible.]]>
            </summary>
            <updated>2025-08-29T01:57:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3618</id>
            <title type="text"><![CDATA[Sigstore]]></title>
            <link rel="alternate" href="https://www.sigstore.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3618"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Sigstore is an open source project for improving software supply chain security. The Sigstore framework and tooling empowers software developers and consumers to securely sign and verify software artifacts such as release files, container images, binaries, software bills of materials (SBOMs), and more. Signatures are generated with ephemeral signing keys so there’s no need to manage keys. Signing events are recorded in a tamper-resistant public log so software developers can audit signing events.

- [Sigstore @ GitHub](https://github.com/sigstore/sigstore).
- [Sigstore documentation](https://docs.sigstore.dev/).

Related contents:

- [Streamline security with keyless signing and verification in GitLab @ GitLab](https://about.gitlab.com/blog/2023/09/13/keyless-signing-with-cosign/).
- [Annotate container images with build provenance using Cosign in GitLab CI/CD @ GitLab](https://about.gitlab.com/blog/2024/09/04/annotate-container-images-with-build-provenance-using-cosign-in-gitlab-ci-cd/).
- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).
- [Blueprinting Security in CI/CD: Building Trust Through Open Source @ CD Foundation](https://cd.foundation/blog/2026/02/06/blueprinting-security/).]]>
            </summary>
            <updated>2026-02-18T13:13:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3658</id>
            <title type="text"><![CDATA[hackingtool]]></title>
            <link rel="alternate" href="https://github.com/Z4nzu/hackingtool" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3658"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[ALL IN ONE Hacking Tool For Hackers.]]>
            </summary>
            <updated>2025-08-29T02:06:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3661</id>
            <title type="text"><![CDATA[Maester]]></title>
            <link rel="alternate" href="https://maester.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3661"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Your Microsoft Security test automation framework!

Monitor your Microsoft 365 tenant&amp;#039;s security configuration using Maester!

Maester is an open source PowerShell-based test automation framework designed to help you monitor and maintain the security configuration of your Microsoft 365 environment.

- [Maester @ GitHub](https://github.com/maester365/maester).
- [Maester, l’outil pour automatiser vos tests de sécurité Microsoft 365 @ IT Connect :fr:](https://www.it-connect.fr/maester-automatiser-tests-de-securite-microsoft-365/).]]>
            </summary>
            <updated>2025-08-29T02:07:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3663</id>
            <title type="text"><![CDATA[Ransomware.live]]></title>
            <link rel="alternate" href="https://ransomware.live/#/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3663"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tracking ransomware&amp;#039;s victims since April 2022

A ransomware is a type of malware used by cybercriminals to encrypt the victim&amp;#039;s files and make them inaccessible unless they pay the ransom. Today cybercriminals are more sophisticated, and they not only encrypt the victim&amp;#039;s files also they leaking their data to the Darknet unless they will pay the ransom.

Ransomware.live is originally a fork of ransomwatch and inspired by ransomlook. Ransomware.live is a ransomware leak site monitoring tool. It will scrape all of the entries on various ransomware leak sites and published them.

- [Ransomware.live @ GitHub](https://github.com/jmousqueton/ransomware.live).
- [ 🚨Voici un outil et ressource de surveillance de dataleaks à la suite de ransomware. @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_github-security-cybersecurity-activity-7236257211633577984-iit9/).]]>
            </summary>
            <updated>2025-08-29T02:07:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3664</id>
            <title type="text"><![CDATA[Hello My Dir!]]></title>
            <link rel="alternate" href="https://github.com/LoicVeirman/Hello-My-Dir" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3664"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This project is specifically made for brand new directories and ease their creation with all security rules in place:

- Remove legacy protocols/setup used by Microsoft for compliance purposes
- Enforce the use of modern alogrithm for cyphering and authentication
- Enforce LDAPS when a client requests a connection to your DC
- Enforce the default password strategy to match with modern expectation
- Add other Domain Controllers to your secured domain

Related contents:

- [Comment créer un domaine Active Directory respectueux des bonnes pratiques de sécurité ? @ IT Connect :fr:](https://www.it-connect.fr/comment-creer-un-domaine-active-directory-respectueux-des-bonnes-pratiques-de-securite/).]]>
            </summary>
            <updated>2025-08-29T02:07:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3677</id>
            <title type="text"><![CDATA[open-appsec]]></title>
            <link rel="alternate" href="https://www.openappsec.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3677"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automatic Open Source WAF &amp;amp; API Security.

open-appsec is a machine learning security engine that preemptively and automatically prevents threats against Web Application &amp;amp; APIs.

- [open-appsec @ GitHub](https://github.com/openappsec/openappsec).]]>
            </summary>
            <updated>2025-08-29T02:09:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3709</id>
            <title type="text"><![CDATA[Open Policy Agent]]></title>
            <link rel="alternate" href="https://www.openpolicyagent.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3709"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Policy-based control for cloud native environments.
Flexible, fine-grained control for administrators across the stack.

Open Policy Agent (OPA) is an open source, general-purpose policy engine that enables unified, context-aware policy enforcement across the entire stack.

- [Open Policy Agent @ GitHub](https://github.com/open-policy-agent/opa).

Related contents:

- [Guardrails for Your Cloud: A Simple Guide to OPA and Terraform @ Sami Banerjee&amp;#039;s Medium](https://medium.com/@er.samibanerjee/guardrails-for-your-cloud-a-simple-guide-to-opa-and-terraform-aada0d589dc5).
- [Getting Open Policy Agent Up and Running @ The New Stack](https://thenewstack.io/getting-open-policy-agent-up-and-running/). 
- [Simplify Kubernetes Security With Kyverno and OPA Gatekeeper @ The New Stack](https://thenewstack.io/simplify-kubernetes-security-with-kyverno-and-opa-gatekeeper/).
- [Automating policy enforcements for infrastructure using Open Policy Agent (OPA) in Terraform — Part 1 @ Ashay Maheshwari&amp;#039;s Medium](https://aashay-arya.medium.com/automating-policy-enforcements-for-infrastructure-using-open-policy-agent-opa-in-terraform-a78a78bb34a1).
- [Terraform governing with OPA @ DevOpsOnTheTrail](https://devopsonthetrail.com/terraform-governing-with-opa/).
- [Blueprinting Security in CI/CD: Building Trust Through Open Source @ CD Foundation](https://cd.foundation/blog/2026/02/06/blueprinting-security/).
- [From Kubernetes Gatekeeper to Full-Stack Governance with OPA @ Pulumi](https://www.pulumi.com/blog/kubernetes-gatekeeper-full-stack-governance-opa/).]]>
            </summary>
            <updated>2026-03-20T12:37:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3710</id>
            <title type="text"><![CDATA[GreenSnow]]></title>
            <link rel="alternate" href="https://greensnow.co/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3710"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[BlockingList.

GreenSnow is a team consisting of the best specialists in computer security, we harvest a large number of IPs from different computers located around the world. GreenSnow is comparable with SpamHaus.org for attacks of any kind except for spam. Our list is updated automatically and you can withdraw at any time your IP address if it has been listed.]]>
            </summary>
            <updated>2025-08-29T02:15:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3711</id>
            <title type="text"><![CDATA[BotScout.com]]></title>
            <link rel="alternate" href="https://botscout.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3711"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Proactive Bot Detection,Screening, &amp;amp; Banning.

BotScout helps prevent automated web scripts, known as &amp;quot;bots&amp;quot;, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. We do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. We make this signature data available through a simple yet powerful API that you can use to test forms when they&amp;#039;re submitted on your site.]]>
            </summary>
            <updated>2025-08-29T02:15:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3712</id>
            <title type="text"><![CDATA[VoIP Blacklist]]></title>
            <link rel="alternate" href="https://voipbl.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3712"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Protect your business and PBX&amp;#039;s against VoIP Fraud. Minimize the risks of attacks on your Telephony Server. Save bandwidth by using Geolocation filtering.

 VoIPBL is a distributed VoIP blacklist that is aimed to protects against VoIP Fraud and minimizing abuse for network that have publicly accessible PBX&amp;#039;s.]]>
            </summary>
            <updated>2025-08-29T02:15:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3749</id>
            <title type="text"><![CDATA[SimpleX Chat]]></title>
            <link rel="alternate" href="https://simplex.chat/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3749"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Privacy redefined, The first messenger without user IDs.

private and secure messenger without any user IDs (not even random).

- [SimpleX Chat @ GitHub](https://github.com/simplex-chat/simplex-chat).]]>
            </summary>
            <updated>2025-08-29T02:21:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3769</id>
            <title type="text"><![CDATA[GraphQL Shield]]></title>
            <link rel="alternate" href="https://the-guild.dev/graphql/shield" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3769"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🛡 A GraphQL tool to ease the creation of permission layer. GraphQL Permissions Framework for Complex Authorisation Systems.
Implement your server permissions in a clear and deterministic way and let it guard access to your schema.

GraphQL Shield helps you create a permission layer for your application. Using an intuitive rule-API, you&amp;#039;ll gain the power of the shield engine on every request and reduce the load time of every request with smart caching. This way you can make sure your application will remain quick, and no internal data will be exposed.

- [GraphQL Shield @ GitHub](https://github.com/maticzav/graphql-shield).]]>
            </summary>
            <updated>2025-08-29T02:25:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3781</id>
            <title type="text"><![CDATA[SSHamble]]></title>
            <link rel="alternate" href="https://github.com/runZeroInc/sshamble" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3781"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Unexpected Exposures in SSH. SSHamble is a research tool for SSH implementations.

SSHamble simulates potential attack scenarios, including unauthorized remote access due to unexpected state transitions, remote command execution in post-session login implementations, and information leakage through unlimited high-speed authentication requests. The SSHamble interactive shell provides raw access to SSH requests in the post-session (but pre-execution) environment, allowing for simple testing of environment controls, signal processing, port forwarding, and more.

- [SSHamble @ runZero](https://www.runzero.com/sshamble/).]]>
            </summary>
            <updated>2025-08-29T02:26:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3788</id>
            <title type="text"><![CDATA[NetBird]]></title>
            <link rel="alternate" href="https://netbird.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3788"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Connect and Secure Your IT Infrastructure in Minutes.
Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls. 
NetBird combines a configuration-free peer-to-peer private network and a centralized access control system in a single open-source platform, making it easy to create secure private networks for your organization or home.

- [NetBird @ GitHub](https://github.com/netbirdio/netbird).

Related contents:

- [Episode 575: Brent&amp;#039;s Busted Builds @ Linux Unplugged](https://linuxunplugged.com/575).
- [Ep 13: Cyberdeck Cyberwhat Selfhosted VPN networks and is Wireguard Hard @ Linux Prepper](https://podcast.james.network/@linuxprepper/episodes/cyberdeck-cyberwhat)
  ([Episode 13 Shownotes - Cyberdeck Cyberwhat and is Wireguard Hard @ Learning Together](https://discuss.james.network/public/d/69-episode-13-shownotes-cyberdeck-cyberwhat-and-is-wireguard-hard)).]]>
            </summary>
            <updated>2025-10-28T09:08:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3789</id>
            <title type="text"><![CDATA[Blue Iris Software]]></title>
            <link rel="alternate" href="https://blueirissoftware.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3789"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Video Management Software.
Use up to 64 cameras (webcams, network IP cams, analog cards, or your Windows PC desktop). Capture JPEG snapshots or movies in standard MP4, AVI, advanced DVR, or Windows Media file formats.

- [jshridha/blueiris @ Docker Hub](https://hub.docker.com/r/jshridha/blueiris/) (BlueIris in a docker container!).
- [Episode 575: Brent&amp;#039;s Busted Builds @ Linux Unplugged](https://linuxunplugged.com/575).]]>
            </summary>
            <updated>2025-08-29T02:29:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3835</id>
            <title type="text"><![CDATA[Logto]]></title>
            <link rel="alternate" href="https://logto.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3835"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🧑‍🚀 The better identity infrastructure for developers and the open-source alternative to Auth0. 

Logto is an Auth0 alternative designed for modern apps and SaaS products. It offers a seamless developer experience and is well-suited for individuals and growing companies.

- [Logto @ GitHub](https://github.com/logto-io/logto).]]>
            </summary>
            <updated>2025-08-29T02:35:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3852</id>
            <title type="text"><![CDATA[Twistlock AuthZ Broker]]></title>
            <link rel="alternate" href="https://github.com/twistlock/authz" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3852"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Docker Authorization Plugin.

A basic extendable Docker authorization plugin that runs directly on the host or inside a container. The framework depends on docker authentication plugin support. Basic authorization is provided when Docker daemon is started with --tlsverify flag (username is extracted from the certificate common name).]]>
            </summary>
            <updated>2025-08-29T02:38:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3870</id>
            <title type="text"><![CDATA[TruffleHog]]></title>
            <link rel="alternate" href="https://trufflesecurity.com/trufflehog" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3870"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Find and verify secrets. Find leaked credentials.

TruffleHog is the most powerful secrets Discovery, Classification, Validation, and Analysis tool. In this context secret refers to a credential a machine uses to authenticate itself to another machine. This includes API keys, database passwords, private encryption keys, and more...

- [TruffleHog @ GitHub](https://github.com/trufflesecurity/trufflehog).

Related contents:

- [Keeping Secrets Out of Logs @ allan.reyes.sh](https://allan.reyes.sh/posts/keeping-secrets-out-of-logs/).
- [How Security Tool Misuse Is Reshaping Cloud Compromise @ Qualys](https://blog.qualys.com/qualys-insights/2026/02/19/how-security-tool-misuse-is-reshaping-cloud-compromise).]]>
            </summary>
            <updated>2026-03-05T12:17:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3872</id>
            <title type="text"><![CDATA[HellPot]]></title>
            <link rel="alternate" href="https://github.com/yunginnanet/HellPot" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3872"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[HellPot is a cross-platform portal to endless suffering meant to punish unruly HTTP bots. 
Notably it implements a toml configuration file, has JSON logging, and comes with significant performance gains.]]>
            </summary>
            <updated>2025-08-29T02:41:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3911</id>
            <title type="text"><![CDATA[The Mooltipass Hardware Authenticator]]></title>
            <link rel="alternate" href="https://www.themooltipass.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3911"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Simple Hardware Authenticator

- [Episode 573 - Universal Blue Man Group @ Linux Unplugged](https://linuxunplugged.com/573).]]>
            </summary>
            <updated>2025-08-29T02:49:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3927</id>
            <title type="text"><![CDATA[macro_pack]]></title>
            <link rel="alternate" href="https://github.com/sevagas/macro_pack" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3927"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to fin… 

- [Episode #466 consacré à BallisKit Avec Emeric Nasi @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/balliskit/).]]>
            </summary>
            <updated>2025-08-29T02:50:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3928</id>
            <title type="text"><![CDATA[BallisKit]]></title>
            <link rel="alternate" href="https://www.balliskit.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3928"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A companion toolkit for Pentesters &amp;amp; Red Teams.

BallisKit helps by providing automation and weaponization of payload generation. Our products are also equipped with multiple security solution bypasses and ready to use templates to cover any scenarios the RedTeam may face. BallisKit is an array of tools and services developed to help Red Teams and Pentesters in their mission. Capabilities include, among other, penetration testing, demos and social engineering campaigns (email, USB key, etc.).

- [Episode #466 consacré à BallisKit Avec Emeric Nasi @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/balliskit/).]]>
            </summary>
            <updated>2025-08-29T02:51:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3949</id>
            <title type="text"><![CDATA[CIS Benchmarks]]></title>
            <link rel="alternate" href="https://www.cisecurity.org/cis-benchmarks" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3949"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The CIS Benchmarks™ are prescriptive configuration recommendations for more than 25+ vendor product families. They represent the consensus-based effort of cybersecurity experts globally to help you protect your systems against threats more confidently.]]>
            </summary>
            <updated>2025-08-29T02:54:47+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3950</id>
            <title type="text"><![CDATA[CISO Assistant]]></title>
            <link rel="alternate" href="https://intuitem.com/ciso-assistant/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3950"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[cyber arms for your security program - GRC can be tough: let CISO Assistant help you.

Cyber security program management can be challenging regardless of the size of your company. CISO Assistant one-stop-shop approach provides a pragmatic way to handle the complexity of GRC (Governance, Risk and Compliance) and make the tools work for you instead of the other way around.

- [CISO Assistant Community Edition @ GitHub](https://github.com/intuitem/ciso-assistant-community).
- [🚒 Les hashtag#pompiers, véritables héros de notre quotidien, ne se lancent jamais dans une opération sans une planification minutieuse @ Florian Dudaev&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/florian-dudaev_pompiers-cybersaezcuritaez-iso27001-ugcPost-7222153576557486081-Y-XD/).]]>
            </summary>
            <updated>2025-08-29T02:54:47+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3958</id>
            <title type="text"><![CDATA[Tang]]></title>
            <link rel="alternate" href="https://github.com/latchset/tang" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3958"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tang binding daemon.

Tang is a server for binding data to network presence.

This sounds fancy, but the concept is simple. You have some data, but you only want it to be available when the system containing the data is on a certain, usually secure, network. This is where Tang comes in.

- [Clevis/Tang: unattended boot of an encrypted NixOS system @ FOSDEM](https://fosdem.org/2024/schedule/event/fosdem-2024-3044-clevis-tang-unattended-boot-of-an-encrypted-nixos-system/).
- [Clevis &amp;amp; Tang on NixOS](https://camillemondon.com/talks/fosdem24-clevis/)
- [Episode 572: Data Security Only a Maniac Could Love @ Linux Unplugged](https://linuxunplugged.com/572).]]>
            </summary>
            <updated>2025-08-29T02:57:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3959</id>
            <title type="text"><![CDATA[Clevis]]></title>
            <link rel="alternate" href="https://github.com/latchset/clevis" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3959"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automated Encryption Framework

Clevis is a pluggable framework for automated decryption. It can be used to provide automated decryption of data or even automated unlocking of LUKS volumes.

- [Clevis/Tang: unattended boot of an encrypted NixOS system @ FOSDEM](https://fosdem.org/2024/schedule/event/fosdem-2024-3044-clevis-tang-unattended-boot-of-an-encrypted-nixos-system/).
- [Clevis &amp;amp; Tang on NixOS](https://camillemondon.com/talks/fosdem24-clevis/).
- [Safe automatic decryption of LUKS partition using TPM2 @ 221b](https://221b.uk/safe-automatic-decryption-luks-partition-tpm2).
- [Automatic LUKS 2 disk decryption with TPM 2 on Fedora @ kowalski7cc](https://kowalski7cc.xyz/blog/luks2-tpm2-clevis-fedora31/).
- [Automatically decrypt your disk using TPM2 @ fedora Magazine](https://fedoramagazine.org/automatically-decrypt-your-disk-using-tpm2/).
- [Use systemd-cryptenroll with FIDO U2F or TPM2 to decrypt your disk @ fedora Magazine](https://fedoramagazine.org/use-systemd-cryptenroll-with-fido-u2f-or-tpm2-to-decrypt-your-disk/).
- [Episode 572: Data Security Only a Maniac Could Love @ Linux Unplugged](https://linuxunplugged.com/572).]]>
            </summary>
            <updated>2025-08-29T02:57:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3961</id>
            <title type="text"><![CDATA[Vouch Proxy]]></title>
            <link rel="alternate" href="https://github.com/vouch/vouch-proxy" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3961"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[an SSO and OAuth / OIDC login solution for Nginx using the auth_request module.

An SSO solution for Nginx using the auth_request module. Vouch Proxy can protect all of your websites at once.

Vouch Proxy supports many OAuth and OIDC login providers and can enforce authentication]]>
            </summary>
            <updated>2025-08-29T02:57:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3975</id>
            <title type="text"><![CDATA[2FAGuard]]></title>
            <link rel="alternate" href="https://2faguard.app/en" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3975"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[TOTP Authenticator.

A modern and secure Windows app for managing your 2FA authentication codes. It&amp;#039;s free, open source, and easy to use. Download it now and get started in minutes. 

- [2FAGuard @ GitHub](https://github.com/timokoessler/2FAGuard).
- [2FAGuard – Un super client 2FA pour Windows 10 / 11 @ Korben :fr:](https://korben.info/2faguard-appli-windows-moderne-securisee-codes-2fa.html).]]>
            </summary>
            <updated>2025-08-29T02:58:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3980</id>
            <title type="text"><![CDATA[Ansible Collection - devsec.hardening]]></title>
            <link rel="alternate" href="https://github.com/dev-sec/ansible-collection-hardening" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3980"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This Ansible collection provides battle tested hardening for Linux, SSH, nginx, MySQL]]>
            </summary>
            <updated>2025-08-29T02:59:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3981</id>
            <title type="text"><![CDATA[Ory]]></title>
            <link rel="alternate" href="https://www.ory.sh/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3981"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[API-first Identity Management, Authentication and Authorization. For Secure, Global, GDPR-compliant Apps. The New Identity Stack you have been waiting for.

Traditional IAM solutions do not scale, they are not easy to customize, they are limited in their deployment models, and they don&amp;#039;t meet your or your customers&amp;#039; needs

- [Ory @ GitHub](https://github.com/ory).]]>
            </summary>
            <updated>2025-08-29T02:59:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3989</id>
            <title type="text"><![CDATA[Configuration recommendations of a gnu/linux system | ANSSI]]></title>
            <link rel="alternate" href="https://cyber.gouv.fr/en/publications/configuration-recommendations-gnulinux-system" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3989"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Unix operating systems and derivatives, including GNU/Linux, are playing an important role in the ecosystem of equipments, systems, networks and telecommunications. They are widely deployed in several equipments. This guide focuses mainly on generic system configuration guidelines and on common sense principles that need to be applied during the deployment of hosted services.]]>
            </summary>
            <updated>2025-08-29T03:01:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4008</id>
            <title type="text"><![CDATA[Nuclei]]></title>
            <link rel="alternate" href="https://docs.projectdiscovery.io/tools/nuclei/overview" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4008"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A fast and customisable vulnerability scanner powered by simple YAML-based templates.

- [Nuclei @ GitHub](https://github.com/projectdiscovery/nuclei).
- [Nuclei Templates homepage](https://nuclei-templates.netlify.app/) ([Nuclei Templates @ GitHub](https://github.com/projectdiscovery/nuclei-templates)).
- [Nuclei: The Ultimate Guide to Fast and Customizable Vulnerability Scanning @ InfoSec Write-ups&amp;#039; Medium](https://infosecwriteups.com/nuclei-the-ultimate-guide-to-fast-and-customizable-vulnerability-scanning-c86c50168798).
- [Simplifying XSS Detection with Nuclei - A New Approach @ ProjectDiscovery Blog](https://blog.projectdiscovery.io/simplifying-xss-detection-with-nuclei/).]]>
            </summary>
            <updated>2025-08-29T03:05:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4015</id>
            <title type="text"><![CDATA[sshportal]]></title>
            <link rel="alternate" href="https://github.com/moul/sshportal" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4015"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🎩 simple, fun and transparent SSH (and telnet) bastion server.

Jump host/Jump server without the jump, a.k.a Transparent SSH bastion.]]>
            </summary>
            <updated>2025-08-29T03:05:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4016</id>
            <title type="text"><![CDATA[edr-internals]]></title>
            <link rel="alternate" href="https://github.com/outflanknl/edr-internals/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4016"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tools for analyzing EDR agents.

- [EDR Internals for macOS and Linux @ Outflank](https://www.outflank.nl/blog/2024/06/03/edr-internals-macos-linux/).]]>
            </summary>
            <updated>2025-08-29T03:05:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4017</id>
            <title type="text"><![CDATA[TrashSearch]]></title>
            <link rel="alternate" href="https://github.com/rndinfosecguy/TrashSearch" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4017"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Searching the TrashPanda OSINT bot API to check if your email/domain or password was leaked.

- [🚀 Découvrez TrashSearch : Votre Solution OSINT pour Vérifier les Fuites de Données 🕵️ @ Maory Schroder&amp;#039;s LinkedIN](https://www.linkedin.com/posts/maory-schroder_osint-cybersecurity-dataleaks-activity-7218505125600915456-UWuS/).]]>
            </summary>
            <updated>2025-08-29T03:05:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4037</id>
            <title type="text"><![CDATA[PurpleLab:]]></title>
            <link rel="alternate" href="https://github.com/Krook9d/PurpleLab" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4037"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks, all accessible through a user-friendly web interface.

- [⭕Envie de manipuler du lab à gogo, alors cette repository devrait vous plaire @ Laurent Minne&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_security-cybersecurity-purpleteam-activity-7216335289726726144--fnP).]]>
            </summary>
            <updated>2025-08-29T03:09:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4043</id>
            <title type="text"><![CDATA[OWASP Dependency-Check]]></title>
            <link rel="alternate" href="https://owasp.org/www-project-dependency-check/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4043"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Dependency-Check is a Software Composition Analysis (SCA) tool that attempts to detect publicly disclosed vulnerabilities contained within a project’s dependencies. It does this by determining if there is a Common Platform Enumeration (CPE) identifier for a given dependency. If found, it will generate a report linking to the associated CVE entries.

- [Dependency-Check @ GitHub](https://github.com/dependency-check/DependencyCheck).]]>
            </summary>
            <updated>2025-08-29T03:10:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4045</id>
            <title type="text"><![CDATA[Permissions Policy HTTP Header Generator]]></title>
            <link rel="alternate" href="https://permissionspolicy.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4045"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[You can use this tool to generate a valid Permissions Policy HTTP Header, which can be provided by your web server / web application in order to improve the security of your visitors and the data they may be accessing on your site.

- [Security Tip: Do You Have a Permissions Policy?  @ Securing Laravel](https://securinglaravel.com/security-tip-do-you-have-a-permissions-policy/).]]>
            </summary>
            <updated>2025-10-15T06:44:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4085</id>
            <title type="text"><![CDATA[OpenCanary]]></title>
            <link rel="alternate" href="https://opencanary.readthedocs.io/en/latest/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4085"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Modular and decentralised honeypot.

OpenCanary is a daemon that runs canary services, which trigger alerts when (ab) is used. The alerts can be sent to a variety of sources, including Syslog, emails, and a companion daemon opencanary-correlator.

- [OpenCanary @ GitHub](https://github.com/thinkst/opencanary).
- [Thinkst Canary homepage](https://canary.tools/).
- [OpenCanary – Le pot de miel pour piéger les cyber criminels @ Korben :fr:](https://korben.info/opencanary-pot-de-miel-ultime-pieger-hackers.html).]]>
            </summary>
            <updated>2025-08-29T03:18:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4088</id>
            <title type="text"><![CDATA[Open Vulnerability Project]]></title>
            <link rel="alternate" href="https://github.com/jeremylong/Open-Vulnerability-Project" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4088"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Open Vulnerability Project is a collection of Java libraries and a CLI to work with various vulnerability data-sources (NVD, GitHub Security Advisories, CISA Known Exploited Vulnerablity Catalog, FIRST Exploit Prediction Scoring System (EPSS), etc.).]]>
            </summary>
            <updated>2025-08-29T03:18:07+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4094</id>
            <title type="text"><![CDATA[CrowdSec]]></title>
            <link rel="alternate" href="https://www.crowdsec.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4094"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The next-gen open source, crowd-powered &amp;amp; dynamic firewall.

Curated Threat Intelligence Powered by the Crowd. Maximize your security investments
with ultra-curated data.

- [CrowdSec @ GitHub](https://github.com/crowdsecurity/crowdsec).
- [277 - Défense communautaire - Julien Devouassoud @ \&amp;lt;ifttd\&amp;gt; :fr:](https://www.ifttd.io/episodes/defense-communautaire).]]>
            </summary>
            <updated>2025-08-29T03:18:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4108</id>
            <title type="text"><![CDATA[Purple Knight]]></title>
            <link rel="alternate" href="https://www.semperis.com/ad-security-vulnerability-assessment/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4108"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Active Directory Security Assessment. Close Active Directory and Entra ID Security Gaps.

Find and fix security vulnerabilities in AD, now Entra ID, and Okta with Purple Knight, a free AD security vulnerability assessment that helps you uncover hundreds of AD indicators of exposure (IOEs) and compromise (IOCs). Quickly conduct a security assessment of AD—involved in 9 out of 10 cyberattacks.]]>
            </summary>
            <updated>2025-08-29T03:22:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4109</id>
            <title type="text"><![CDATA[BTA]]></title>
            <link rel="alternate" href="https://github.com/airbus-seclab/bta" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4109"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[BTA is an open-source Active Directory security audit framework.

- [Analyse de la sécurité d&amp;#039;un Active Directory avec l&amp;#039;outil BTA — Joffrey Czarny, Philippe Biondi @ SSTIC :fr:](https://www.sstic.org/2014/presentation/BTA_Analyse_de_la_securite_Active_Directory/).
- [AD Miner - Analyse Active Directory — Emilien Vannier, Jean-Michel Besnard, Tanguy Boisset @ SSTIC :fr:](https://www.sstic.org/2024/presentation/AD_Miner_Active_Directory_Audit_Control/).]]>
            </summary>
            <updated>2025-08-29T03:22:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4113</id>
            <title type="text"><![CDATA[Security Scanner for Laravel]]></title>
            <link rel="alternate" href="https://ephort.dk/scanner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4113"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Check for free whether your Laravel website is safe or vulnerable before others do!

This is a free tool to all who wants to optimize and check the security on their Laravel website
While there are many security scanners out there, we thought that one was missing. That’s why we made this vulnerability scanner that focus specific on Laravel websites. We focused on known Laravel vulnerabilities, and made the scanner focus on them. 

- [In Depth: Pentesting Laravel part 1 - Passive Scans @ Securing Laravel](https://securinglaravel.com/in-depth-pentesting-laravel-part-1-passive-scans/).]]>
            </summary>
            <updated>2025-08-29T03:22:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4119</id>
            <title type="text"><![CDATA[Gitleaks]]></title>
            <link rel="alternate" href="https://gitleaks.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4119"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Gitleaks is a fast, light-weight, portable, and open-source secret scanner for git repositories, files, and directories. 

- [Gitleaks @ GitHub](https://github.com/gitleaks/gitleaks).

Related contents:

- [Gitleaks : Evitez le vol de secrets sur Git ! @ Geeek.org :fr:](https://www.geeek.org/securiser-depots-git-gitleaks/).
- [I&amp;#039;m Switching to Python and Actually Liking It @ César Soto Valero](https://www.cesarsotovalero.net/blog/i-am-switching-to-python-and-actually-liking-it.html).]]>
            </summary>
            <updated>2025-08-29T03:23:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4123</id>
            <title type="text"><![CDATA[Hetty]]></title>
            <link rel="alternate" href="https://hetty.xyz/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4123"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An HTTP toolkit for security research. 

Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.

- [Hetty @ GitHub](https://github.com/dstotijn/hetty).

Related contents:

- [🚀 Découvrez Hetty : L&amp;#039;Alternative Open Source à Burp Suite Pro pour la Recherche en Sécurité 🔒  @ Maory Schroder&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/maory-schroder_cybersaezcuritaez-osint-pentesting-activity-7209774551570747392-RLfM).]]>
            </summary>
            <updated>2025-08-29T03:24:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4124</id>
            <title type="text"><![CDATA[Hosts]]></title>
            <link rel="alternate" href="https://github.com/StevenBlack/hosts" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4124"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.]]>
            </summary>
            <updated>2025-08-29T03:24:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4175</id>
            <title type="text"><![CDATA[BlueHound]]></title>
            <link rel="alternate" href="https://github.com/zeronetworks/BlueHound" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4175"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[pinpoint the security issues that actually matter.

BlueHound is an open-source tool that helps blue teams pinpoint the security issues that actually matter. By combining information about user permissions, network access and unpatched vulnerabilities, BlueHound reveals the paths attackers would take if they were inside your network]]>
            </summary>
            <updated>2025-08-29T03:32:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4176</id>
            <title type="text"><![CDATA[AD Miner]]></title>
            <link rel="alternate" href="https://github.com/AD-Security/AD_Miner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4176"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses.

ADMiner is an Active Directory audit tool that leverages cypher queries to crunch data from the BloodHound graph database (neo4j) and gives you a global overview of existing weaknesses through a web-based static report, including detailed listing, dynamic graphs, key indicators history, along with risk ratings.

- [AD Miner - Analyse Active Directory — Emilien Vannier, Jean-Michel Besnard, Tanguy Boisset @ SSTIC :fr:](https://www.sstic.org/2024/presentation/AD_Miner_Active_Directory_Audit_Control/).
- [Episode \#461 consacré à ADMiner avec Jean-Michel BESNARD @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/adminer/).
- [Not All Paths are Created Equal -- Attackers&amp;#039; Economy (Part 1) @ Riccardo Ancarani - Red Team Adventures](https://riccardoancarani.github.io/2019-11-08-not-all-paths-are-equal/).
- [Graph theory to assess Active Directory : Smartest vs. Shortest Control Paths @ Jean-Michel BESNARD&amp;#039;s LinkedIn](https://www.linkedin.com/pulse/graph-theory-assess-active-directory-smartest-vs-shortest-besnard-0qgle/).]]>
            </summary>
            <updated>2025-08-29T03:34:07+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4198</id>
            <title type="text"><![CDATA[RansomLord]]></title>
            <link rel="alternate" href="https://github.com/malvuln/RansomLord" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4198"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware pre-encryption.

- [RansomLord, un outil open source capable de piéger les ransomwares ! @ IT-Connect :fr:](https://www.it-connect.fr/ransomlord-outil-open-source-anti-ransomware/).
- [RansomLord v3 – Un outil open source qui exploite les failles des ransomwares @ Korben :fr:](https://korben.info/ransomlord-v3-outil-anti-rancongiciel-open-source-exploite-failles.html).]]>
            </summary>
            <updated>2025-08-29T03:36:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4199</id>
            <title type="text"><![CDATA[VirtualGHOST]]></title>
            <link rel="alternate" href="https://github.com/CrowdStrike/VirtualGHOST" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4199"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[VirtualGHOST Detection Tool

This repository contains a PowerShell script leveraging VMWare PowerCLI to identify unregistered VMWare Virtual Machines (VMs) that are powered on by comparing the list of VMs registered in the inventory (vCenter or ESXi) vs. those that are powered on.

- [VirtualGHOST : détectez les machines virtuelles cachées par les attaquants sur VMware ESXi @ IT-Connect :fr:](https://www.it-connect.fr/virtualghost-detecter-machines-virtuelles-cachees-sur-vmware-esxi/).]]>
            </summary>
            <updated>2025-08-29T03:36:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4203</id>
            <title type="text"><![CDATA[Vulhub]]></title>
            <link rel="alternate" href="https://vulhub.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4203"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Docker-Compose file for vulnerability environment.

Vulhub is an open-source collection of pre-built vulnerable docker environments. No pre-existing knowledge of docker is required, just execute two simple commands and you have a vulnerable environment.

- [Vulhub @ GitHub](https://github.com/vulhub/vulhub).

Related contents:

- [Vulhub Playground @ GitHub](https://github.com/supdevinci/vulhub-labs/).
- [ 🎯 ON A CRÉÉ NOTRE LAB DE VULNÉRABILITÉS SUR DOCKER 🎯 @ Laurent Biagotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_on-a-cr%C3%A9%C3%A9-notre-lab-de-vuln%C3%A9rabilit%C3%A9s-activity-7282644725168238593-k9nl/).]]>
            </summary>
            <updated>2025-08-29T03:38:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4236</id>
            <title type="text"><![CDATA[The Five Pillars of an Information/Cyber Security Professional]]></title>
            <link rel="alternate" href="https://github.com/DFIRmadness/5pillars/blob/master/5-Pillars.md" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4236"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[To start, or level up, a career in Information Security (aka Cyber) Security you need to be proficient in five key areas of technical skills. You don&amp;#039;t have to master each one of them, but you need to have a good understanding of them.]]>
            </summary>
            <updated>2025-08-29T03:43:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4246</id>
            <title type="text"><![CDATA[WebCopilot]]></title>
            <link rel="alternate" href="https://github.com/h4r5h1t/webcopilot" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4246"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[WebCopilot is an automation tool designed to enumerate subdomains of the target and detect bugs using different open-source tools.

An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.

- [WebCopilot : L’ultime outil d’automatisation pour les chasseurs de bugs 🚀 @ Korben :fr:](https://korben.info/webcopilot-outil-automatisation-chasseurs-bugs.html).]]>
            </summary>
            <updated>2025-08-29T03:44:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4255</id>
            <title type="text"><![CDATA[libyear]]></title>
            <link rel="alternate" href="https://libyear.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4255"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A simple measure of software dependency freshness. It is a single number telling you how up-to-date your dependencies are.]]>
            </summary>
            <updated>2025-08-29T03:46:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4260</id>
            <title type="text"><![CDATA[Renovate]]></title>
            <link rel="alternate" href="https://www.mend.io/renovate/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4260"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automated dependency updates.

Get pull requests to update your dependencies and lock files.

- [Renovate @ GitHub](https://github.com/renovatebot/renovate).
- [Renovate documentation](https://docs.renovatebot.com/).

Related contents:

- [Inspection Tools @ php.hospital](https://php.hospital/assess/inspection-tools).
- [Renovate Automatise la Gestion des Dépendances @ Culture et Outils DevSecOps :fr:](https://blog.stephane-robert.info/docs/developper/dependances/renovate/).
- [How to keep package.json under control @ val town](https://blog.val.town/gardening-dependencies).
- [Renovate + Komodo - Updating at Scale in a Large Homelab @ FoxxMD Blog](https://blog.foxxmd.dev/posts/scaling-renovate/).]]>
            </summary>
            <updated>2026-04-24T12:11:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4270</id>
            <title type="text"><![CDATA[BunkerWeb]]></title>
            <link rel="alternate" href="https://www.bunkerweb.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4270"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open source and next generation Web Application Firewall.

BunkerWeb is a next-generation and open-source Web Application Firewall (WAF).

- [BunkerWeb @ GitHub](https://github.com/bunkerity/bunkerweb).

Related contents:

- [BunkerWeb : protéger une application web avec un WAF open source @ DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/reseaux/bunkerweb/).]]>
            </summary>
            <updated>2026-04-13T10:03:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4301</id>
            <title type="text"><![CDATA[dnstwist]]></title>
            <link rel="alternate" href="https://dnstwist.it/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4301"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[phishing domain scanner.

Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation.
See what sort of trouble users can get in trying to type your domain name. Find lookalike domains that adversaries can use to attack you. Can detect typosquatters, phishing attacks, fraud, and brand impersonation. Useful as an additional source of targeted threat intelligence.

- [dnstwist @ GitHub](https://github.com/elceef/dnstwist).

Related contents:

- [✅DNSTwist - Domain Name Permutation Engine @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_github-cybersecurity-blueteam-activity-7188558257815191555-RClo/).
- [Dnstwist - Pour détecter les typo squatteurs de votre nom de domaine @ Korben :fr:](https://korben.info/dnstwist-detecteur-phishing-domaines.html).]]>
            </summary>
            <updated>2025-08-29T03:54:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4305</id>
            <title type="text"><![CDATA[endoflife.date]]></title>
            <link rel="alternate" href="https://endoflife.date/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4305"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[End-of-life (EOL) and support information is often hard to track, or very badly presented. endoflife.date documents EOL dates and support lifecycles for various products.

endoflife.date aggregates data from various sources and presents it in an understandable and succinct manner. It also makes the data available using an easily accessible API and has iCalendar support.

- [Suivre l&amp;#039;évolution des versions des outils de ton parc @ Xavier Pestel&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/xavier-pestel_devops-sysadmin-opensource-activity-7188412207792095232-AYtD/).]]>
            </summary>
            <updated>2025-08-29T03:54:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4321</id>
            <title type="text"><![CDATA[Zircolite]]></title>
            <link rel="alternate" href="https://github.com/wagga40/Zircolite" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4321"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs.

- [Comment effectuer une investigation numérique sur les journaux d’évènements Windows avec Zircolite ? @ IT-Connect :fr:](https://www.it-connect.fr/zircolite-investigation-numerique-journaux-securite-windows/).]]>
            </summary>
            <updated>2025-08-29T03:58:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4322</id>
            <title type="text"><![CDATA[MONARC]]></title>
            <link rel="alternate" href="https://www.monarc.lu/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4322"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Method for an Optimised aNAlysis of Risks. MONARC is a tool and a method allowing an optimised, precise and repeatable risk assessment.

Depending on its size and its security needs, organisations must react in the most appropriate manner. Adopting good practices, taking the necessary measures and adjusting them proportionally: all this is part of the process to ensure information security. Most of all, it depends on performing a risk analysis on a regular basis.

- [MONARC @ GitHub](https://github.com/monarc-project/MonarcAppFO).
- [💡 MONARC : Méthode Optimisée d’Analyse des Risques CASES @ Emerick Dusnimirimana&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/emerick-dushimirimana-b80415236_passionn%C3%A9-par-la-grc-et-toujours-en-qu%C3%AAte-ugcPost-7186346770606510081-L1wq/).]]>
            </summary>
            <updated>2025-08-29T03:58:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4332</id>
            <title type="text"><![CDATA[The Kubenomicon Threat Matrix]]></title>
            <link rel="alternate" href="https://kubenomicon.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4332"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Kubenomicon was born of a desire to understand more about Kubernetes from an offensive perspective.

This project was heavily inspired by the Kubernetes Threat Matrix from Microsoft which is a great starting point as it provides a framework to help understand some of the concepts in a MITRE ATTACK style framework. The Microsoft Threat Matrix was explicitly not designed to be a playbook offensive for security professionals and thus it lacks the details necessary to actually exploit (and remediate) each attack in Kubernetes cluster.

- [Kubenomicon @ GitHub](https://github.com/grahamhelton/grahamhelton.github.io).
- [Threat Matrix for Kubernetes @ Microsoft](https://microsoft.github.io/Threat-Matrix-for-Kubernetes/).
- [Kubernetes Threat Matrix @ RedGuard](https://kubernetes-threat-matrix.redguard.ch/).]]>
            </summary>
            <updated>2025-08-29T03:58:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4344</id>
            <title type="text"><![CDATA[pfSense]]></title>
            <link rel="alternate" href="https://www.pfsense.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4344"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[World&amp;#039;s Most Trusted Open Source Firewall. 

The pfSense project is a free network firewall distribution, based on the FreeBSD operating system with a custom kernel and including third party free software packages for additional functionality. pfSense software, with the help of the package system, is able to provide the same functionality or more of common commercial firewalls, without any of the artificial limitations. It has successfully replaced every big name commercial firewall you can imagine in numerous installations around the world, including Check Point, Cisco PIX, Cisco ASA, Juniper, Sonicwall, Netgear, Watchguard, Astaro, and more.
 
- [PfSense et Squid : ajouter le filtrage par catégories avec Squid Guard @ IT Connect :fr:](https://www.it-connect.fr/pfsense-et-squid-ajouter-le-filtrage-par-categories-avec-squid-guard/).
- [pfSense Configuration Guide - Zero to Hero! @ Jim&amp;#039;s Garage&amp;#039;s YouTube](https://www.youtube.com/watch?v=he3ENpMLMsc).
- [The First Services I Always Spin Up in Any Home Lab @ VirtualizationHowto](https://www.youtube.com/watch?v=WocNYt7PprM).]]>
            </summary>
            <updated>2025-10-06T06:53:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4358</id>
            <title type="text"><![CDATA[Mantis]]></title>
            <link rel="alternate" href="https://phonepe.github.io/mantis/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4358"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning. 

Mantis is a command-line framework designed to automate the workflow of asset discovery, reconnaissance, and scanning. It takes the top-level domains as input, then seamlessly progresses to discovering corresponding assets, including subdomains and certificates. The tool performs reconnaissance on active assets and concludes with a comprehensive scan for vulnerabilities, secrets, misconfigurations and phishing domains - all powered by a blend of open-source and custom tools.

- [Mantis @ GitHub](https://github.com/PhonePe/mantis).]]>
            </summary>
            <updated>2025-08-29T04:03:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4362</id>
            <title type="text"><![CDATA[Open Initiative for Process Specifications]]></title>
            <link rel="alternate" href="https://outreach.eclipse.foundation/open-source-cybersecurity-specifications" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4362"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Initiative for Process Specifications.

The open source community is collaborating to establish common specifications for secure software development based on open source best practices. 

- [New Open Initiative for Cybersecurity Standards @ Python Software Foundation&amp;#039;s Blogspot](https://pyfound.blogspot.com/2024/04/new-open-initiative-for-cybersecurity.html).]]>
            </summary>
            <updated>2025-08-29T04:03:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4363</id>
            <title type="text"><![CDATA[Tracecat -]]></title>
            <link rel="alternate" href="https://tracecat.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4363"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open source alternative to Tines / Palo Alto XSOAR. Automate security alerts, your way.

Tracecat is an open source Tines / Splunk SOAR alternative. Build AI-assisted workflows, orchestrate alerts, and close cases fast.

SOAR (Security Orchestration, Automation and Response) refers to technologies that enable organizations to automatically collect and respond to alerts across different tooling. Though Tracecat is built for security, it&amp;#039;s workflow automation and case management system can be applied to other alerting environments (e.g. site reliability engineering, DevOps, and physical systems monitoring).

- [Tracecat @ GitHub](https://github.com/TracecatHQ/tracecat).
- [Tracecat – L’alternative open source à Tines / Splunk SOAR pour automatiser la sécu @ Korben :fr:](https://korben.info/tracecat-alternative-open-source-tines-splunk-soar-automatisation-secu.html).]]>
            </summary>
            <updated>2025-08-29T04:04:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4378</id>
            <title type="text"><![CDATA[PassTester]]></title>
            <link rel="alternate" href="https://github.com/Elymaro/PassTester" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4378"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Identify the accounts most vulnerable to dictionary attacks.

PassTester is a tool for finding user passwords that are most vulnerable to dictionary attacks. The aim is to prompt the users concerned to choose a more secure password.

- [Comment peut-on évaluer la résistance des mots de passe utilisateurs aux attaques par dictionnaire lors d&amp;#039;un audit de sécurité ? @ Aurélien BOURDOIS&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/aurelien-bourdois_passtester-comment-peut-on-%C3%A9valuer-activity-7181334173679243265-G6bJ/).]]>
            </summary>
            <updated>2025-08-29T04:06:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4379</id>
            <title type="text"><![CDATA[NTLM to plaintext password lookup]]></title>
            <link rel="alternate" href="https://ntlm.pw/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4379"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Input NT/LM hashes in hex format, one per line

The intention with this site is to help you get rid of easy to crack passwords. We have a huge collection of easy to break passwords that are looked up with a one-way hashed version of the password.]]>
            </summary>
            <updated>2025-08-29T04:06:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4380</id>
            <title type="text"><![CDATA[Red Team Tools]]></title>
            <link rel="alternate" href="https://github.com/A-poc/RedTeam-Tools" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4380"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tools and Techniques for Red Team / Penetration Testing.

This github repository contains a collection of 130+ tools and resources that can be useful for red teaming activities.
Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context.]]>
            </summary>
            <updated>2025-08-29T04:06:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4383</id>
            <title type="text"><![CDATA[ZITADEL]]></title>
            <link rel="alternate" href="https://zitadel.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4383"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Identity infrastructure, simplified for you.

- [ZITADEL @ GitHub](https://github.com/zitadel/zitadel).]]>
            </summary>
            <updated>2025-08-29T04:07:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4384</id>
            <title type="text"><![CDATA[Blue Team Tools]]></title>
            <link rel="alternate" href="https://github.com/A-poc/BlueTeam-Tools" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4384"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tools and Techniques for Blue Team / Incident Response.

This github repository contains a collection of 65+ tools and resources that can be useful for blue teaming activities.

Some of the tools may be specifically designed for blue teaming, while others are more general-purpose and can be adapted for use in a blue teaming context.]]>
            </summary>
            <updated>2025-08-29T04:07:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4403</id>
            <title type="text"><![CDATA[Digital Defense]]></title>
            <link rel="alternate" href="https://digital-defense.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4403"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Personal Security Checklist. Your guide to securing your digital life and protecting your privacy.

 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024.

- [Personal Security Checklist @ GitHub](https://github.com/lissy93/personal-security-checklist).
- [La checklist ultime pour sécuriser du mieux possible votre vie numérique @ Korben :fr:](https://korben.info/personal-security-checklist-guide-securite-numerique-vie-privee-protection-donnees.html).]]>
            </summary>
            <updated>2025-08-29T04:10:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4406</id>
            <title type="text"><![CDATA[ldap2json]]></title>
            <link rel="alternate" href="https://github.com/p0dalirius/ldap2json" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4406"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.

- [Dumping your LDAP to a JSON file with ldap2json.py @ Podalirius&amp;#039; YouTube](https://www.youtube.com/watch?v=ct1ovt0hEAw).]]>
            </summary>
            <updated>2025-08-29T04:11:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4423</id>
            <title type="text"><![CDATA[Insult and passphrase generator]]></title>
            <link rel="alternate" href="https://cheswick.com/insults" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4423"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Each entry has about 42 bits of randomness. Queries are not recorded. Randomness is probably as good as the random resource in the operating system.]]>
            </summary>
            <updated>2025-08-29T04:14:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4426</id>
            <title type="text"><![CDATA[Unprotect Project]]></title>
            <link rel="alternate" href="https://unprotect.it/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4426"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Search Evasion Techniques.

Malware authors spend a great deal of time and effort to develop complex code to perform malicious actions against a target system. It is crucial for malware to remain undetected and avoid sandbox analysis, antiviruses or malware analysts. With this kind of techniques, malware are able to pass under the radar and stay undetected on a system. The goal of this free database is to centralize the information about malware evasion techniques.

This project aims to provide Malware Analysts and Defenders with actionable insights and detection capabilities to shorten their response times. 

- [✅Unprotect Project - Search Evasion Techniques @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_cybersecurity-opensource-malware-activity-7176110271176835072-1vCm).]]>
            </summary>
            <updated>2025-08-29T04:14:36+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4433</id>
            <title type="text"><![CDATA[PSCF - OWASP Product Security Capability Framework]]></title>
            <link rel="alternate" href="https://prods.ec/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4433"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[No more insecure software. Make sure your software delivery organization has the capabilities required to deliver secure products.

The OWASP Product Security Capability Framework (PSCF) is a comprehensive guide designed to frame and enhance the security of software products. By leveraging a structured approach to identify, implement, and manage security capabilities, the PSCF aims to improve product security and ensure compliance with regulatory and industry standards.

- [OWASP PSCF @ GitHub](https://github.com/OWASP/PSCF).
- [Reasonable 🔐AppSec \#43 - The Symbiotic Relationship Between Attack Trees and Threat Modeling, Five Security Articles, and Podcast Corner @ Reasonable Application Security](https://appsec.beehiiv.com/p/reasonable-appsec-43-symbiotic-relationship-attack-trees-threat-modeling-five-security-articles-podc).]]>
            </summary>
            <updated>2025-08-29T04:15:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4456</id>
            <title type="text"><![CDATA[33700, la plateforme de lutte contre les spams SMS et le démarchage téléphonique]]></title>
            <link rel="alternate" href="https://www.33700.fr/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4456"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[La plateforme de lutte contre les spams vocaux et SMS qui vous informe et vous accompagne.

- [SMS, appels et courriers électroniques indésirables et/ou frauduleux @ arcep :fr:](https://www.arcep.fr/demarches-et-services/sms-appels-et-courriers-electroniques-indesirables-et-ou-frauduleux.html).]]>
            </summary>
            <updated>2025-08-29T04:19:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4482</id>
            <title type="text"><![CDATA[Hackviser]]></title>
            <link rel="alternate" href="https://hackviser.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4482"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Best way to boost your cybersecurity skills

Tailored cybersecurity upskilling platform for all levels, catering to beginners and pros. Expertly designed with custom content to boost cybersecurity skills.]]>
            </summary>
            <updated>2025-08-29T04:23:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4483</id>
            <title type="text"><![CDATA[PhishTool]]></title>
            <link rel="alternate" href="https://www.phishtool.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4483"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Stop trying to avoid phishing. Choose a weapon and fight it...

PhishTool gives human analysts the power to reverse engineer phishing emails, to better defend against them. PhishTool is to phishing emails as a disassembler is to malware or a forensic toolkit is to file systems.]]>
            </summary>
            <updated>2025-08-29T04:23:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4486</id>
            <title type="text"><![CDATA[Harden]]></title>
            <link rel="alternate" href="https://hardenad.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4486"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure infrastructure in minutes. Hardening Active Directory and Office 365.

- [Harden @ GitHub](https://github.com/LoicVeirman/HardenAD).
- [Hardening AD : Sécuriser vos infrastructures avec HardenAD @ Hamza Kondah&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/events/7132717233872474112/comments/).
- [bonnes pratiques en termes de configurations et durcissements autour de l&amp;#039;Active Directory @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_github-cybersecurity-activedirectory-activity-7170309659516481536-Pw1g).]]>
            </summary>
            <updated>2025-08-29T04:24:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4507</id>
            <title type="text"><![CDATA[privacy.sexy — Privacy is sexy]]></title>
            <link rel="alternate" href="https://privacy.sexy/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4507"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Maximize Your Privacy and Security. Enforce privacy &amp;amp; security best-practices on Windows, macOS and Linux, because privacy is sexy.

Open-source tool to enforce privacy &amp;amp; security best-practices on Windows, macOS and Linux, because privacy is sexy.

- [privacy.sexy @ GitHub](https://github.com/undergroundwires/privacy.sexy).]]>
            </summary>
            <updated>2025-08-29T04:27:36+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4511</id>
            <title type="text"><![CDATA[TryHackMe SSH Honeypot]]></title>
            <link rel="alternate" href="https://github.com/TrueBad0ur/ssh-honeypot" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4511"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSH Honeypot that gathers creds and attempted commands.

SSH Honeypot that gathers attempted creds, IP addresses and versions. The SSH server will either issue a warning, or drop the attacker into a fake shell.]]>
            </summary>
            <updated>2025-08-29T04:28:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4514</id>
            <title type="text"><![CDATA[Privacy Guides]]></title>
            <link rel="alternate" href="https://www.privacyguides.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4514"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Your Independent Privacy and Security Resource. The guide to restoring your online privacy.

Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.

- [Privacy Guides @ GitHub](https://github.com/privacyguides/privacyguides.org).]]>
            </summary>
            <updated>2025-08-29T04:30:36+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4530</id>
            <title type="text"><![CDATA[OpenPubkey]]></title>
            <link rel="alternate" href="https://www.bastionzero.com/openpubkey" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4530"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenPubkey is an open source project that binds public keys and workload identities using standard SSO and OpenID Connect.

Use OpenPubkey today to SSH to machines on your network without SSH keys.

- [OpenPubkey @ GitHub](https://github.com/openpubkey/openpubkey).
- [OpenPubkey: Augmenting OpenID Connect with User held Signing Keys @ Cryptology ePrint Archive](https://eprint.iacr.org/2023/296).
- [How to Use OpenPubkey to Solve Key Management via SSO @ Docker Blog](https://www.docker.com/blog/how-to-use-openpubkey-to-solve-key-management-via-sso/).]]>
            </summary>
            <updated>2025-08-29T04:31:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4549</id>
            <title type="text"><![CDATA[deepdarkCTI]]></title>
            <link rel="alternate" href="https://github.com/fastfire/deepdarkCTI" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4549"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Collection of Cyber Threat Intelligence sources from the Deep and Dark Web

The aim of this project is to collect the sources, present in the Deep and Dark web, which can be useful in Cyber Threat Intelligence contexts.]]>
            </summary>
            <updated>2025-08-29T04:34:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4578</id>
            <title type="text"><![CDATA[security.txt]]></title>
            <link rel="alternate" href="https://securitytxt.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4578"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A proposed standard which allows websites to define security policies.

 “When security risks in web services are discovered by independent security researchers who understand the severity of the risk, they often lack the channels to disclose them properly. As a result, security issues may be left unreported. security.txt defines a standard to help organizations define the process for security researchers to disclose security vulnerabilities securely.”]]>
            </summary>
            <updated>2025-08-29T04:39:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4579</id>
            <title type="text"><![CDATA[Melee]]></title>
            <link rel="alternate" href="https://github.com/adityaks/melee" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4579"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tool to Detect Infections in MySQL Instances.

Attackers are abusing MySQL instances for conducting nefarious operations on the Internet. The cybercriminals are targeting exposed MySQL instances and triggering infections at scale to exfiltrate data, destruct data, and extort money via ransom. For example one of the significant threats MySQL deployments face is ransomware. We have authored a tool named &amp;quot;MELEE&amp;quot; to detect potential infections in MySQL instances. The tool allows security researchers, penetration testers, and threat intelligence experts to detect compromised and infected MySQL instances running malicious code. The tool also enables you to conduct efficient research in the field of malware targeting cloud databases. In this release of the tool, the following modules are supported:]]>
            </summary>
            <updated>2025-08-29T04:39:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4580</id>
            <title type="text"><![CDATA[teler]]></title>
            <link rel="alternate" href="https://teler.app/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4580"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Real-time HTTP Intrusion Detection.

teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide by the community. ❤️

- [teler @ GitHub](https://github.com/kitabisa/teler/).]]>
            </summary>
            <updated>2025-08-29T04:39:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4591</id>
            <title type="text"><![CDATA[Cyber Threat Intelligence]]></title>
            <link rel="alternate" href="https://start.me/p/wMrA5z/cyber-threat-intelligence" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4591"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cyber Theat live dashboard]]>
            </summary>
            <updated>2025-08-29T04:42:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4601</id>
            <title type="text"><![CDATA[Magic Wormhole]]></title>
            <link rel="alternate" href="https://github.com/magic-wormhole/magic-wormhole" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4601"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[get things from one computer to another, safely.

This package provides a library and a command-line tool named `wormhole`, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The two endpoints are identified by using identical &amp;quot;wormhole codes&amp;quot;: in general, the sending machine generates and displays the code, which must then be typed into the receiving machine.

- [Magic Wormhole @ Read the Docs](https://magic-wormhole.readthedocs.io/).

Sources:

- [Wormhole: Transférer des Secrets @ Culture et Outils DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/secrets/wormhole/)
- [PGP - Je ne chiffre plus les emails @ 9x0rg :fr:](https://9x0rg.com/posts/tech/pgp-je-ne-chiffre-plus-les-emails/).]]>
            </summary>
            <updated>2025-08-29T04:43:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4616</id>
            <title type="text"><![CDATA[shcheck]]></title>
            <link rel="alternate" href="https://github.com/santoru/shcheck" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4616"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A basic tool to check security headers of a website]]>
            </summary>
            <updated>2025-08-29T04:46:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4618</id>
            <title type="text"><![CDATA[OSTE meta scanner]]></title>
            <link rel="alternate" href="https://github.com/OSTEsayed/OSTE-Meta-Scan" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4618"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, OWASP ZAP, Nuclei, SkipFish, and Wapiti.]]>
            </summary>
            <updated>2025-08-29T04:46:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4621</id>
            <title type="text"><![CDATA[cvemap]]></title>
            <link rel="alternate" href="https://github.com/projectdiscovery/cvemap" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4621"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Navigate the CVE jungle with ease.

Navigate the Common Vulnerabilities and Exposures (CVE) jungle with ease using CVEMAP, a command-line interface (CLI) tool designed to provide a structured and easily navigable interface to various vulnerability databases.]]>
            </summary>
            <updated>2025-08-29T04:46:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4626</id>
            <title type="text"><![CDATA[Sigma]]></title>
            <link rel="alternate" href="https://sigmahq.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4626"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SIEM Detection Format. The shareable detection format for security professionals.

Sigma is a generic, open, and structured detection format that allows security teams to detect relevant log events in a simple and shareable way. 

Detection engineers, threat hunters and all defensive security practitioners collaborate on detection rules. The repository offers more than 3000 detection rules of different type and aims to make reliable detections accessible to all at no cost.

- [Sigma @ GitHub](https://github.com/SigmaHQ/sigma).
- [C&amp;#039;est la fin des antivirus @ Underscore_&amp;#039;s Spotify :fr:](https://open.spotify.com/episode/027iVKcWMdQOmA4iBMduJL).
- [🚨 Découvrez Sigma: l&amp;#039;outil open-source qui révolutionne la détection de menaces ! 🚨 @ Maory SChroder&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/maory-schroder_cybersaezcuritaez-siem-threathunting-activity-7230094685615067136-Y5wi).]]>
            </summary>
            <updated>2025-08-29T04:47:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4632</id>
            <title type="text"><![CDATA[CATSploit🐈]]></title>
            <link rel="alternate" href="https://github.com/catsploit/catsploit" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4632"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester.]]>
            </summary>
            <updated>2025-08-29T04:48:47+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4633</id>
            <title type="text"><![CDATA[AngryOxide]]></title>
            <link rel="alternate" href="https://github.com/Ragnt/AngryOxide" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4633"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[802.11 Attack Tool.

The overall goal of this tool is to provide a single-interface survey capability with advanced automated attacks that result in valid hashlines you can crack with Hashcat.]]>
            </summary>
            <updated>2025-08-29T04:48:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4639</id>
            <title type="text"><![CDATA[DetectingCanaryTokens]]></title>
            <link rel="alternate" href="https://github.com/Lupovis/DetectingCanaryTokens" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4639"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Red Team Script to Detect Canary Tokens and Seed Files. How to Detect Canary and Seed Microsoft Office Files with Python Without Triggering an Alert.

In the realm of cybersecurity, vigilance is key. One way malicious actors might infiltrate systems is through seemingly innocuous Microsoft Office files. These files might contain hidden URLs or macros designed to execute harmful actions. In this blog post, we&amp;#039;ll explore a Python script designed to detect potentially suspicious Microsoft Office documents by examining their contents without opening them directly, reducing the risk of inadvertently triggering malicious code.]]>
            </summary>
            <updated>2025-08-29T04:50:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4640</id>
            <title type="text"><![CDATA[Grype]]></title>
            <link rel="alternate" href="https://github.com/anchore/grype" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4640"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A vulnerability scanner for container images and filesystems.

- [Grype @ Snapcraft](https://snapcraft.io/grype).

Related contents:

- [Grype MCP Server @ GitHub](https://github.com/anchore/grype-mcp).
- [EP 64: Ethical Retro Gaming @ Linux Matters](https://linuxmatters.sh/64/).]]>
            </summary>
            <updated>2025-09-23T05:50:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4652</id>
            <title type="text"><![CDATA[OWASP dep-scan]]></title>
            <link rel="alternate" href="https://github.com/owasp-dep-scan/dep-scan" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4652"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for project dependencies. Both local repositories and container images are supported as the input, and the tool is ideal for integration with ASPM/VM platforms and in CI environments.]]>
            </summary>
            <updated>2025-08-29T04:51:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4674</id>
            <title type="text"><![CDATA[Vuls]]></title>
            <link rel="alternate" href="https://vuls.io/en/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4674"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Agentless Vulnerability Scanner for Linux/FreeBSD, Container, WordPress, Programming language libraries, Network devices 

- [Vuls @ GitHub](https://github.com/future-architect/vuls).]]>
            </summary>
            <updated>2025-08-29T04:55:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4679</id>
            <title type="text"><![CDATA[Password Pusher]]></title>
            <link rel="alternate" href="https://pwpush.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4679"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Securely Send a Password.

 🔐 An application to securely communicate passwords over the web. Passwords automatically expire after a certain number of views and/or time has passed. Track who, what and when.

- [Password Pusher @ GitHub](https://github.com/pglombardo/PasswordPusher).
- [6 outils de FOU pour les DEVS 🤯 @ YoanDev&amp;#039;s YouTube](https://www.youtube.com/watch?v=x0niOhjzkxw).]]>
            </summary>
            <updated>2025-08-29T04:56:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4684</id>
            <title type="text"><![CDATA[OpenBao]]></title>
            <link rel="alternate" href="https://openbao.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4684"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys.

- [OpenBao @ GitHub](https://github.com/openbao/openbao).

Related contents:

- [OpenBao (Hashicorp Vault Fork effort) FAQ @ LF Edge](https://wiki.lfedge.org/display/OH/OpenBao+%28Hashicorp+Vault+Fork+effort%29+FAQ).
- [Open source forkers stick an OpenBao in the oven @ The Register](https://www.theregister.com/2023/12/08/hashicorp_openbao_fork/).
- [Vault on Kubernetes using OpenBao @ nanibot.net](https://nanibot.net/posts/vault/).
- [Vault SSH : accès sécurisé aux serveurs @ DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/secrets/hashicorp-vault/ssh-secrets/).]]>
            </summary>
            <updated>2026-03-17T08:01:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4688</id>
            <title type="text"><![CDATA[ssh-audit]]></title>
            <link rel="alternate" href="https://github.com/jtesta/ssh-audit" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4688"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSH server &amp;amp; client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc) 

Related contents:

- [Durcir la configuration SSH @ Culture et Outils DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/durcissement/ssh/).
- [SSH-Audit - L&amp;#039;outil indispensable pour sécuriser vos serveurs SSH @ Korben :fr:](https://korben.info/ssh-audit-outil-indispensable-securiser-vos-serveurs.html).]]>
            </summary>
            <updated>2025-08-29T04:58:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4692</id>
            <title type="text"><![CDATA[Rubeus]]></title>
            <link rel="alternate" href="https://github.com/GhostPack/Rubeus" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4692"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Trying to tame the three-headed dog.
Rubeus is a C# toolset for raw Kerberos interaction and abuses.]]>
            </summary>
            <updated>2025-08-29T04:58:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4693</id>
            <title type="text"><![CDATA[Chisel]]></title>
            <link rel="alternate" href="https://github.com/jpillora/chisel" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4693"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A fast TCP/UDP tunnel over HTTP.

Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network.]]>
            </summary>
            <updated>2025-08-29T04:58:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4695</id>
            <title type="text"><![CDATA[Arsenal]]></title>
            <link rel="alternate" href="https://github.com/Orange-Cyberdefense/arsenal" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4695"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Arsenal is just a quick inventory and launcher for hacking programs.

This project written by pentesters for pentesters simplify the use of all the hard-to-remember commands

- [Avec arsenal, créez un inventaire de vos commandes Linux favorites et gagnez en efficacité @ IT-Connect.fr :fr:](https://www.it-connect.fr/linux-inventaire-commandes-favorites-outil-arsenal/).]]>
            </summary>
            <updated>2025-08-29T04:58:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4702</id>
            <title type="text"><![CDATA[SessionProbe]]></title>
            <link rel="alternate" href="https://github.com/dub-flow/sessionprobe" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4702"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applications by taking a session token and checking access across a list of URLs, highlighting potential authorization issues. 

- [SessionProbe: Open-source multi-threaded pentesting tool @ Help Net Security](https://www.helpnetsecurity.com/2023/12/05/sessionprobe-open-source-multi-threaded-pentesting-tool/).]]>
            </summary>
            <updated>2025-08-29T05:00:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4710</id>
            <title type="text"><![CDATA[changeme]]></title>
            <link rel="alternate" href="https://github.com/ztgrace/changeme" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4710"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A default credential scanner.

changeme picks up where commercial scanners leave off. It focuses on detecting default and backdoor credentials and not necessarily common credentials. It&amp;#039;s default mode is to scan HTTP default credentials, but has support for other credentials.]]>
            </summary>
            <updated>2025-08-29T05:02:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4711</id>
            <title type="text"><![CDATA[RouterSploit]]></title>
            <link rel="alternate" href="https://github.com/threat9/routersploit" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4711"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Exploitation Framework for Embedded Devices. It consists of various modules that aid penetration testing operations.]]>
            </summary>
            <updated>2025-08-29T05:02:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4712</id>
            <title type="text"><![CDATA[Sealed Secrets]]></title>
            <link rel="alternate" href="https://sealed-secrets.netlify.app/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4712"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Sealed Secrets provides declarative Kubernetes Secret Management in a secure way. Since the Sealed Secrets are encrypted, they can be safely stored in a code repository. This enables an easy to implement GitOps flow that is very popular among the OSS community.

- [Sealed Secrets @ GitHub](https://github.com/bitnami-labs/sealed-secrets).
- [Chiffrer ses YAML avec Sealed Secrets @ Une Tasse de Café](https://une-tasse-de.cafe/blog/sealed-secrets/).]]>
            </summary>
            <updated>2025-08-29T05:02:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4715</id>
            <title type="text"><![CDATA[tfprovidercheck]]></title>
            <link rel="alternate" href="https://github.com/suzuki-shunsuke/tfprovidercheck" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4715"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions, and check if disallowed providers aren&amp;#039;t used]]>
            </summary>
            <updated>2025-08-29T05:02:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4717</id>
            <title type="text"><![CDATA[Minimum Viable Secure Product]]></title>
            <link rel="alternate" href="https://mvsp.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4717"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A minimum security baseline for enterprise-ready products and services.

Minimum Viable Secure Product (MVSP) is a list of essential application security controls that should be implemented in enterprise-ready products and services. The controls are designed to be simple to implement and provide a good foundation for building secure and resilient systems and services. MVSP is based on the experience of contributors in enterprise application security and has been built with contributions from a range of companies.

- [Two years later: a baseline that drives up security for the industry @ Google Security Blog](https://security.googleblog.com/2023/11/two-years-later-baseline-that-drives-up.html).]]>
            </summary>
            <updated>2025-08-29T05:02:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4720</id>
            <title type="text"><![CDATA[Default Credentials Cheat Sheet]]></title>
            <link rel="alternate" href="https://github.com/heileekstein/DefaultCreds-cheat-sheet" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4720"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️

- [Sauvez vos vieux routeurs en retrouvant leurs mots de passe par défaut ! @ Korben :fr:](https://korben.info/outil-recherche-mot-passe-defaut-routeurs-dispositifs-oublies.html).]]>
            </summary>
            <updated>2025-08-29T05:03:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4726</id>
            <title type="text"><![CDATA[Nitrokey]]></title>
            <link rel="alternate" href="https://www.nitrokey.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4726"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure your digital life.

Open Source IT-Security Hardware.]]>
            </summary>
            <updated>2025-08-29T05:04:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4733</id>
            <title type="text"><![CDATA[Vigil]]></title>
            <link rel="alternate" href="https://vigil.deadbits.ai/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4733"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs.

Vigil is a Python library and REST API for assessing Large Language Model prompts and responses against a set of scanners to detect prompt injections, jailbreaks, and other potential risks. 

- [Vigil @ GitHub](https://github.com/deadbits/vigil-llm).
- [Vigil: Open-source LLM security scanner](https://www.helpnetsecurity.com/2023/11/29/vigil-llm-security-scanner/).]]>
            </summary>
            <updated>2025-08-29T05:06:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4735</id>
            <title type="text"><![CDATA[Forensic Miner]]></title>
            <link rel="alternate" href="https://github.com/YosfanEilay/ForensicMiner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4735"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.

ForensicMiner, a PowerShell-based DFIR automation tool, revolutionizes the field of digital investigations. Designed for efficiency, it automates artifact and evidence collection from Windows machines. Compatibility with Flacon Crowdstrike RTR and Palo Alto Cortex XDR Live Terminal, along with its swift performance and user-friendly interface, makes ForensicMiner an indispensable asset for investigators navigating the complexities of forensic analysis. Streamlined and effective, this tool sets a new standard in the realm of digital forensics.]]>
            </summary>
            <updated>2025-08-29T05:06:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4737</id>
            <title type="text"><![CDATA[Has My Secret Leaked?]]></title>
            <link rel="alternate" href="https://www.gitguardian.com/hasmysecretleaked" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4737"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Leak Detection In The DevOps Pipeline

- [Avec le service gratuit « Has My Secret Leaked? », vérifiez si vos secrets ont fuité sur GitHub ! @ IT-Connect.fr :fr:](https://www.it-connect.fr/verifier-fuite-secrets-github-has-my-secret-leaked-gratuit/).]]>
            </summary>
            <updated>2025-08-29T05:07:00+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4739</id>
            <title type="text"><![CDATA[AWS Kill Switch]]></title>
            <link rel="alternate" href="https://github.com/secengjeff/awskillswitch" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4739"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Lambda function that streamlines containment of an AWS account compromise.

AWS Kill Switch is a Lambda function (and proof of concept client) that an organization can implement in a dedicated &amp;quot;Security&amp;quot; account to give their security engineers the ability to delete IAM roles or apply a highly restrictive service control policy (SCP) on any account in their organization.

- [AWS Kill Switch: Open-source incident response tool @ Help Net Security](https://www.helpnetsecurity.com/2023/11/27/aws-kill-switch-open-source-incident-response-tool/).]]>
            </summary>
            <updated>2025-08-29T05:07:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4749</id>
            <title type="text"><![CDATA[Bluetooth LE Spam]]></title>
            <link rel="alternate" href="https://github.com/simondankelmann/Bluetooth-LE-Spam" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4749"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This project focuses on utilizing the built-in Bluetooth Low Energy (BLE) functionality of Android smartphones to create Phantom Bluetooth Device Advertisements, similar to what is known, for instance, in the case of the Flipper Zero. While there are other apps available that provide similar functionality, the objective of this app is to enhance convenience and user-friendliness in the process.

- [Comme le Flipper Zero, cette app Android peut inonder de notifications les appareils à proximité @ IT-Connect.fr :fr:](https://www.it-connect.fr/comme-le-flipper-zero-cette-app-android-peut-inonder-de-notifications-les-appareils-a-proximite/).]]>
            </summary>
            <updated>2025-08-29T05:07:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4751</id>
            <title type="text"><![CDATA[vulscan.nse]]></title>
            <link rel="alternate" href="https://www.computec.ch/projekte/vulscan/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4751"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Advanced vulnerability scanning with Nmap NSE.

Vulscan is a module which enhances nmap to a vulnerability scanner. The nmap option -sV enables version detection per service which is used to determine potential flaws according to the identified product. The data is looked up in an offline version of VulDB.

- [vulscan @ GitHub](https://github.com/scipag/vulscan).
- [Nmap Vulnerability Scan: How to Find Weak Systems Easily @ StationX](https://www.stationx.net/nmap-vulnerability-scan/).]]>
            </summary>
            <updated>2025-08-29T05:08:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4752</id>
            <title type="text"><![CDATA[mimikatz]]></title>
            <link rel="alternate" href="https://github.com/gentilkiwi/mimikatz" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4752"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A little tool to play with Windows security.

mimikatz extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also perform pass-the-hash, pass-the-ticket or build Golden tickets.

Related contents:

- [The Mimikatz Missing Manual @ GitHub](https://github.com/darkoperator/mimikatz-missing-manual).
- [mimikatz @ Blog de Gentil Kiwi :fr:](https://blog.gentilkiwi.com/mimikatz).
- [Pass the Hash With Mimikatz: Compromise Hashes With Ease @ StationX](https://www.stationx.net/pass-the-hash-with-mimikatz/).]]>
            </summary>
            <updated>2026-02-19T12:34:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4753</id>
            <title type="text"><![CDATA[PolarDNS]]></title>
            <link rel="alternate" href="https://github.com/oryxlabs/PolarDNS" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4753"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research. 

PolarDNS is a specialized authoritative DNS server written in Python 3.x, which allows the operator to produce fully custom DNS responses, suitable for DNS protocol testing purposes.

- [PolarDNS: Open-source DNS server tailored for security evaluations @ Help Net Security](https://www.helpnetsecurity.com/2023/11/21/polardns-open-source-dns-server/).
- [PolarDNS – A Free DNS Server For Vulnerability Research &amp;amp; Pentesting @ Cyber Security News](https://cybersecuritynews.com/polardns-a-free-dns-server/).]]>
            </summary>
            <updated>2025-08-29T05:08:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4754</id>
            <title type="text"><![CDATA[raven]]></title>
            <link rel="alternate" href="https://github.com/CycodeLabs/raven" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4754"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CI/CD Security Analyzer.

RAVEN (Risk Analysis and Vulnerability Enumeration for CI/CD) is a powerful security tool designed to perform massive scans for GitHub Actions CI workflows and digest the discovered data into a Neo4j database.

- [Raven: Open-source CI/CD pipeline security scanner @ Help Net Security](https://www.helpnetsecurity.com/2023/10/27/raven-open-source-security-scanner/).]]>
            </summary>
            <updated>2025-08-29T05:08:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4756</id>
            <title type="text"><![CDATA[HARmor]]></title>
            <link rel="alternate" href="https://harmor.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4756"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[HAR Sanitizer. Sanitizing and securing HAR files with precision.

HAR files are intricate blueprints of web interactions, elegantly capturing a web session&amp;#039;s every nuance. In the domain of web diagnostics, these files stand as critical repositories, meticulously cataloging everything from headers to payload content. However, their granular details also make them susceptible to potential data exposures.

- [HARmor @ GitHub](https://github.com/frontegg/harmor).
- [HARmor: Open-source tool for sanitizing and securing HAR files @ Help Net Security](https://www.helpnetsecurity.com/2023/11/15/harmor-securing-har-files/).]]>
            </summary>
            <updated>2025-08-29T05:10:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4769</id>
            <title type="text"><![CDATA[SOPS]]></title>
            <link rel="alternate" href="https://github.com/getsops/sops" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4769"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Simple and flexible tool for managing secrets.

SOPS is an editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, age, and PGP.

- [ SOPS la solution de gestion de secret DevOps ? @ DamyR :fr:](https://www.damyr.fr/posts/sops/).]]>
            </summary>
            <updated>2025-08-29T05:11:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4788</id>
            <title type="text"><![CDATA[PatchaPalooza]]></title>
            <link rel="alternate" href="https://github.com/xaitax/PatchaPalooza" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4788"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A comprehensive tool that provides an insightful analysis of Microsof&amp;#039;s monthly security updates.

PatchaPalooza uses the power of Microsoft&amp;#039;s MSRC CVRF API to fetch, store, and analyze security update data. Designed for cybersecurity professionals, it offers a streamlined experience for those who require a quick yet detailed overview of vulnerabilities, their exploitation status, and more. This tool operates entirely offline once the data has been fetched, ensuring that your analyses can continue even without an internet connection.]]>
            </summary>
            <updated>2025-08-29T05:15:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4789</id>
            <title type="text"><![CDATA[MAAD Attack Framework]]></title>
            <link rel="alternate" href="https://github.com/vectra-ai-research/MAAD-AF" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4789"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An attack tool for simple, fast &amp;amp; effective security testing of M365 &amp;amp; Azure AD. 

MAAD-AF is designed to make cloud security testing simple, fast and effective. Through its virtually no-setup requirement and easy to use interactive attack modules, security teams can test their security controls, detection and response capabilities easily and swiftly.]]>
            </summary>
            <updated>2025-08-29T05:15:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4790</id>
            <title type="text"><![CDATA[FalconHound]]></title>
            <link rel="alternate" href="https://github.com/FalconForceTeam/FalconHound" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4790"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log aggregation tool.]]>
            </summary>
            <updated>2025-08-29T05:15:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4791</id>
            <title type="text"><![CDATA[OpenVAS]]></title>
            <link rel="alternate" href="https://openvas.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4791"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Vulnerability Assessment Scanner.

OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated and authenticated testing, various high-level and low-level internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test.

- [OpenVAS @ GitHub](https://github.com/greenbone/openvas-scanner).

Related contents:

- [OpenVAS - Le scanner de vulnérabilités open source qui vous dit la vérité sur votre serveur @ Korben :fr:](https://korben.info/openvas-scanner-vulnerabilites-gratuit-audit-secur.html).]]>
            </summary>
            <updated>2026-02-16T08:49:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4792</id>
            <title type="text"><![CDATA[BloodHound]]></title>
            <link rel="alternate" href="https://bloodhoundenterprise.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4792"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory or Azure environment.

- [BloodHound @ GitHub](https://github.com/SpecterOps/BloodHound).
- [Installation de BloodHound via Docker @ IT-Connect :fr:](https://www.it-connect.fr/chapitres/bloodhound-installation-avec-docker/).
- [Identifiez les faiblesses de votre Active Directory avec BloodHound @ IT-Connect :fr:](https://www.it-connect.fr/cours/bloodhound-identifier-faiblesses-de-votre-active-directory/).]]>
            </summary>
            <updated>2025-08-29T05:15:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4793</id>
            <title type="text"><![CDATA[RustHound]]></title>
            <link rel="alternate" href="https://github.com/NH-RED-TEAM/RustHound" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4793"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Active Directory data collector for BloodHound written in Rust. 🦀 

RustHound generates users, groups, computers, OUs, GPOs, containers, and domain JSON files that can be analyzed with BloodHound.]]>
            </summary>
            <updated>2025-08-29T05:16:00+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4806</id>
            <title type="text"><![CDATA[Gravitee.io]]></title>
            <link rel="alternate" href="https://www.gravitee.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4806"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[API Management Platform. Govern, Secure &amp;amp; Manage APIs and Event Streams.

Try the first-ever event-native API Management solution that natively supports synchronous REST APIs, asynchronous APIs, and event brokers like Kafka and MQTT.

- [Gravitee.io @ GitHub](https://github.com/gravitee-io).]]>
            </summary>
            <updated>2025-08-29T05:19:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4811</id>
            <title type="text"><![CDATA[OpenPubkey]]></title>
            <link rel="alternate" href="https://github.com/openpubkey/openpubkey" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4811"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Reference implementation of OpenPubkey.

OpenPubkey adds user generated cryptographic signatures to OpenID Connect (OIDC) to enable users to sign messages or artifacts under their OpenID identity. Verifiers can check that these signatures are valid and associated with the signing OpenID identity. OpenPubkey does not add any new trusted parties beyond what is required for OpenID Connect and is fully compatible with existing OpenID Providers (Google, Azure/Microsoft, Okta, OneLogin, Keycloak) without any changes to the OpenID Provider.

Related contents:

- [Linux Foundation Announces OpenPubkey Open Source Cryptographic Protocol @ Security Week](https://www.securityweek.com/linux-foundation-announces-openpubkey-open-source-cryptographic-protocol/).
- [Ce qu’il faut savoir sur le projet OpenPubkey @ Goodtech.info :fr:](https://goodtech.info/ce-quil-faut-savoir-sur-le-projet-openpubkey/).
- [Turning Github Actions into an oracle @ Ethan Heilman](https://www.ethanheilman.com/x/35/index.html).]]>
            </summary>
            <updated>2025-09-09T11:27:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4812</id>
            <title type="text"><![CDATA[hashcat]]></title>
            <link rel="alternate" href="https://hashcat.net/hashcat/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4812"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[World&amp;#039;s fastest and most advanced password recovery utility.

hashcat is the world&amp;#039;s fastest and most advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and macOS, and has facilities to help enable distributed password cracking.

- [hashcat @ GitHub](https://github.com/hashcat/hashcat).

Related contents:

- [Cybersécurité : les erreurs courantes de configuration réseau @ Silicon (fr)](https://www.silicon.fr/cybersecurite-erreurs-courantes-configuration-reseau-cisa-nsa-472094.html).]]>
            </summary>
            <updated>2025-08-29T05:19:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4813</id>
            <title type="text"><![CDATA[SharpShares]]></title>
            <link rel="alternate" href="https://github.com/djhohnstein/SharpShares" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4813"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.

Quick and dirty binary to list network share information from all machines in the current domain and if they&amp;#039;re readable. Can also translate all computer names to ip addresses.

- [Cybersécurité : les erreurs courantes de configuration réseau @ Silicon (fr)](https://www.silicon.fr/cybersecurite-erreurs-courantes-configuration-reseau-cisa-nsa-472094.html).]]>
            </summary>
            <updated>2025-08-29T05:19:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4814</id>
            <title type="text"><![CDATA[Snaffler]]></title>
            <link rel="alternate" href="https://github.com/SnaffCon/Snaffler" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4814"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Snaffler is a tool for pentesters and red teamers to help find delicious candy needles (creds mostly, but it&amp;#039;s flexible) in a bunch of horrible boring haystacks (a massive Windows/AD environment).

- [Cybersécurité : les erreurs courantes de configuration réseau @ Silicon (fr)](https://www.silicon.fr/cybersecurite-erreurs-courantes-configuration-reseau-cisa-nsa-472094.html).
- [Analysez vos partages de fichiers Active Directory avec Snaffler pour protéger vos données @ IT-Connect :fr:](https://www.it-connect.fr/snaffler-recherche-des-informations-sensibles-dans-les-partages-fichiers-active-directory/).]]>
            </summary>
            <updated>2025-08-29T05:19:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4815</id>
            <title type="text"><![CDATA[Malware Source Code]]></title>
            <link rel="alternate" href="https://github.com/vxunderground/MalwareSourceCode" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4815"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Collection of malware source code for a variety of platforms in an array of different programming languages.

- [VX Underground](https://korben.info/decouvrez-fonctionnement-malwares-depot-github-sources-codes.html).
- [Le code source de nombreux malwares exposés dans ce dépôt GitHub !  @ Korben (fr)](https://korben.info/decouvrez-fonctionnement-malwares-depot-github-sources-codes.html).]]>
            </summary>
            <updated>2025-08-29T05:19:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4830</id>
            <title type="text"><![CDATA[HookPhish]]></title>
            <link rel="alternate" href="https://github.com/0liverFlow/HookPhish" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4830"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[HookPhish is a Python script designed to aid in the detection of phishing websites.
It performs various checks on suspected URLs to identify potential threats.]]>
            </summary>
            <updated>2025-08-29T05:23:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4832</id>
            <title type="text"><![CDATA[Volatility Fondation &amp;amp; Framework]]></title>
            <link rel="alternate" href="https://www.volatilityfoundation.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4832"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Volatility Foundation is an independent 501(c) (3) non-profit organization that maintains and promotes The Volatility memory forensics framework.

- [Volability 3 @ GitHub](https://github.com/volatilityfoundation/volatility3).]]>
            </summary>
            <updated>2025-08-29T05:23:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4836</id>
            <title type="text"><![CDATA[Keysas]]></title>
            <link rel="alternate" href="https://github.com/r3dlight/keysas" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4836"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[USB virus cleaning station.
Retrieve untrusted files from USB (via keysas-io) or over the network.]]>
            </summary>
            <updated>2025-08-29T05:23:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4843</id>
            <title type="text"><![CDATA[Chalk]]></title>
            <link rel="alternate" href="https://github.com/crashappsec/chalk" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4843"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Total visibility of your software engineering lifecycle.

Chalk™ captures metadata at build time, and can add a small &amp;#039;chalk mark&amp;#039; (metadata) to any artifacts, so they can be identified in production. Chalk can also extract chalk marks and collect additional metadata about the operating environment when it does this.

Using Chalk, you can build a graph connecting development and production, so that devops engineers understand what is happening in the development process, and so that developers can understand what is happening in the infrastructure. With this information they can work better together.

- [Chalk: Open-source software security and infrastructure visibility tool @ Help Net Security](https://www.helpnetsecurity.com/2023/10/03/chalk-open-source-software-security-tool/).]]>
            </summary>
            <updated>2025-08-29T05:24:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4845</id>
            <title type="text"><![CDATA[jSQL Injection]]></title>
            <link rel="alternate" href="https://github.com/ron190/jsql-injection" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4845"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[jSQL Injection is a Java application for automatic SQL database injection.]]>
            </summary>
            <updated>2025-08-29T05:24:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4859</id>
            <title type="text"><![CDATA[AlienVault - Open Threat Exchange]]></title>
            <link rel="alternate" href="https://otx.alienvault.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4859"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The World’s First Truly Open Threat Intelligence Community]]>
            </summary>
            <updated>2025-08-29T05:27:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4872</id>
            <title type="text"><![CDATA[AttackForge - Pentest Management and Reporting Tool]]></title>
            <link rel="alternate" href="https://attackforge.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4872"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Pentest Management and Reporting Made Easy.

A Platform Built for Productivity, Collaboration and Visibility.

[Attack Forge @ GitHub](https://github.com/attackforge).]]>
            </summary>
            <updated>2025-08-29T05:29:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4879</id>
            <title type="text"><![CDATA[BinDiff]]></title>
            <link rel="alternate" href="https://zynamics.com/bindiff.html" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4879"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[BinDiff is a comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.

With BinDiff you can identify and isolate fixes for vulnerabilities in vendor-supplied patches. You can also port symbols and comments between disassemblies of multiple versions of the same binary or use BinDiff to gather evidence for code theft or patent infringement.

[BinDiff @ GitHub](https://github.com/google/bindiff).]]>
            </summary>
            <updated>2025-08-29T05:31:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4887</id>
            <title type="text"><![CDATA[VAmPI]]></title>
            <link rel="alternate" href="https://github.com/erev0s/VAmPI" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4887"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Vulnerable REST API with OWASP top 10 vulnerabilities for security testing.

VAmPI is a vulnerable API made with Flask and it includes vulnerabilities from the OWASP top 10 vulnerabilities for APIs. It was created as I wanted a vulnerable API to evaluate the efficiency of tools used to detect security issues in APIs. It includes a switch on/off to allow the API to be vulnerable or not while testing. This allows to cover better the cases for false positives/negatives. VAmPI can also be used for learning/teaching purposes. You can find a bit more details about the vulnerabilities in erev0s.com.]]>
            </summary>
            <updated>2025-08-29T05:31:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4893</id>
            <title type="text"><![CDATA[Massive Mobile Security Framework - MMSF]]></title>
            <link rel="alternate" href="https://github.com/St3v3nsS/MMSF" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4893"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Massive Mobile Security Framework or MMSF is a mobile framework that combines functionalities from frida, objection, drozer and many more.]]>
            </summary>
            <updated>2025-08-29T05:32:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4899</id>
            <title type="text"><![CDATA[Kubescape]]></title>
            <link rel="alternate" href="https://kubescape.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4899"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters.

Kubescape is an open-source Kubernetes security platform. It includes risk analysis, security compliance, and misconfiguration scanning. Targeted at the DevSecOps practitioner or platform engineer, it offers an easy-to-use CLI interface, flexible output formats, and automated scanning capabilities. It saves Kubernetes users and admins precious time, effort, and resources.

- [Kubescape @ GitHub](https://github.com/kubescape/kubescape).
- [Sécuriser Kubernetes avec Kubescape @ Culture et Outils DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/conteneurs/kubescape/).]]>
            </summary>
            <updated>2025-08-29T05:33:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4908</id>
            <title type="text"><![CDATA[ADCSKiller]]></title>
            <link rel="alternate" href="https://github.com/grimlockx/ADCSKiller" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4908"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer.

ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure. Please note that the ADCSKiller is currently in its first drafts and will undergo further refinements and additions in future updates for sure.]]>
            </summary>
            <updated>2025-08-29T05:35:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4909</id>
            <title type="text"><![CDATA[HardeningKitty]]></title>
            <link rel="alternate" href="https://github.com/0x6d69636b/windows_hardening" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4909"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[HardeningKitty and Windows Hardening settings and configurations.

This is a hardening checklist that can be used in private and business environments for hardening Windows 10. The checklist can be used for all Windows versions, but in Windows 10 Home the Group Policy Editor is not integrated and the adjustment must be done directly in the registry. For this, there is the HailMary mode from HardeningKitty.

- [Cybersécurité : durcir la configuration de Windows et Windows Server avec HardeningKitty
 @ IT Connect :fr:](https://www.it-connect.fr/hardening-securite-windows-et-windows-server-avec-hardeningkitty/).]]>
            </summary>
            <updated>2025-08-29T05:35:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4929</id>
            <title type="text"><![CDATA[AIDE - Advanced Intrusion Detection Environment]]></title>
            <link rel="alternate" href="https://aide.github.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4929"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AIDE (Advanced Intrusion Detection Environment, [eyd]) is a file and directory integrity checker.

 It creates a database from the regular expression rules that it finds from the config file(s). Once this database is initialized it can be used to verify the integrity of the files. It has several message digest algorithms (see below) that are used to check the integrity of the file. All of the usual file attributes can also be checked for inconsistencies. It can read databases from older or newer versions. See the manual pages within the distribution for further info. 

[AIDE @ GitHub](https://github.com/aide/aide/).]]>
            </summary>
            <updated>2025-08-29T05:39:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4930</id>
            <title type="text"><![CDATA[Picocrypt]]></title>
            <link rel="alternate" href="https://github.com/HACKERALERT/Picocrypt" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4930"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A very small, very simple, yet very secure encryption tool.

Picocrypt is a very small (hence Pico), very simple, yet very secure encryption tool that you can use to protect your files. It&amp;#039;s designed to be the go-to tool for encryption, with a focus on security, simplicity, and reliability. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security, even from three-letter agencies like the NSA. Your privacy and security is under attack. Take it back with confidence by protecting your files with Picocrypt.

- [Picocrypt, un outil léger, simple et sécurisé pour chiffrer des données ! @ IT-Connect&amp;#039;s YouTube :fr:](https://www.youtube.com/watch?v=L2gOHCdbV4o).]]>
            </summary>
            <updated>2025-08-29T05:39:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4944</id>
            <title type="text"><![CDATA[Qu1cksc0pe]]></title>
            <link rel="alternate" href="https://github.com/CYB3RMX/Qu1cksc0pe" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4944"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[All-in-One malware analysis tool.

All-in-One malware analysis tool for analyze many file types, from Windows binaries to E-Mail files.]]>
            </summary>
            <updated>2025-08-29T05:41:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4949</id>
            <title type="text"><![CDATA[zphisher]]></title>
            <link rel="alternate" href="https://github.com/htr-tech/zphisher" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4949"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit ! 

Related contents:

- [Nexphisher @ GitHub](https://github.com/htr-tech/nexphisher).]]>
            </summary>
            <updated>2025-08-29T05:41:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4955</id>
            <title type="text"><![CDATA[Faraday Security]]></title>
            <link rel="alternate" href="https://faradaysec.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4955"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Protect your business, scale your security.  Open Source Vulnerability Management Platform.

Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation efforts. With Faraday, you may focus on discovering vulnerabilities while we help you with the rest. Just use it in your terminal and get your work organized on the run. Faraday was made to let you take advantage of the available tools in the community in a truly multiuser way.

Faraday aggregates and normalizes the data you load, allowing exploring it into different visualizations that are useful to managers and analysts alike.

[Faraday @ GitHub](https://github.com/infobyte/faraday).]]>
            </summary>
            <updated>2025-08-29T05:43:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4957</id>
            <title type="text"><![CDATA[FIRST - Forum of Incident Response and Security Teams]]></title>
            <link rel="alternate" href="https://www.first.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4957"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[FIRST is the premier organization and recognized global leader in incident response. Membership in FIRST enables incident response teams to more effectively respond to security incidents - reactive as well as proactive.

FIRST brings together a variety of computer security incident response teams from government, commercial, and educational organizations. FIRST aims to foster cooperation and coordination in incident prevention, to stimulate rapid reaction to incidents, and to promote information sharing among members and the community at large.]]>
            </summary>
            <updated>2025-08-29T05:43:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4958</id>
            <title type="text"><![CDATA[Lynis]]></title>
            <link rel="alternate" href="https://cisofy.com/lynis/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4958"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security auditing tool for Linux, macOS, and Unix-based systems.

Lynis is a battle-tested security tool for systems running Linux, macOS, or Unix-based operating system. It performs an extensive health scan of your systems to support system hardening and compliance testing. The project is open source software with the GPL license and available since 2007.

- [Lynis @ GitHub](https://github.com/CISOfy/lynis).
- [Auditez la sécurité de vos serveurs avec Lynis @ Culture et Outils DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/durcissement/lynis/),]]>
            </summary>
            <updated>2025-08-29T05:43:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4966</id>
            <title type="text"><![CDATA[My arsenal of  AWS security tools]]></title>
            <link rel="alternate" href="https://github.com/toniblyx/my-arsenal-of-aws-security-tools" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4966"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.]]>
            </summary>
            <updated>2025-08-29T05:44:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4967</id>
            <title type="text"><![CDATA[Black Hat Arsenal Security Tools]]></title>
            <link rel="alternate" href="https://toolswatch.org/category/arsenal/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4967"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Official Black Hat Arsenal Security Tools Repository.

[Black Hat Arsenal Security Tools @ GitHub](https://github.com/toolswatch/blackhat-arsenal-tools):
This github account maps to the Black Hat Arsenal tools since its inception in 2011. For readibility, the tools are classified by category and not by session.]]>
            </summary>
            <updated>2025-08-29T05:45:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4968</id>
            <title type="text"><![CDATA[GC Cloud Guardrails Checks for Azure]]></title>
            <link rel="alternate" href="https://github.com/canada-ca/cloud-guardrails-azure" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4968"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tools to support cloud guardrails implementation and compliance checks for Microsoft Azure.]]>
            </summary>
            <updated>2025-08-29T05:45:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4969</id>
            <title type="text"><![CDATA[OWASP Foundation]]></title>
            <link rel="alternate" href="https://owasp.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4969"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[the Open Source Foundation for Application Security.

- [OWASP Top 10 : comment (vraiment) sécuriser son API ? @ AXOPEN podcast :fr:](https://podcast.ausha.co/axopen/comment-vraiment-securiser-son-api-top-10-des-principes-de-l-owasp).]]>
            </summary>
            <updated>2025-08-29T05:45:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4970</id>
            <title type="text"><![CDATA[The Penetration Testing Execution Standard (PTES)]]></title>
            <link rel="alternate" href="http://www.pentest-standard.org/index.php/Main_Page" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4970"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The penetration testing execution standard consists of seven (7) main sections.

These cover everything related to a penetration test - from the initial communication and reasoning behind a pentest, through the intelligence gathering and threat modeling phases where testers are working behind the scenes in order to get a better understanding of the tested organization, through vulnerability research, exploitation and post exploitation, where the technical security expertise of the testers come to play and combine with the business understanding of the engagement, and finally to the reporting, which captures the entire process, in a manner that makes sense to the customer and provides the most value to it.]]>
            </summary>
            <updated>2025-08-29T05:45:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4974</id>
            <title type="text"><![CDATA[Caldera]]></title>
            <link rel="alternate" href="https://caldera.mitre.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4974"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Scalable, Automated Adversary Emulation Platform

Caldera™ is a cybersecurity framework developed by MITRE that empowers cyber practitioners to save time, money, and energy through automated security assessments.

- [Caldera @ GitHub](https://github.com/mitre/caldera).

Related contents:

- [MITRE Caldera v5 - Basics playlist @ MITRE Caldera&amp;#039;s YouTube](https://www.youtube.com/playlist?list=PLF2bj1pw7-ZvLTjIwSaTXNLN2D2yx-wXH).]]>
            </summary>
            <updated>2025-08-29T05:47:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4983</id>
            <title type="text"><![CDATA[PiRogue tool suite (PTS)]]></title>
            <link rel="alternate" href="https://pts-project.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4983"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Mobile forensic &amp;amp; Network traffic analysis.

PiRogue tool suite (PTS) is an open-source tool suite that provides a comprehensive mobile forensic and network traffic analysis platform targeting mobile devices both Android and iOS, internet of things devices (devices that are connected to the user mobile apps), and in general any device using wi-fi to connect to the Internet.

- [PiRogue tool suite @ GitHub](https://github.com/PiRogueToolSuite).
- [Mobile Forensics &amp;amp; Network Analysis - PTS Project @ Mudsor (mudpak) :fr:](https://mudpak.eu/labs-cyber/pts-project/v1.0.1.html).]]>
            </summary>
            <updated>2025-08-29T05:47:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4984</id>
            <title type="text"><![CDATA[Reaper]]></title>
            <link rel="alternate" href="https://ghostsecurity.github.io/reaper/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4984"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Reaper is a reconnaissance and attack proxy, built to be a modern, lightweight, and efficient equivalent to Burp Suite/ZAP etc. This is an attack proxy with a heavy focus on automation, collaboration, and building universally distributable workflows.

[Reaper @ GitHub](https://github.com/ghostsecurity/reaper).]]>
            </summary>
            <updated>2025-08-29T05:47:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4986</id>
            <title type="text"><![CDATA[Exegol]]></title>
            <link rel="alternate" href="https://exegol.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4986"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[professional hacking setup.

Exegol is a community-driven hacking environment, powerful and yet simple enough to be used by anyone in day to day engagements. Exegol is the best solution to deploy powerful hacking environments securely, easily, professionally. No more unstable, not-so-security-focused systems lacking major offensive tools. Kali Linux (and similar alternatives) are great toolboxes for learners, students and junior pentesters. But professionals have different needs, and their context require a whole new design.

- [Exegol @ Read the Docs](https://exegol.readthedocs.io/en/latest/).
- [Exegol @ GitHub](https://github.com/ThePorgs/Exegol).

Related contents:

- [ Exegol, un modèle autour d&amp;#039;un environnement pour les Pentesters et Redteamers ? Charlie Bromberg @ BeCyber&amp;#039;s YouTube :fr:](https://www.youtube.com/watch?v=lwZCziWpTcA).
- [Découverte d’Exegol : un environnement dédié à la sécurité offensive @ IT-Connect :fr:](https://www.it-connect.fr/exegol-un-environnement-dedie-a-la-securite-offensive/).
- [Episode \#527 consacré à Exegol @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/exegol/).]]>
            </summary>
            <updated>2026-01-21T06:48:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4992</id>
            <title type="text"><![CDATA[promptmap]]></title>
            <link rel="alternate" href="https://github.com/utkusen/promptmap" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4992"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[automatically tests prompt injection attacks on ChatGPT instances.

Prompt injection is a type of security vulnerability that can be exploited to control the behavior of a ChatGPT instance. By injecting malicious prompts into the system, an attacker can force the ChatGPT instance to do unintended actions.]]>
            </summary>
            <updated>2025-08-29T05:49:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4994</id>
            <title type="text"><![CDATA[Captain]]></title>
            <link rel="alternate" href="https://github.com/y3n11/Captain" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4994"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Userland API monitor for threat hunting.

Captain is an endpoint monitoring tool that aims at spotting malicious events through API hooking, improving the process of threat hunting analysis . When a new process is created, Captain will inject a dll into it hooking some Windows API functions.]]>
            </summary>
            <updated>2025-08-29T05:49:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4995</id>
            <title type="text"><![CDATA[memhunter]]></title>
            <link rel="alternate" href="https://github.com/marcosd4h/memhunter" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4995"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Live hunting of code injection techniques.

Memhunter is an endpoint sensor tool that is specialized in detecing resident malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known malicious memory injection techniques. The detection process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement of memory forensic volatility plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory resident malware threat hunting at scale, without manual analysis, and without the complex infrastructure needed to move dumps to forensic environments.]]>
            </summary>
            <updated>2025-08-29T05:49:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4998</id>
            <title type="text"><![CDATA[OWASP Amass]]></title>
            <link rel="alternate" href="https://owasp.org/www-project-amass/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4998"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The OWASP Amass Project performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.

The OWASP Amass Project has developed a framework to help information security professionals perform network mapping of attack surfaces and external asset discovery using open source intelligence gathering and reconnaissance techniques.

- [OWASP Amass](https://github.com/owasp-amass/amass).]]>
            </summary>
            <updated>2026-03-20T08:26:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5004</id>
            <title type="text"><![CDATA[Active Directory Security Assessment by Purple Knight]]></title>
            <link rel="alternate" href="https://www.purple-knight.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5004"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[#1 Active Directory security assessment community tool

Active Directory, Azure AD (now called Entra ID), and Okta vulnerabilities can give attackers virtually unrestricted access to your organization’s network and resources. Semperis built Purple Knight—a free AD, Azure AD, and Okta security assessment tool—to help you discover indicators of exposure (IoEs) and indicators of compromise (IoCs) in your hybrid AD environment. Download Purple Knight and dramatically reduce your AD attack surface today.]]>
            </summary>
            <updated>2025-08-29T05:51:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5005</id>
            <title type="text"><![CDATA[PowerHuntShares]]></title>
            <link rel="alternate" href="https://github.com/NetSPI/PowerHuntShares" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5005"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains. 

PowerHuntShares is PowerShell tool designed to help cybersecurity teams
and penetration testers better identify, understand, attack,
and remediate SMB shares in the Active Directory environments they protect.

Sources:

- [Qui n&amp;#039;a jamais galéré dans son infrastructure AD pour retrouver les partages SMB ouverts ? @ Kondah Hamza&amp;#039;s X :fr:](https://x.com/kondah_ha/status/1810407641203835146).
- [PowerHuntShares : Analysez facilement les partages réseau de votre domaine Active Directory @ IT-Connect :fr:](https://www.it-connect.fr/powerhuntshares-analysez-facilement-les-partages-reseau-de-votre-domaine-active-directory/).]]>
            </summary>
            <updated>2025-08-29T05:51:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5006</id>
            <title type="text"><![CDATA[SysReptor Pentest Report Creator]]></title>
            <link rel="alternate" href="https://sysreptor.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5006"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Fully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike. 

SysReptor is a fully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike. You can create designs based on simple HTML and CSS, write your reports in user-friendly Markdown and convert them to PDF with just a single click, in the cloud or self-hosted!

- [SysReptor documentation](https://docs.sysreptor.com/).
- [SysReptor @ GitHub](https://github.com/Syslifters/sysreptor).]]>
            </summary>
            <updated>2026-01-12T08:00:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5007</id>
            <title type="text"><![CDATA[Metasploit Unleashed]]></title>
            <link rel="alternate" href="https://www.offsec.com/metasploit-unleashed/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5007"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free Online Ethical Hacking Course

This course is a perfect starting point for Information Security Professionals who want to learn penetration testing and ethical hacking, but are not yet ready to commit to a paid course. We will teach you how to use Metasploit, in a structured and intuitive manner.]]>
            </summary>
            <updated>2025-08-29T05:51:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5008</id>
            <title type="text"><![CDATA[PersistenceSniper]]></title>
            <link rel="alternate" href="https://github.com/last-byte/PersistenceSniper" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5008"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PersistenceSniper is a Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. It is also available on Powershell Gallery and it is digitally signed with a valid code signing certificate. The tool is under active development with new releases coming out by the week, so make sure to use the up-to-date version. Official Twitter/X account @PersistSniper.]]>
            </summary>
            <updated>2025-08-29T05:51:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5009</id>
            <title type="text"><![CDATA[OWASP Cheat Sheet Series]]></title>
            <link rel="alternate" href="https://cheatsheetseries.owasp.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5009"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics.

[OWASP Cheat Sheet Series @ GitHub](https://github.com/OWASP/CheatSheetSeries).]]>
            </summary>
            <updated>2025-08-29T05:51:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5010</id>
            <title type="text"><![CDATA[Velociraptor]]></title>
            <link rel="alternate" href="https://docs.velociraptor.app/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5010"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Velociraptor is an advanced digital forensic and incident response tool that enhances your visibility into your endpoints.

Velociraptor is a tool for collecting host based state information using The Velociraptor Query Language (VQL) queries.

[Velociraptor @ GitHub](https://github.com/Velocidex/velociraptor).]]>
            </summary>
            <updated>2025-08-29T05:52:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5011</id>
            <title type="text"><![CDATA[Antispoofing Wiki]]></title>
            <link rel="alternate" href="https://antispoofing.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5011"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Biometric liveness detection encyclopedia.

Everything you wanted to know about Biometric Security, Liveness Detection, Spoofing Attacks, and Antispoofing Measures.]]>
            </summary>
            <updated>2025-08-29T05:52:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5012</id>
            <title type="text"><![CDATA[Web Check]]></title>
            <link rel="alternate" href="https://web-check.xyz/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5012"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🕵️‍♂️ All-in-one OSINT tool for analysing any website.  Comprehensive, on-demand open source intelligence for any website.

Get an insight into the inner-workings of a given website: uncover potential attack vectors, analyse server architecture, view security configurations, and learn what technologies a site is using.

- [Web-Check @ GitHub](https://github.com/Lissy93/web-check).

Related contents:

- [090 - Les news web dev pour juillet 2024 @ Double Slash :fr:](https://double-slash.dev/podcasts/news-jul-24/).]]>
            </summary>
            <updated>2025-08-29T05:52:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5014</id>
            <title type="text"><![CDATA[AMAnDe]]></title>
            <link rel="alternate" href="https://github.com/StackeredSAS/AMAnDe" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5014"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Extract, gather and analyze information from an Android Manifest file or an APK.

AMAnDe stands for Android Manifest Anomaly Detector. It&amp;#039;s a new tool whose objective is to extract and gather information from an Android Manifest. When we deal with huge Manifests, it is often difficult to get all relevant datas (like deeplink URIs, exported provider, etc.) With AMAnDe all of this information is deeply analyzed and presented to you in a simple manner.]]>
            </summary>
            <updated>2025-08-29T05:52:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5016</id>
            <title type="text"><![CDATA[NtRemoteLoad]]></title>
            <link rel="alternate" href="https://github.com/florylsk/NtRemoteLoad" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5016"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Remote Shellcode Injector.

Remote shellcode injector, based on HWSyscalls by ShorSec, leveraging undetectable (currently) indirect native syscalls to inject shellcode into another process, creating a thread and executing it.]]>
            </summary>
            <updated>2025-08-29T05:53:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5018</id>
            <title type="text"><![CDATA[PwnDoc]]></title>
            <link rel="alternate" href="https://pwndoc.github.io/pwndoc/#/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5018"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Pentest Report Generator.

PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx report.
The main goal is to have more time to Pwn and less time to Doc by mutualizing data like vulnerabilities between users.

- [PwnDoc @ GitHub](https://github.com/pwndoc/pwndoc).

Related contents:

- [Episode \#498 consacré à la société Patrowl, lauréate du Grand Prix de la Startup au FIC 2025 @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/patrowl-prix-du-fic-2025/).]]>
            </summary>
            <updated>2025-08-29T05:53:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5019</id>
            <title type="text"><![CDATA[Offensive Security Exam Report Template in Markdown]]></title>
            <link rel="alternate" href="https://github.com/noraj/OSCP-Exam-Report-Template-Markdown" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5019"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[📙 Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report .

I created an Offensive Security Exam Report Template in Markdown so LaTeX, Microsoft Office Word, LibreOffice Writer are no longer needed during your Offensive Security OSCP, OSWE, OSEE, OSWP, OSEP, OSED, OSWA, OSDA, OSMR exam!]]>
            </summary>
            <updated>2025-08-29T05:53:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5024</id>
            <title type="text"><![CDATA[Chainsaw]]></title>
            <link rel="alternate" href="https://github.com/WithSecureLabs/chainsaw" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5024"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Rapidly Search and Hunt through Windows Forensic Artefacts.

Chainsaw provides a powerful ‘first-response’ capability to quickly identify threats within Windows forensic artefacts such as Event Logs and MFTs. Chainsaw offers a generic and fast method of searching through event logs for keywords, and by identifying threats using built-in support for Sigma detection rules, and via custom Chainsaw detection rules.]]>
            </summary>
            <updated>2025-08-29T05:55:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5027</id>
            <title type="text"><![CDATA[SecNumacadémie]]></title>
            <link rel="alternate" href="https://secnumacademie.gouv.fr/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5027"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Vous y trouverez l’ensemble des informations pour vous initier à la cybersécurité, approfondir vos connaissances, et ainsi agir efficacement sur la protection de vos outils numériques. Ce dispositif est accessible gratuitement. Le suivi intégral de ce dispositif vous fera bénéficier d’une attestation de réussite.]]>
            </summary>
            <updated>2025-08-29T05:55:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5031</id>
            <title type="text"><![CDATA[wordfence-cli]]></title>
            <link rel="alternate" href="https://github.com/wordfence/wordfence-cli" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5031"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Wordfence malware scanner command line utility.

Wordfence CLI is a multi-process malware scanner written in Python. It&amp;#039;s designed to have low memory overhead while being able to utilize multiple cores for scanning large filesystems for malware. Wordfence CLI uses libpcre over Python&amp;#039;s existing regex libraries for speed and compatibility with our signature set.]]>
            </summary>
            <updated>2025-08-29T05:55:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5032</id>
            <title type="text"><![CDATA[Security Onion]]></title>
            <link rel="alternate" href="https://securityonionsolutions.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5032"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek. 

[Security Onion @ GitHub](https://github.com/Security-Onion-Solutions/securityonion/).]]>
            </summary>
            <updated>2025-08-29T05:55:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5036</id>
            <title type="text"><![CDATA[The Zeek Network Security Monitor]]></title>
            <link rel="alternate" href="https://zeek.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5036"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An Open Source Network Security Monitoring Tool
Zeek (formerly Bro) is the world’s leading platform for network security monitoring.

Flexible, open source, and powered by defenders.

[Zeek @ GitHub](https://github.com/zeek/zeek)]]>
            </summary>
            <updated>2025-08-29T05:56:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5038</id>
            <title type="text"><![CDATA[hackernoon/learn]]></title>
            <link rel="alternate" href="https://github.com/hackernoon/learn" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5038"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The HackerNoon Library.

THE LEARN REPO orders technology stories by editor determined subject matter and community determined time reading created. It is an open source lever within the HackerNoon Story Classification System.]]>
            </summary>
            <updated>2025-08-29T05:56:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5049</id>
            <title type="text"><![CDATA[Cybersecurity Framework | NIST]]></title>
            <link rel="alternate" href="https://www.nist.gov/cyberframework" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5049"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Helping organizations to better understand and improve their management of cybersecurity risk.

Framework for Improving
Critical Infrastructure Cybersecurity]]>
            </summary>
            <updated>2025-08-29T05:59:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5051</id>
            <title type="text"><![CDATA[OverTheWire: Wargames]]></title>
            <link rel="alternate" href="https://overthewire.org/wargames/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5051"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.]]>
            </summary>
            <updated>2025-08-29T05:59:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5052</id>
            <title type="text"><![CDATA[OverTheWire: Bandit]]></title>
            <link rel="alternate" href="https://overthewire.org/wargames/bandit/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5052"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cybersecurity hacking e-learning game

The Bandit wargame is aimed at absolute beginners. It will teach the basics needed to be able to play other wargames. If you notice something essential is missing or have ideas for new levels, please let us know!]]>
            </summary>
            <updated>2025-08-29T05:59:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5066</id>
            <title type="text"><![CDATA[Syft]]></title>
            <link rel="alternate" href="https://github.com/anchore/syft" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5066"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems. Exceptional for vulnerability detection when used with a scanner like Grype.

- [Syft - SBOM Generator @ Snapcaft](https://snapcraft.io/syft).

Related contents:

- [sbom-cli-plugin @ GitHub](https://github.com/docker/sbom-cli-plugin).]]>
            </summary>
            <updated>2025-10-01T04:59:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5070</id>
            <title type="text"><![CDATA[DFIQ (Digital Forensics Investigative Questions)]]></title>
            <link rel="alternate" href="https://dfiq.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5070"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[DFIQ is a collection of Digital Forensics Investigative Questions and the approaches to answering them. The goal of the project is to build a comprehensive catalog of investigative knowledge to help drive consistent, thorough, and explainable investigations.

[DFIQ @ GitHub](https://github.com/google/dfiq)]]>
            </summary>
            <updated>2025-08-29T06:03:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5088</id>
            <title type="text"><![CDATA[LFI-Space Tool]]></title>
            <link rel="alternate" href="https://github.com/capture0x/Lfi-Space" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5088"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Lfi Scan Tool.

LFI Space is a robust and efficient tool designed to detect Local File Inclusion (LFI) vulnerabilities in web applications. This tool simplifies the process of identifying potential security flaws by leveraging two distinct scanning methods: Google Dork Search and Targeted URL Scan. With its comprehensive approach, LFI Space assists security professionals, penetration testers, and ethical hackers in assessing the security posture of web applications.]]>
            </summary>
            <updated>2025-08-29T06:05:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5100</id>
            <title type="text"><![CDATA[HTML Purifier]]></title>
            <link rel="alternate" href="http://htmlpurifier.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5100"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Filter your HTML the standards-compliant way!

HTML Purifier is an HTML filtering solution that uses a unique combination of robust whitelists and aggressive parsing to ensure that not only are XSS attacks thwarted, but the resulting HTML is standards compliant.

HTML Purifier is oriented towards richly formatted documents from untrusted sources that require CSS and a full tag-set. This library can be configured to accept a more restrictive set of tags, but it won&amp;#039;t be as efficient as more bare-bones parsers. It will, however, do the job right, which may be more important.

- [HTML Purifier @ GitHub](https://github.com/ezyang/htmlpurifier).
- [Security Tip: Is `strip_tags()` Secure? @ Securing Laravel](https://securinglaravel.com/p/security-tip-is-strip_tags-secure).]]>
            </summary>
            <updated>2025-08-29T06:07:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5108</id>
            <title type="text"><![CDATA[Evercookie]]></title>
            <link rel="alternate" href="https://github.com/samyk/evercookie" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5108"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Produces persistent, respawning &amp;quot;super&amp;quot; cookies in a browser, abusing over a dozen techniques. Its goal is to identify users after they&amp;#039;ve removed standard cookies and other privacy data such as Flash cookies (LSOs), HTML5 storage, SilverLight storage, and others.]]>
            </summary>
            <updated>2025-08-29T06:08:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5111</id>
            <title type="text"><![CDATA[Pestudio]]></title>
            <link rel="alternate" href="https://www.winitor.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5111"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The goal of pestudio is to spot artifacts of executable files in order to ease and accelerate Malware Initial Assessment. The tool is used by Computer Emergency Response Teams (CERT), Security Operations Centers (SOC) and Digital-Forensic Labs worldwide.]]>
            </summary>
            <updated>2025-08-29T06:08:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5121</id>
            <title type="text"><![CDATA[wholeaked]]></title>
            <link rel="alternate" href="https://github.com/utkusen/wholeaked" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5121"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[wholeaked is a file-sharing tool that allows you to find the responsible person in case of a leakage. It&amp;#039;s written in Go.]]>
            </summary>
            <updated>2025-08-29T06:11:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5123</id>
            <title type="text"><![CDATA[C2Live]]></title>
            <link rel="alternate" href="https://github.com/YoNixNeXRo/C2Live" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5123"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Track C2 over time by framework and location.

C2Live is an open-source project aimed at providing a comprehensive and interactive platform for tracking Command and Control (C2) malicious IP addresses over time.]]>
            </summary>
            <updated>2025-08-29T06:11:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5149</id>
            <title type="text"><![CDATA[Merlin]]></title>
            <link rel="alternate" href="https://github.com/Ne0nd0g/merlin" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5149"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Merlin is a cross-platform post-exploitation Command &amp;amp; Control server and agent written in Go.]]>
            </summary>
            <updated>2025-08-29T06:15:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5153</id>
            <title type="text"><![CDATA[Wolfi OS]]></title>
            <link rel="alternate" href="https://github.com/wolfi-dev" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5153"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Wolfi is a community Linux OS designed for the container and cloud-native era. Chainguard started the Wolfi project to enable building Chainguard Images, our collection of curated distroless images that meet the requirements of a secure software supply chain. This required a Linux distribution with components at the appropriate granularity and with support for both glibc and musl, something that was not yet available in the cloud-native Linux ecosystem.]]>
            </summary>
            <updated>2025-08-29T06:15:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5164</id>
            <title type="text"><![CDATA[OpenBullet]]></title>
            <link rel="alternate" href="https://openbullet.github.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5164"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenBullet is a webtesting suite that allows to perform requests towards a target webapp and offers a lot of tools to work with the results. This software can be used for scraping and parsing data, automated pentesting, unit testing through selenium and much more.

[OpenBullet @ GitHub](https://github.com/openbullet/openbullet)]]>
            </summary>
            <updated>2025-08-29T06:17:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5167</id>
            <title type="text"><![CDATA[Kismet]]></title>
            <link rel="alternate" href="https://www.kismetwireless.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5167"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Kismet is a sniffer, WIDS, and wardriving tool for Wi-Fi, Bluetooth, Zigbee, RF, and more, which runs on Linux and macOS.

[Kismet @ GitHub](https://github.com/kismetwireless)]]>
            </summary>
            <updated>2025-08-29T06:19:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5168</id>
            <title type="text"><![CDATA[AirSnort]]></title>
            <link rel="alternate" href="https://sourceforge.net/projects/airsnort/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5168"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.]]>
            </summary>
            <updated>2025-08-29T06:19:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5170</id>
            <title type="text"><![CDATA[RustScan]]></title>
            <link rel="alternate" href="https://github.com/rustscan/RustScan" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5170"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🤖 The Modern Port Scanner 🤖.

RustScan is a modern take on the port scanner. Sleek &amp;amp; fast. All while providing extensive extendability to you.

Not to mention RustScan uses Adaptive Learning to improve itself over time, making it the best port scanner for you.]]>
            </summary>
            <updated>2025-08-29T06:19:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5171</id>
            <title type="text"><![CDATA[masscan]]></title>
            <link rel="alternate" href="https://github.com/robertdavidgraham/masscan" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5171"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

This is an Internet-scale port scanner. It can scan the entire Internet in under 5 minutes, transmitting 10 million packets per second, from a single machine.

Related contents:

- [Fingerprinting the Internet: Blocking Bots and Internet Scanners with eBPF @ eBPFChirp](https://ebpfchirp.substack.com/p/fingerprinting-the-internet-blocking).]]>
            </summary>
            <updated>2025-09-15T13:23:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5172</id>
            <title type="text"><![CDATA[IVRE]]></title>
            <link rel="alternate" href="https://ivre.rocks/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5172"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Network recon framework.

IVRE is an open-source framework for network recon. It relies on open-source well-known tools (Nmap, Masscan, ZGrab2, ZDNS and Zeek (Bro)) to gather data (network intelligence), stores it in a database (MongoDB is the recommended backend), and provides tools to analyze it.]]>
            </summary>
            <updated>2025-08-29T06:19:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5173</id>
            <title type="text"><![CDATA[Zenmap]]></title>
            <link rel="alternate" href="https://nmap.org/zenmap/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5173"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Official cross-platform Nmap Security Scanner GUI.

Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared with one another to see how they differ. The results of recent scans are stored in a searchable database.]]>
            </summary>
            <updated>2025-08-29T06:19:36+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5230</id>
            <title type="text"><![CDATA[WinPrefetchView]]></title>
            <link rel="alternate" href="https://www.nirsoft.net/utils/win_prefetch_view.html" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5230"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[View the content of Windows Prefetch (.pf) files.

WinPrefetchView is a small utility that reads the Prefetch files stored in your system and displays the information stored in them. By looking in these files, you can learn which files every application is using, and which files are loaded on Windows boot.]]>
            </summary>
            <updated>2025-08-29T06:28:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5231</id>
            <title type="text"><![CDATA[PECmd]]></title>
            <link rel="alternate" href="https://github.com/EricZimmerman/PECmd" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5231"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Windows Prefetch Explorer Command Line]]>
            </summary>
            <updated>2025-08-29T06:28:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5232</id>
            <title type="text"><![CDATA[Deming]]></title>
            <link rel="alternate" href="https://github.com/dbarzin/deming" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5232"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Management tool for the information security management system.

To manage the security of their information system, organizations must set up a set of security measures and regularly check that these measures are effective and effective. These regular checks make it possible to guarantee that the security measures implemented place achieve their security objectives.

Deming is a tool for managing, planning, tracking and reporting the effectiveness of security controls.

This management of controls must allow the implementation of adequate and proportionate security. This approach is in line with the recommendations of ISO / IEC 27001:2013, chapter 9 which deals with performance evaluation.]]>
            </summary>
            <updated>2025-08-29T06:28:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5247</id>
            <title type="text"><![CDATA[PowerLessShell]]></title>
            <link rel="alternate" href="https://github.com/Mr-Un1k0d3r/PowerLessShell" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5247"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PowerLessShell rely on MSBuild.exe to remotely execute PowerShell scripts and commands without spawning powershell.exe. You can also execute raw shellcode using the same approach.]]>
            </summary>
            <updated>2025-08-29T06:31:41+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5264</id>
            <title type="text"><![CDATA[Duo Unix]]></title>
            <link rel="alternate" href="https://duo.com/docs/duounix" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5264"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Two-Factor Authentication for SSH with PAM Support (pam_duo).

Duo Unix includes a PAM module or alternatively a stand alone executable that can be used to protect programs such as SSH or Sudo.

Duo can be easily added to any Unix system to protect remote (SSH) or local logins with the addition of a simple pam_duo PAM module. It has been tested on Linux (RedHat, Fedora, CentOS, Debian, Ubuntu, Amazon Linux), BSD (FreeBSD, NetBSD, OpenBSD), Solaris, and AIX.

[Duo Unix @ GitHub](https://github.com/duosecurity/duo_unix).]]>
            </summary>
            <updated>2025-08-29T06:35:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5267</id>
            <title type="text"><![CDATA[Optimize &amp;amp; Secure Your Cloud]]></title>
            <link rel="alternate" href="https://www.rapidfort.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5267"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Hardened Containers, Faster Teams, Secure Software.

Automatically eliminate unused software components and deploy smaller, faster, more secure workloads.]]>
            </summary>
            <updated>2025-08-29T06:35:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5305</id>
            <title type="text"><![CDATA[RedCloud OS]]></title>
            <link rel="alternate" href="https://github.com/RedTeamOperations/RedCloud-OS" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5305"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[RedCloud OS is a Debian based Cloud Adversary Simulation Operating System for Red Teams to assess the security of leading Cloud Service Providers (CSPs). It includes tools optimized for adversary simulation tasks within Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).]]>
            </summary>
            <updated>2025-08-29T06:40:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5320</id>
            <title type="text"><![CDATA[Je n&amp;#039;ai rien à cacher.]]></title>
            <link rel="alternate" href="https://jenairienacacher.fr/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5320"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Puis-je vous demander une copie de tous vos emails, de vos messages et photos sur Facebook, et de tous les fichiers sur votre ordinateur ? J’aimerais tout savoir sur votre vie privée.]]>
            </summary>
            <updated>2025-08-29T06:43:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5328</id>
            <title type="text"><![CDATA[npm-manifest-check]]></title>
            <link rel="alternate" href="https://github.com/panki27/npm-manifest-check" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5328"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Check NPM packages for manifest confusion.

A python script to check npm packages for manifest mismatches.]]>
            </summary>
            <updated>2025-08-29T06:44:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5329</id>
            <title type="text"><![CDATA[PingCastle]]></title>
            <link rel="alternate" href="https://www.pingcastle.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5329"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Get Active Directory Security at 80% in 20% of the time.

PingCastle is an Active Directory vunerability and misconfiguration scanner.

[PingCastle @ GitHub](https://github.com/vletoux/pingcastle/).]]>
            </summary>
            <updated>2025-08-29T06:44:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5331</id>
            <title type="text"><![CDATA[SpiderLabs Snappy]]></title>
            <link rel="alternate" href="https://github.com/SpiderLabs/snappy" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5331"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[(Snap)shot SHA256 hashes of wireless access points to determine whether something has changed since your last visit (e.g. rogue AP), plus detect airbase-ng in use.]]>
            </summary>
            <updated>2025-08-29T06:45:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5352</id>
            <title type="text"><![CDATA[Exodia · OS For Cyber Security]]></title>
            <link rel="alternate" href="https://exodia-os.github.io/exodia-website/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5352"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A highly customized arch-based distro For All Cybersecurity fields.

[Exodia OS @ GitHub](https://github.com/Exodia-OS)]]>
            </summary>
            <updated>2025-08-29T06:48:47+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5375</id>
            <title type="text"><![CDATA[pyrdp]]></title>
            <link rel="alternate" href="https://github.com/GoSecure/pyrdp" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5375"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact.
PyRDP is a Python Remote Desktop Protocol (RDP) Monster-in-the-Middle (MITM) tool and library.]]>
            </summary>
            <updated>2025-08-29T06:52:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5376</id>
            <title type="text"><![CDATA[Jigsaw&amp;#039;s Phishing Quiz]]></title>
            <link rel="alternate" href="https://phishingquiz.withgoogle.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5376"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Can you spot when you’re being phished?]]>
            </summary>
            <updated>2025-08-29T06:52:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5392</id>
            <title type="text"><![CDATA[OWASP Mutillidae II]]></title>
            <link rel="alternate" href="https://owasp.org/www-project-mutillidae-ii/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5392"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. With dozens of vulnerabilities and hints to help the user; this is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets.

[OWASP Mutillidae II @ GitHub](https://github.com/so-sc/OWASP-mutillidae-2).]]>
            </summary>
            <updated>2025-08-29T06:56:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5397</id>
            <title type="text"><![CDATA[OpenCVE]]></title>
            <link rel="alternate" href="https://www.opencve.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5397"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenCVE is the easiest way to track CVE updates and be alerted about new vulnerabilities.

OpenCVE is a platform used to locally import the list of CVEs and perform searches on it (by vendors, products, CVSS, CWE...). Users subscribe to vendors or products, and OpenCVE alerts them when a new CVE is created or when an update is done in an existing CVE.

- [OpenCVE @ GitHub](https://github.com/opencve/opencve).

Related contents:

- [Veille en vulnérabilités avec OpenCVE.io @ Net Security :fr:](https://net-security.fr/security/veille-opencveio/).]]>
            </summary>
            <updated>2026-01-09T14:35:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5415</id>
            <title type="text"><![CDATA[Nuclei]]></title>
            <link rel="alternate" href="https://nuclei.projectdiscovery.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5415"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Community Powered Vulnerability Scanner


[Nuclei @ GitHub](https://github.com/projectdiscovery/nuclei).]]>
            </summary>
            <updated>2025-08-29T06:59:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5427</id>
            <title type="text"><![CDATA[Artica-Proxy]]></title>
            <link rel="alternate" href="https://www.articatech.com/about-proxy.php" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5427"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Artica V4 is an appliance based on Debian 10 Operating system. Your can install it on the Hardware or Virtual Machine of your choice and get a Web Gateway appliance within minutes.]]>
            </summary>
            <updated>2025-08-29T07:01:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5428</id>
            <title type="text"><![CDATA[Minisign]]></title>
            <link rel="alternate" href="https://jedisct1.github.io/minisign/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5428"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Minisign is a dead simple tool to sign files and verify signatures.

[Minisign @ GitHub](https://github.com/jedisct1/minisign)]]>
            </summary>
            <updated>2025-08-29T07:01:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5445</id>
            <title type="text"><![CDATA[APT-Hunter]]></title>
            <link rel="alternate" href="https://github.com/ahmedkhlief/APT-Hunter" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5445"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity . APT-Hunter use pre-defined detection rules and focus on statistics to uncover abnormalities which is very effective in compromise assessment . the output produced with timeline that can be analyzed directly from Excel , Timeline Explorer , Timesketch , etc...]]>
            </summary>
            <updated>2025-08-29T07:04:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5451</id>
            <title type="text"><![CDATA[universal-data-permissions-scanner]]></title>
            <link rel="alternate" href="https://github.com/SatoriCyber/universal-data-permissions-scanner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5451"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Analyze assets authorization, who has access to what and how.

universal-data-permissions-scanner (AKA udps) helps DevOps and data engineers quickly understand who has access to what data and how.

DevOps and data engineers are often tasked with managing the security of the databases, data lakes or warehouses they operate. This usually involves setting permissions to enable users to query the data they need. However, as the number of users and use-cases increase, complexity explodes. It&amp;#039;s no longer humanly possible to remember who had access to what, how and why, which makes meeting security and compliance requirements impossible.]]>
            </summary>
            <updated>2025-08-29T07:05:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5489</id>
            <title type="text"><![CDATA[HackBrowserData]]></title>
            <link rel="alternate" href="https://github.com/moonD4rk/HackBrowserData" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5489"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Decrypt passwords/cookies/history/bookmarks from the browser.

HackBrowserData is a command-line tool for decrypting and exporting browser data ( passwords, history, cookies, bookmarks, credit cards, download records, localStorage and extension ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux.]]>
            </summary>
            <updated>2025-08-29T07:12:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5490</id>
            <title type="text"><![CDATA[Caido]]></title>
            <link rel="alternate" href="https://caido.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5490"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A lightweight web security auditing toolkit. Caido aims to help security professionals and enthusiasts audit web applications with efficiency and ease.

[Caido @ GitHub](https://github.com/caido).]]>
            </summary>
            <updated>2025-08-29T07:12:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5493</id>
            <title type="text"><![CDATA[Dogtag]]></title>
            <link rel="alternate" href="https://www.dogtagpki.org/wiki/PKI_Main_Page" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5493"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Dogtag Certificate System is an enterprise-class open source Certificate Authority (CA). It is a full-featured system, and has been hardened by real-world deployments. It supports all aspects of certificate lifecycle management, including key archival, OCSP and smartcard management, and much more. The Dogtag Certificate System can be downloaded for free and set up in less than an hour.]]>
            </summary>
            <updated>2025-08-29T07:12:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5494</id>
            <title type="text"><![CDATA[FreeIPA]]></title>
            <link rel="alternate" href="https://www.freeipa.org/page/Main_Page" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5494"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[FreeIPA is an integrated security information management solution combining Linux (Fedora), 389 Directory Server, MIT Kerberos, NTP, DNS, Dogtag (Certificate System). It consists of a web interface and command-line administration tools.

FreeIPA is an integrated Identity and Authentication solution for Linux/UNIX networked environments. A FreeIPA server provides centralized authentication, authorization and account information by storing data about user, groups, hosts and other objects necessary to manage the security aspects of a network of computers.]]>
            </summary>
            <updated>2025-08-29T07:12:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5498</id>
            <title type="text"><![CDATA[SLSA]]></title>
            <link rel="alternate" href="https://slsa.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5498"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Supply-chain Levels for Software Artifacts, or SLSA (&amp;quot;salsa&amp;quot;).

SLSA is a specification for describing and incrementally improving supply chain security, established by industry consensus. It is organized into a series of levels that describe increasing security guarantees.

It’s a security framework, a checklist of standards and controls to prevent tampering, improve integrity, and secure packages and infrastructure. It’s how you get from &amp;quot;safe enough&amp;quot; to being as resilient as possible, at any link in the chain.

- [SLSA @ GitHub](https://github.com/slsa-framework/slsa).

Related contents:

- [Securing the software supply chain with the SLSA framework @ Trail of Bits Blog](https://blog.trailofbits.com/2024/10/01/securing-the-software-supply-chain-with-the-slsa-framework/).
- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).
- [Kube-Policies BinauthZ: Closing the Supply Chain Gap in Kubernetes @ Block Engineering Blog](https://engineering.block.xyz/blog/kube-policies-binauthz-closing-the-supply-chain-gap-in-kubernetes).]]>
            </summary>
            <updated>2026-02-09T06:25:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5511</id>
            <title type="text"><![CDATA[Cryptomator]]></title>
            <link rel="alternate" href="https://cryptomator.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5511"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free Cloud Encryption for Dropbox &amp;amp; Co.

Cryptomator offers multi-platform transparent client-side encryption of your files in the cloud.

- [Cryptomator @ GitHub](https://github.com/cryptomator/cryptomator).
- [Cryptomator @ Flathub](https://flathub.org/apps/org.cryptomator.Cryptomator).

Related contents:

- [Episode 597: Cache My OS @ Linux Unplugged](https://linuxunplugged.com/597).
- [Episode \#517 consacré au livre : Les fondamentaux de la cybersécurité @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/les-fondamentaux-de-la-cybersecurite/).]]>
            </summary>
            <updated>2025-10-20T17:18:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5545</id>
            <title type="text"><![CDATA[Open Source Insights]]></title>
            <link rel="alternate" href="https://deps.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5545"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Open Source Insights page for each package shows the full dependency graph and updates it every day. The information provided can help you make informed decisions about using, building, and maintaining your software.

Related contents:

- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).]]>
            </summary>
            <updated>2025-08-29T07:21:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5566</id>
            <title type="text"><![CDATA[Authy]]></title>
            <link rel="alternate" href="https://authy.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5566"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Simple &amp;amp; secure two-factor authentication via mobile &amp;amp; desktop app that&amp;#039;s free to users. Authy&amp;#039;s 2FA API is by Twilio.]]>
            </summary>
            <updated>2025-08-29T07:25:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5573</id>
            <title type="text"><![CDATA[IPFire]]></title>
            <link rel="alternate" href="https://www.ipfire.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5573"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[IPFire is a dedicated firewall that can be installed in any network - from data center down to your home. It is secure, fast and very versatile. Besides from being a stateful inspection firewall it can work as a VPN gateway, analyze data packets with its Intrusion Prevention System (IPS), and comes with many Add-ons that extend its functionality further.]]>
            </summary>
            <updated>2025-08-29T07:26:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5598</id>
            <title type="text"><![CDATA[pwndrop]]></title>
            <link rel="alternate" href="https://github.com/kgretzky/pwndrop" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5598"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.

pwndrop is a self-deployable file hosting service for sending out red teaming payloads or securely sharing your private files over HTTP and WebDAV.]]>
            </summary>
            <updated>2025-08-29T07:30:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5600</id>
            <title type="text"><![CDATA[CodeQL]]></title>
            <link rel="alternate" href="https://codeql.github.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5600"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Discover vulnerabilities across a codebase with CodeQL, our industry-leading semantic code analysis engine. CodeQL lets you query code as though it were data. Write a query to find all variants of a vulnerability, eradicating it forever. Then share your query to help others do the same. 

- [CodeQL @ GitHub](https://github.com/github/codeql).
- [Finding Bugs in Chrome with CodeQL @ Google Bug Hunters](https://bughunters.google.com/blog/5085111480877056/finding-bugs-in-chrome-with-codeql).]]>
            </summary>
            <updated>2025-08-29T07:30:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5603</id>
            <title type="text"><![CDATA[Untitled Goose Tool]]></title>
            <link rel="alternate" href="https://github.com/cisagov/untitledgoosetool" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5603"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments. Untitled Goose Tool gathers additional telemetry from Microsoft Defender for Endpoint (MDE) and Defender for Internet of Things (IoT) (D4IoT).]]>
            </summary>
            <updated>2025-08-29T07:32:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5615</id>
            <title type="text"><![CDATA[ZoneMinder]]></title>
            <link rel="alternate" href="https://zoneminder.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5615"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A full-featured, open source, state-of-the-art video surveillance software system.

Monitor your home, office, or wherever you want. Using off the shelf hardware with any camera, you can design a system as large or as small as you need.

[ZoneMinder @ GitHub](https://github.com/ZoneMinder/ZoneMinder/)]]>
            </summary>
            <updated>2026-02-06T14:34:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5619</id>
            <title type="text"><![CDATA[Content-Security-Policy Header]]></title>
            <link rel="alternate" href="https://content-security-policy.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5619"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Content Security Policy Reference.

The new Content-Security-Policy HTTP response header helps you reduce XSS risks on modern browsers by declaring which dynamic resources are allowed to load.]]>
            </summary>
            <updated>2025-08-29T07:33:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5630</id>
            <title type="text"><![CDATA[kali-automation-install:]]></title>
            <link rel="alternate" href="https://github.com/sKillseries/kali-automation-install" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5630"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Script permettant de créer automatiquement une VM Kali VirtualBox ou VMware avec l&amp;#039;installation de tous les outils nécessaires de pentest.

L&amp;#039;outil kali-automation-install est un projet qui a pour vocation d&amp;#039;aider les pentester à créer de façon automatique des VM Kali Linux avec tous les outils nécessaires à la réalisation de la mission confiés. C&amp;#039;est une vitrine de mes compétences acquises dans le monde opérationnel en tant qu&amp;#039;Administrateur/Ingénieur Système Réseaux et Sécurité avec des compétences dite DevOps pour le monde offensive cyber dans lequel je m&amp;#039;oriente.]]>
            </summary>
            <updated>2025-08-29T07:36:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5633</id>
            <title type="text"><![CDATA[Socket]]></title>
            <link rel="alternate" href="https://socket.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5633"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure your supply chain. Ship with confidence.
Socket fights vulnerabilities and provides visibility, defense-in-depth, and proactive supply chain protection for JavaScript and Python dependencies.

-  [Socket @ GitHub](https://github.com/SocketDev).

Related contents:

- [Introducing Socket Firewall: Free, Proactive Protection for Your Software Supply Chain @ Socket](https://socket.dev/blog/introducing-socket-firewall).
- [\#121 - Les news Web Dev d’octobre 2025. Adonis, Laravel, React Compiler, Vite+ et bien plus encore ! @ Double Slash :fr:](https://double-slash.dev/podcasts/news-oct25/).]]>
            </summary>
            <updated>2025-10-16T06:36:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5634</id>
            <title type="text"><![CDATA[Cyber Citizen]]></title>
            <link rel="alternate" href="https://cyber-citizen.eu/en/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5634"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Cyber Citizen initiative will produce a model for cybersecurity learning and a learning portal based on that model. The learning portal will have content for all citizens, and this content, such as a cyber citizen skills learning game, will take into account different target groups. Citizens’ abilities to act in a safe and secure manner in the digital world are improved with educational and communicative elements in the learning portal.]]>
            </summary>
            <updated>2025-08-29T07:36:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5638</id>
            <title type="text"><![CDATA[trackerjacker]]></title>
            <link rel="alternate" href="https://github.com/calebmadrigal/trackerjacker" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5638"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Like nmap for mapping wifi networks you&amp;#039;re not connected to. Maps and tracks wifi networks and devices through raw 802.11 monitoring.]]>
            </summary>
            <updated>2025-08-29T07:36:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5671</id>
            <title type="text"><![CDATA[Camerci]]></title>
            <link rel="alternate" href="https://camerci.fr/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5671"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Récupérer les vidéos de caméras de surveillance qui vous sont de droit.

&amp;quot;Toute personne intéressée peut s&amp;#039;adresser au responsable d&amp;#039;un système de vidéoprotection afin d&amp;#039;obtenir un accès aux enregistrements qui la concernent […]. Cet accès est de droit.&amp;quot;

Pour remercier les autorités de vous filmer, vous avez le droit de demander une copie de la vidéo où vous apparaissez. Ce site facilite l&amp;#039;exercice du droit d&amp;#039;accès !]]>
            </summary>
            <updated>2025-08-29T07:42:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5685</id>
            <title type="text"><![CDATA[waf-bypass]]></title>
            <link rel="alternate" href="https://github.com/nemesida-waf/waf-bypass" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5685"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Check your WAF before an attacker does this one.

WAF bypass Tool is an open source tool to analyze the security of any WAF for False Positives and False Negatives using predefined and customizable payloads. Check your WAF before an attacker does. WAF Bypass Tool is developed by Nemesida WAF team with the participation of community.]]>
            </summary>
            <updated>2025-08-29T07:44:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5698</id>
            <title type="text"><![CDATA[Infection Monkey]]></title>
            <link rel="alternate" href="https://www.akamai.com/infectionmonkey#free-download" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5698"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Infection Monkey graphic blue background
Simulate, Validate, and Mitigate with the Infection Monkey

Continuously test your network security and use the insights to make informed security decisions based on real data, not speculations.]]>
            </summary>
            <updated>2025-08-29T07:46:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5720</id>
            <title type="text"><![CDATA[Decider]]></title>
            <link rel="alternate" href="https://github.com/cisagov/Decider/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5720"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A web application that assists network defenders, analysts, and researcher in the process of mapping adversary behaviors to the MITRE ATT&amp;amp;CK® framework.]]>
            </summary>
            <updated>2025-08-29T07:50:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5732</id>
            <title type="text"><![CDATA[Teleport]]></title>
            <link rel="alternate" href="https://goteleport.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5732"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Identity-Native Infrastructure Access. Faster. More Secure.

Teleport replaces the #1 source of data breaches — secrets — with true identity to deliver phishing-proof zero trust access for every engineer and service connected to your global infrastructure.

Teleport is the easiest, most secure way to access all your infrastructure. Teleport is an identity-aware, multi-protocol access proxy which understands SSH, HTTPS, RDP, Kubernetes API, MySQL, MongoDB and PostgreSQL wire protocols.

- [Teleport @ GitHub](https://github.com/gravitational/teleport).

Related contents:

- [Sécuriser l&amp;#039;accès à vos serveurs avec Teleport @ DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/acces/teleport/).]]>
            </summary>
            <updated>2025-08-29T07:52:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5745</id>
            <title type="text"><![CDATA[banhammer]]></title>
            <link rel="alternate" href="https://github.com/mchev/banhammer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5745"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Banhammer for Laravel offers a very simple way to ban any Model by ID and by IP. It also allows to block requests by IP addresses.]]>
            </summary>
            <updated>2025-08-29T07:54:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5746</id>
            <title type="text"><![CDATA[IT Army of Ukraine Official Tool]]></title>
            <link rel="alternate" href="https://github.com/porthole-ascend-cinnamon/mhddos_proxy_releases" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5746"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[* Own proxy database creates the attack from the whole world, which makes it much more difficult to protect against
* Efficient on a large number of targets simultaneously
* A variety of different methods, both &amp;quot;classic&amp;quot; and proprietary ones
* Frequent automatic updates without user intervention]]>
            </summary>
            <updated>2025-08-29T07:54:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5747</id>
            <title type="text"><![CDATA[Death by 1000 needles]]></title>
            <link rel="alternate" href="https://github.com/Arriven/db1000n" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5747"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This is a simple distributed load generation tool written in Go. It is able to fetch a simple JSON config from a local or remote location. The config describes which load generation jobs should be launched in parallel. There are other existing tools doing the same kind of job. I do not intend to copy or replace them but rather provide a simple open source alternative so that users have more options. Feel free to use it in your load tests (wink-wink).]]>
            </summary>
            <updated>2025-08-29T07:56:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5748</id>
            <title type="text"><![CDATA[Distress]]></title>
            <link rel="alternate" href="https://github.com/Yneth/distress-releases" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5748"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[releases of pen-testing tool called &amp;#039;distress&amp;#039; written in rust. Features:

* automatic target updates from ITArmy UA
* uses proxies by default
* supports usage of tor exit nodes (refer to use-tor flag)
* low cpu utilization
* advanced attacks]]>
            </summary>
            <updated>2025-08-29T07:56:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5778</id>
            <title type="text"><![CDATA[Traefik Forward Auth]]></title>
            <link rel="alternate" href="https://github.com/thomseddon/traefik-forward-auth" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5778"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Minimal forward authentication service that provides Google/OpenID oauth based login and authentication for the traefik reverse proxy.

A minimal forward authentication service that provides OAuth/SSO login and authentication for the traefik reverse proxy/load balancer.]]>
            </summary>
            <updated>2025-08-29T08:00:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5787</id>
            <title type="text"><![CDATA[Red Flag Domains]]></title>
            <link rel="alternate" href="https://red.flag.domains/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5787"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Red Flag Domains are lists of very recently registered probably malicious domain names in french TLDs. Data are published for security purposes only, and can be used to feed an automatic filtering solution like proxy. More details here.]]>
            </summary>
            <updated>2025-08-29T08:01:36+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5789</id>
            <title type="text"><![CDATA[age]]></title>
            <link rel="alternate" href="https://github.com/FiloSottile/age" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5789"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.

age is a simple, modern and secure file encryption tool, format, and Go library. It features small explicit keys, no config options, and UNIX-style composability.]]>
            </summary>
            <updated>2025-08-29T08:01:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5823</id>
            <title type="text"><![CDATA[YATAS]]></title>
            <link rel="alternate" href="https://github.com/padok-team/yatas" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5823"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Yet Another Testing &amp;amp; Auditing Solution

A simple tool to audit your AWS infrastructure for misconfiguration or potential security issues with plugins integration.

The goal of YATAS is to help you create a secure AWS environment without too much hassle. It won&amp;#039;t check for all best practices but only for the ones that are important for you based on my experience. Please feel free to tell me if you find something that is not covered.]]>
            </summary>
            <updated>2025-08-29T08:08:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5836</id>
            <title type="text"><![CDATA[Cowrie SSH/Telnet Honeypot]]></title>
            <link rel="alternate" href="https://github.com/cowrie/cowrie" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5836"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cowrie is a medium to high interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. In medium interaction mode (shell) it emulates a UNIX system in Python, in high interaction mode (proxy) it functions as an SSH and telnet proxy to observe attacker behavior to another system.]]>
            </summary>
            <updated>2025-08-29T08:09:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5837</id>
            <title type="text"><![CDATA[Hacking Articles- Cyber Mindmap]]></title>
            <link rel="alternate" href="https://github.com/Ignitetechnologies/Mindmap" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5837"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them.]]>
            </summary>
            <updated>2025-08-29T08:09:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5855</id>
            <title type="text"><![CDATA[OpenZiti]]></title>
            <link rel="alternate" href="https://docs.openziti.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5855"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenZiti is a free and open source project focused on bringing zero trust networking principles directly into any application. The project provides all the pieces required to implement a zero trust overlay network and provides all the tools necessary to integrate zero trust into your existing solutions. The OpenZiti project believes the principles of zero trust shouldn&amp;#039;t stop at your network, those ideas belong in your application.

[OpenZiti @ GitHub](https://github.com/openziti/ziti)]]>
            </summary>
            <updated>2025-08-29T08:12:36+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5859</id>
            <title type="text"><![CDATA[zrok]]></title>
            <link rel="alternate" href="https://zrok.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5859"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An open source sharing solution built on OpenZiti, the zero trust networking platform. Available as SaaS or self-hosted.

zrok is a next-generation sharing platform built on top of OpenZiti, a programmable zero-trust network overlay. zrok is a Ziti Native Application. zrok facilitates sharing resources both publicly and privately, exposing them to an audience you can easily control.

- [zrok @ GitHub](https://github.com/openziti/zrok).]]>
            </summary>
            <updated>2025-08-29T08:13:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5866</id>
            <title type="text"><![CDATA[Machinae Security Intelligence Collector]]></title>
            <link rel="alternate" href="https://github.com/HurricaneLabs/machinae" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5866"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Machinae is a tool for collecting intelligence from public sites/feeds about various security-related pieces of data: IP addresses, domain names, URLs, email addresses, file hashes and SSL fingerprints. It was inspired by Automater, another excellent tool for collecting information. The Machinae project was born from wishing to improve Automater in 4 areas:]]>
            </summary>
            <updated>2025-08-29T08:14:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5867</id>
            <title type="text"><![CDATA[ThreatIngestor]]></title>
            <link rel="alternate" href="https://github.com/InQuest/ThreatIngestor" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5867"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Extract and aggregate threat intelligence. An extendable tool to extract and aggregate IOCs from threat feeds.

ThreatIngestor can be configured to watch Twitter, RSS feeds, or other sources, extract meaningful information such as malicious IPs/domains and YARA signatures, and send that information to another system for analysis.]]>
            </summary>
            <updated>2025-08-29T08:14:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5868</id>
            <title type="text"><![CDATA[MSTIC Jupyter and Python Security Tools]]></title>
            <link rel="alternate" href="https://github.com/microsoft/msticpy" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5868"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Microsoft Threat Intelligence Python Security Tools. msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks.]]>
            </summary>
            <updated>2025-08-29T08:16:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5869</id>
            <title type="text"><![CDATA[RITA - Real Intelligence Threat Analytics]]></title>
            <link rel="alternate" href="https://www.activecountermeasures.com/free-tools/rita/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5869"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Real Intelligence Threat Analytics (R-I-T-A) is an open-source framework for detecting command and control communication through network traffic analysis. The RITA framework ingests Zeek logs or PCAPs converted to Zeek logs for analysis.

[RITA @ GitHub](https://github.com/activecm/rita).]]>
            </summary>
            <updated>2025-08-29T08:16:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5902</id>
            <title type="text"><![CDATA[Nostr.how]]></title>
            <link rel="alternate" href="https://nostr.how/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5902"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A complete guide to Nostr.

The simplest open protocol that is able to create a censorship-resistant global &amp;quot;social&amp;quot; network once and for all. A social network for the decentralized era. A simple, open protocol that enables a truly censorship-resistant &amp;amp; global social network.

[Nostr @ GitHub](https://github.com/nostr-protocol/nostr).]]>
            </summary>
            <updated>2025-08-29T08:20:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5909</id>
            <title type="text"><![CDATA[Cryptboard.io]]></title>
            <link rel="alternate" href="https://github.com/MihanEntalpo/cryptboard.io" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5909"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Web clipboard and simple messanger with end-to-end RSA+AES encryption.
Cryptboard.io allows to send text messages and files between multiple devices.]]>
            </summary>
            <updated>2025-08-29T08:21:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5915</id>
            <title type="text"><![CDATA[Volatility Framework]]></title>
            <link rel="alternate" href="https://github.com/volatilityfoundation/volatility" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5915"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Volatile memory extraction utility framework - An advanced memory forensics framework.

The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the
system being investigated but offer visibilty into the runtime state of the system.]]>
            </summary>
            <updated>2025-08-29T08:22:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5916</id>
            <title type="text"><![CDATA[Atomic Red Team]]></title>
            <link rel="alternate" href="https://atomicredteam.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5916"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Atomic Red Team™ is a library of tests mapped to the MITRE ATT&amp;amp;CK® framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments.

[Atomic Red Team @ GitHub](https://github.com/redcanaryco/atomic-red-team).]]>
            </summary>
            <updated>2025-08-29T08:22:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5917</id>
            <title type="text"><![CDATA[Digital Forensics Artifact Repository]]></title>
            <link rel="alternate" href="https://github.com/ForensicArtifacts/artifacts" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5917"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A free, community-sourced, machine-readable knowledge base of digital forensic artifacts that the world can use both as an information source and within other tools.

If you&amp;#039;d like to use the artifacts in your own tools, all you need to be able to do is read YAML. That is it, no other dependencies. The Python code in this project is just used to validate all the artifacts to make sure they follow the specification.]]>
            </summary>
            <updated>2025-08-29T08:24:36+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5918</id>
            <title type="text"><![CDATA[FIR: Fast Incident Response]]></title>
            <link rel="alternate" href="https://github.com/certsocietegenerale/FIR/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5918"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[FIR (Fast Incident Response) is an cybersecurity incident management platform designed with agility and speed in mind. It allows for easy creation, tracking, and reporting of cybersecurity incidents.

FIR is for anyone needing to track cybersecurity incidents (CSIRTs, CERTs, SOCs, etc.). It was tailored to suit our needs and our team&amp;#039;s habits, but we put a great deal of effort into making it as generic as possible before releasing it so that other teams around the world may also use it and customize it as they see fit.]]>
            </summary>
            <updated>2025-08-29T08:24:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5919</id>
            <title type="text"><![CDATA[StreamAlert]]></title>
            <link rel="alternate" href="https://streamalert.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5919"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[StreamAlert is a serverless, real-time data analysis framework which empowers you to ingest, analyze, and alert on data from any environment, using data sources and alerting logic you define. Computer security teams use StreamAlert to scan terabytes of log data every day for incident detection and response.

[StreamAlert @ GitHub](https://github.com/airbnb/streamalert)]]>
            </summary>
            <updated>2025-08-29T08:24:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5932</id>
            <title type="text"><![CDATA[Octopii]]></title>
            <link rel="alternate" href="https://github.com/redhuntlabs/octopii" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5932"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An AI-powered Personal Identifiable Information (PII) scanner..
Octopii is an open-source AI-powered Personal Identifiable Information (PII) scanner that can look for image assets such as Government IDs, passports, photos and signatures in a directory.]]>
            </summary>
            <updated>2025-08-29T08:25:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5940</id>
            <title type="text"><![CDATA[KeePwn]]></title>
            <link rel="alternate" href="https://github.com/Orange-Cyberdefense/KeePwn" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5940"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A python script to help red teamers discover KeePass instances and extract secrets.]]>
            </summary>
            <updated>2025-08-29T08:26:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5950</id>
            <title type="text"><![CDATA[Hack The Box]]></title>
            <link rel="alternate" href="https://www.hackthebox.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5950"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Hacking Training For The Best | Individuals &amp;amp; Companies. A Massive Hacking Playground.

Join a dynamically growing hacking community and take your cybersecurity skills to the next level through the most captivating, gamified, hands-on training experience!]]>
            </summary>
            <updated>2025-08-29T08:28:41+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5954</id>
            <title type="text"><![CDATA[Firefox Decrypt]]></title>
            <link rel="alternate" href="https://github.com/unode/firefox_decrypt" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5954"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Firefox Decrypt is a tool to extract passwords from profiles of Mozilla (Fire/Water)fox™, Thunderbird®, SeaMonkey® and derivates.

It can be used to recover passwords from a profile protected by a Master Password as long as the latter is known. If a profile is not protected by a Master Password, passwords are displayed without prompt.]]>
            </summary>
            <updated>2025-08-29T08:29:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5965</id>
            <title type="text"><![CDATA[OSS-Fuzz]]></title>
            <link rel="alternate" href="https://github.com/google/oss-fuzz" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5965"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[continuous fuzzing for open source software.
Fuzz testing is a well-known technique for uncovering programming errors in software. Many of these detectable errors, like buffer overflow, can have serious security implications. Google has found thousands of security vulnerabilities and stability bugs by deploying guided in-process fuzzing of Chrome components, and we now want to share that service with the open source community.]]>
            </summary>
            <updated>2025-08-29T08:32:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5966</id>
            <title type="text"><![CDATA[fuzzing]]></title>
            <link rel="alternate" href="https://github.com/google/fuzzing" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5966"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This project aims at hosting tutorials, examples, discussions, research proposals, and other resources related to fuzzing.

Fuzz testing is a well-known technique for uncovering programming errors in software. Many of these detectable errors, like buffer overflow, can have serious security implications. Google has found thousands of security vulnerabilities and stability bugs by deploying guided in-process fuzzing of Chrome components, and we now want to share that service with the open source community.]]>
            </summary>
            <updated>2025-08-29T08:32:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5993</id>
            <title type="text"><![CDATA[OpenVEX Specification]]></title>
            <link rel="alternate" href="https://github.com/openvex/spec" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5993"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenVEX is an implementation of the Vulnerability Exploitability Exchange (VEX for short) that is designed to be minimal, compliant, interoperable, and embeddable. The specification is available in the OPENVEX-SPEC.md file of this repository.]]>
            </summary>
            <updated>2025-08-29T08:36:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6004</id>
            <title type="text"><![CDATA[The Hacker Tools]]></title>
            <link rel="alternate" href="https://tools.thehacker.recipes/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6004"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This project is aimed at providing technical guides on various hacking tools.
Keep in mind that these guides are maintained by non-omniscient security enthusiasts in their spare time. You will probably find things missing or mistakes.

[The Hacker Tools @ GitHub](https://github.com/ShutdownRepo/The-Hacker-Tools)]]>
            </summary>
            <updated>2025-08-29T08:37:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6005</id>
            <title type="text"><![CDATA[The Hacker Recipes]]></title>
            <link rel="alternate" href="https://www.thehacker.recipes/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6005"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This project is aimed at providing technical guides on various hacking topics.

[The Hacker Recipes @ GitHub](https://github.com/ShutdownRepo/The-Hacker-Recipes).]]>
            </summary>
            <updated>2025-08-29T08:37:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6006</id>
            <title type="text"><![CDATA[OWASP Cheat Sheet Series]]></title>
            <link rel="alternate" href="https://cheatsheetseries.owasp.org/index.html" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6006"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics.

[OWASP Cheat Sheet Series @ GitHub](https://github.com/OWASP/CheatSheetSeries).]]>
            </summary>
            <updated>2025-08-29T08:37:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6011</id>
            <title type="text"><![CDATA[p0wny@shell:~#]]></title>
            <link rel="alternate" href="https://github.com/flozz/p0wny-shell" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6011"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Single-file PHP shell.
p0wny@shell:~# is a very basic, single-file, PHP shell. It can be used to quickly execute commands on a server when pentesting a PHP application. Use it with caution: this script represents a security risk for the server.]]>
            </summary>
            <updated>2025-08-29T08:38:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6034</id>
            <title type="text"><![CDATA[Own Your Data]]></title>
            <link rel="alternate" href="https://yourdigitalrights.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6034"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Get organizations to delete your account or provide a copy of your personal information.
Many organizations collect and sell your personal data, often without your consent. Use this free service to send them a data deletion or access request.]]>
            </summary>
            <updated>2025-08-29T08:42:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6035</id>
            <title type="text"><![CDATA[Legitify]]></title>
            <link rel="alternate" href="https://github.com/Legit-Labs/legitify" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6035"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Strengthen the security posture of your source-code management!
Detect and remediate misconfigurations, security and compliance issues across all your GitHub and GitLab assets with ease.]]>
            </summary>
            <updated>2025-08-29T08:42:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6036</id>
            <title type="text"><![CDATA[DFIR4vSphere]]></title>
            <link rel="alternate" href="https://github.com/ANSSI-FR/DFIR4vSphere" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6036"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Powershell module for VMWare vSphere forensics.
The DFIR4vSphere PowerShell module collects logs and forensics artefacts on both ESXi hosts and the vCenter console.]]>
            </summary>
            <updated>2025-08-29T08:42:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6055</id>
            <title type="text"><![CDATA[Nginx Proxy Manager]]></title>
            <link rel="alternate" href="https://nginxproxymanager.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6055"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Expose your services easily and securely.

This project comes as a pre-built docker image that enables you to easily forward to your websites running at home or otherwise, including free SSL, without having to know too much about Nginx or Letsencrypt.

- [Nginx Proxy Manager @ GitHub](https://github.com/NginxProxyManager/nginx-proxy-manager).

Related contents:

- [NPM Mobile Manager @ GitHub](https://github.com/kmanan/npm-mobile).
- [HomeLab SSL certificates for FREE with minimal effort @ Perkelator&amp;#039;s YouTube](https://www.youtube.com/watch?v=sRI4Xhyedw4).
- [Self-Hosted SSL Simplified: Nginx Proxy Manager @ Lawrence Systems&amp;#039; YouTube](https://www.youtube.com/watch?v=jx6T6lqX-QM).
- [The First Services I Always Spin Up in Any Home Lab @ VirtualizationHowto](https://www.youtube.com/watch?v=WocNYt7PprM).
- [Nginx Proxy Manager - Le reverse proxy que même ma grand-mère pourrait configurer @ Korben :fr:](https://korben.info/nginx-proxy-manager-guide-tuto.html).]]>
            </summary>
            <updated>2026-02-09T08:52:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6096</id>
            <title type="text"><![CDATA[osv-detector]]></title>
            <link rel="alternate" href="https://github.com/G-Rath/osv-detector" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6096"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An auditing tool for detecting vulnerabilities, powered by advisory databases that follow the OSV specification.]]>
            </summary>
            <updated>2025-08-29T08:53:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6107</id>
            <title type="text"><![CDATA[MySafeIp]]></title>
            <link rel="alternate" href="https://github.com/yvguim/mysafeip" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6107"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[MySafeIp is a web app acting as a trusted IP source for firewalls.
With it, I don&amp;#039;t have to open my own services (Nextcloud, bitwarden, etc...) worldwilde. Just me, my family and friends can use those services easily. Family and friends don&amp;#039;t even need an account to mysafeip with instant link feature.]]>
            </summary>
            <updated>2025-08-29T08:54:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6142</id>
            <title type="text"><![CDATA[Security List 🔐]]></title>
            <link rel="alternate" href="https://security-list.js.org/#/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6142"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Curated lists of tools, tips and resources for protecting digital security and privacy]]>
            </summary>
            <updated>2025-08-29T09:00:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6183</id>
            <title type="text"><![CDATA[Bettercap]]></title>
            <link rel="alternate" href="https://github.com/bettercap/bettercap" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6183"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.]]>
            </summary>
            <updated>2025-08-29T09:08:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6221</id>
            <title type="text"><![CDATA[Splunk]]></title>
            <link rel="alternate" href="https://www.splunk.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6221"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Data Platform for the Hybrid World.
The Unifier Security and Observability Platform.
A data platform built for expansive data access, powerful analytics and automation]]>
            </summary>
            <updated>2025-08-29T09:14:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6258</id>
            <title type="text"><![CDATA[VeraCrypt]]></title>
            <link rel="alternate" href="https://www.veracrypt.fr/en/Home.html" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6258"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free Open source disk encryption with strong security for the Paranoid.
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.]]>
            </summary>
            <updated>2025-08-29T09:21:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6276</id>
            <title type="text"><![CDATA[PacketFence]]></title>
            <link rel="alternate" href="https://www.packetfence.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6276"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Source NAC.

PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) solution. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired, wireless and VPN management, industry-leading BYOD capabilities, 802.1X and RBAC support, integrated network anomaly detection with layer-2 isolation of problematic devices; PacketFence can be used to effectively secure small to very large heterogeneous networks.

- [PacketFence @ GitHub](https://github.com/inverse-inc/packetfence).]]>
            </summary>
            <updated>2025-08-29T09:23:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6292</id>
            <title type="text"><![CDATA[OSV]]></title>
            <link rel="alternate" href="https://osv.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6292"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A distributed vulnerability database for Open Source.
An open, precise, and distributed approach to producing and consuming vulnerability information for open source. 

- [OSV @ GitHub](https://github.com/google/osv.dev).
- [OSV-Scanner @ GitHub](https://github.com/google/osv-scanner/).

Related contents:

- [Episode \#497: sécurisation de la chaîne d’approvisionnement logicielle (software supply chain) @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).
- [Episode \#499 consacré aux référentiels de vulnérabilités @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/referentiels-de-vulnerabilites/).
- [Blueprinting Security in CI/CD: Building Trust Through Open Source @ CD Foundation](https://cd.foundation/blog/2026/02/06/blueprinting-security/).]]>
            </summary>
            <updated>2026-02-18T13:12:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6293</id>
            <title type="text"><![CDATA[OSV-Scanner]]></title>
            <link rel="alternate" href="https://github.com/google/osv-scanner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6293"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Vulnerability scanner written in Go which uses the data provided by https://osv.dev.
Use OSV-Scanner to find existing vulnerabilities affecting your project&amp;#039;s dependencies.
OSV-Scanner provides an officially supported frontend to the OSV database that connects a project’s list of dependencies with the vulnerabilities that affect them.]]>
            </summary>
            <updated>2025-08-29T09:26:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6323</id>
            <title type="text"><![CDATA[stack.watch]]></title>
            <link rel="alternate" href="https://stack.watch/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6323"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Weekly Security Vulnerability Emails.
Follow Security Vulnerabilities in your software stack.
Every month about 2,000 vulnerabilities are published, but how many of those are important to you?
Use StackWatch to create a software stack (a list of software you use), then get a weekly email with security vulnerabilities that have been published for software within your stack.]]>
            </summary>
            <updated>2025-08-29T09:31:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6330</id>
            <title type="text"><![CDATA[Ballyregan]]></title>
            <link rel="alternate" href="https://github.com/idandaniel/ballyregan" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6330"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Ballyregan is a package &amp;amp; CLI that allows you to fetch free tested proxies really fast!]]>
            </summary>
            <updated>2025-08-29T09:33:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6342</id>
            <title type="text"><![CDATA[Parsec cloud]]></title>
            <link rel="alternate" href="https://parsec.cloud/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6342"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open source Dropbox-like file sharing with full client encryption !
Parsec allows you to easily share your work and data in the cloud in total privacy thanks to end-to-end cryptographic security.

- [Parsec cloud @ GitHub](https://github.com/Scille/parsec-cloud).]]>
            </summary>
            <updated>2025-09-09T12:36:00+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6365</id>
            <title type="text"><![CDATA[is-website-vulnerable]]></title>
            <link rel="alternate" href="https://github.com/lirantal/is-website-vulnerable" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6365"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[finds publicly known security vulnerabilities in a website&amp;#039;s frontend JavaScript libraries]]>
            </summary>
            <updated>2025-08-29T09:38:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6404</id>
            <title type="text"><![CDATA[Trivy]]></title>
            <link rel="alternate" href="https://trivy.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6404"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Trivy (pronunciation) is a comprehensive and versatile security scanner. Trivy has scanners that look for security issues, and targets where it can find those issues.

Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more.

- [Trivy @ GitHub](https://github.com/aquasecurity/trivy).
- [Trivy Documentation](https://aquasecurity.github.io/trivy/).
- [Integrer la sécurité dés le départ avec Trivy @ Culture et Outils DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser-projets-trivy/).
- [Trivy Is Noise by Default, Here’s the Seven-Rule Filter That Catches Real Risk @ DevOpsDynamo&amp;#039;s Medium](https://medium.com/@DynamoDevOps/trivy-is-noise-by-default-heres-the-seven-rule-filter-that-catches-real-risk-05c4c3249c26).
- [Blueprinting Security in CI/CD: Building Trust Through Open Source @ CD Foundation](https://cd.foundation/blog/2026/02/06/blueprinting-security/).
- [20 Days Later: Trivy Compromise, Act II @ Boost Security Labs](https://labs.boostsecurity.io/articles/20-days-later-trivy-compromise-act-ii/).
- [Trivy supply chain compromise: What Docker Hub users should know @ Docker blog](https://www.docker.com/blog/trivy-supply-chain-compromise-what-docker-hub-users-should-know/).
- [Trivy compromis une seconde fois : la release v0.69.4 était empoisonnée @ DevSecOps :fr:](https://blog.stephane-robert.info/post/trivy-actii/).]]>
            </summary>
            <updated>2026-03-30T20:23:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6419</id>
            <title type="text"><![CDATA[Intruder]]></title>
            <link rel="alternate" href="https://www.intruder.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6419"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An Effortless Vulnerability Scanner.
Find your weaknesses, before the hackers do.
Intruder is an online vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.]]>
            </summary>
            <updated>2025-08-29T09:47:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6428</id>
            <title type="text"><![CDATA[Mend Bolt]]></title>
            <link rel="alternate" href="https://www.mend.io/free-developer-tools/bolt/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6428"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Find &amp;amp; Fix Open Source vulnerabilities.
Get real-time security alerts and compliance issues
on your open source dependencies
within Azure DevOps or GitHub.]]>
            </summary>
            <updated>2025-08-29T09:49:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6441</id>
            <title type="text"><![CDATA[Ghidra]]></title>
            <link rel="alternate" href="https://github.com/NationalSecurityAgency/ghidra" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6441"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A software reverse engineering (SRE) suite of tools developed by NSA&amp;#039;s Research Directorate in support of the Cybersecurity mission

- [Ghidra @ GitHub](https://github.com/NationalSecurityAgency/ghidra/).

Related contents:

- [La NSA met à jour son framework de reverse engineering ! @ Antonin HILY&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/antoninhily_ghidra-malware-reverse-activity-7293518402537545728-VnwQ/).
- [Resurrecting Crimsonland @ banteg](https://banteg.xyz/posts/crimsonland/).
- [We hid backdoors in binaries — Opus 4.6 found 49% of them @ Quesma](https://quesma.com/blog/introducing-binaryaudit/).]]>
            </summary>
            <updated>2026-02-16T06:21:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6459</id>
            <title type="text"><![CDATA[Kubescape]]></title>
            <link rel="alternate" href="https://github.com/kubescape/kubescape" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6459"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Kubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
Kubescape scans K8s clusters, YAML files, and HELM charts, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA, MITRE ATT&amp;amp;CK®), software vulnerabilities, and RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline, calculates risk score instantly and shows risk trends over time.]]>
            </summary>
            <updated>2025-08-29T09:53:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6469</id>
            <title type="text"><![CDATA[cert-manager]]></title>
            <link rel="alternate" href="https://cert-manager.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6469"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cloud native certificate management. X.509 certificate management for Kubernetes and OpenShift.

cert-manager creates TLS certificates for workloads in your Kubernetes or OpenShift cluster and renews the certificates before they expire.

- [cert-manager @ GitHub](https://github.com/cert-manager/cert-manager).

Related contents:

- [(Almost) Every infrastructure decision I endorse or regret after 4 years running infrastructure at a startup @ Jack&amp;#039;s home on the web](https://cep.dev/posts/every-infrastructure-decision-i-endorse-or-regret-after-4-years-running-infrastructure-at-a-startup/).
- [Mise en place d&amp;#039;un reverse proxy avec traefik, cert-manager et ovh sur kubernetes @ Wiki-Rotthier](https://wiki.rotthier.fr/Conteneurisation/Kubernetes/Traefik-Cert-Manager-Ovh).]]>
            </summary>
            <updated>2026-01-05T07:33:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6473</id>
            <title type="text"><![CDATA[Guide to Web Authentication]]></title>
            <link rel="alternate" href="https://webauthn.guide/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6473"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A better alternative for securing our sensitive information online.

The Web Authentication API (also known as WebAuthn) is a specification written by the W3C and FIDO, with the participation of Google, Mozilla, Microsoft, Yubico, and others. The API allows servers to register and authenticate users using public key cryptography instead of a password.]]>
            </summary>
            <updated>2025-08-29T09:57:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6538</id>
            <title type="text"><![CDATA[Keycloak]]></title>
            <link rel="alternate" href="https://github.com/keycloak/keycloak" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6538"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Keycloak is an Open Source Identity and Access Management solution for modern Applications and Services.]]>
            </summary>
            <updated>2025-08-29T10:06:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6540</id>
            <title type="text"><![CDATA[Stowaway -- Multi-hop Proxy Tool for pentesters]]></title>
            <link rel="alternate" href="https://github.com/ph4ntonn/Stowaway" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6540"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Stowaway is a Multi-hop proxy tool for security researchers and pentesters

Users can easily proxy their network traffic to intranet nodes (multi-layer),break the restrction and manipulate all the nodes that under your control XD]]>
            </summary>
            <updated>2025-08-29T10:07:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6551</id>
            <title type="text"><![CDATA[Portmaster]]></title>
            <link rel="alternate" href="https://github.com/safing/portmaster" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6551"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🏔 Love Freedom - ❌ Block Mass Surveillance.
Portmaster is a free and open-source application firewall that does the heavy lifting for you. Restore privacy and take back control over all your computer&amp;#039;s network activity.]]>
            </summary>
            <updated>2025-12-04T06:53:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6552</id>
            <title type="text"><![CDATA[Center for Threat-Informed Defense - CTID]]></title>
            <link rel="alternate" href="https://ctid.mitre-engenuity.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6552"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Center for Threat-Informed Defense
Advancing the state of the art and state of the practice in threat-informed defense globally]]>
            </summary>
            <updated>2025-08-29T10:09:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6553</id>
            <title type="text"><![CDATA[MITRE ATT&amp;amp;CK®]]></title>
            <link rel="alternate" href="https://attack.mitre.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6553"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[MITRE ATT&amp;amp;CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&amp;amp;CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.]]>
            </summary>
            <updated>2025-08-29T10:09:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6554</id>
            <title type="text"><![CDATA[D3FEND™ Matrix]]></title>
            <link rel="alternate" href="https://d3fend.mitre.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6554"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A knowledge graph of cybersecurity countermeasures]]>
            </summary>
            <updated>2025-08-29T10:09:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6567</id>
            <title type="text"><![CDATA[AORT: All in One Recon Tool for Bug Bounty]]></title>
            <link rel="alternate" href="https://github.com/D3Ext/AORT" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6567"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This script allows you to do recognition around a domain name. 
AORT makes it possible to detect the sub-domains, the DNS, the possibility of a domain name transfer, the type of WAF in place (firewall application), the Whois information, the open ports, as well as various endpoints or mailboxes.]]>
            </summary>
            <updated>2025-08-29T10:11:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6568</id>
            <title type="text"><![CDATA[Burp Suite]]></title>
            <link rel="alternate" href="https://portswigger.net/burp" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6568"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Application Security Testing Software.
Free, lightweight web application security scanning for CI/CD.
manual tools to start web security testing.

Related contents:

- [Untangling Microsoft Graph&amp;#039;s $batch requests in Burp @ Katie Knowles](https://kknowl.es/posts/untangling-microsoft-batch/).]]>
            </summary>
            <updated>2026-03-05T12:23:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6569</id>
            <title type="text"><![CDATA[crlfuzz]]></title>
            <link rel="alternate" href="https://github.com/dwisiswant0/crlfuzz" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6569"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A fast tool to scan CRLF vulnerability written in Goc]]>
            </summary>
            <updated>2025-08-29T10:13:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6570</id>
            <title type="text"><![CDATA[XSRFProbe]]></title>
            <link rel="alternate" href="https://github.com/0xInfection/XSRFProbe" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6570"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.
XSRFProbe is an advanced Cross Site Request Forgery (CSRF/XSRF) Audit and Exploitation Toolkit. Equipped with a powerful crawling engine and numerous systematic checks, it is able to detect most cases of CSRF vulnerabilities, their related bypasses and futher generate (maliciously) exploitable proof of concepts with each found vulnerability. For more info on how XSRFProbe works, see XSRFProbe Internals on wiki.]]>
            </summary>
            <updated>2025-08-29T10:13:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6571</id>
            <title type="text"><![CDATA[XSStrike]]></title>
            <link rel="alternate" href="https://github.com/s0md3v/XSStrike" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6571"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Most advanced XSS scanner.
XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.]]>
            </summary>
            <updated>2025-08-29T10:13:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6572</id>
            <title type="text"><![CDATA[InQL]]></title>
            <link rel="alternate" href="https://github.com/doyensec/inql" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6572"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Burp Extension for GraphQL Security Testing.
A security testing tool to facilitate GraphQL technology security auditing efforts.]]>
            </summary>
            <updated>2025-08-29T10:13:36+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6584</id>
            <title type="text"><![CDATA[Bulletins de vulnérabilités informatiques publiés par Vigil@nce]]></title>
            <link rel="alternate" href="https://vigilance.fr/?langue=1" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6584"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Depuis 1999, l&amp;#039;équipe Vigil@nce veille les vulnérabilités publiques qui affectent votre parc informatique, puis propose des correctifs sécurité, une base et des outils pour y remédier.
Chaque personne du SOC choisit la liste des logiciels à surveiller. Dès que Vigil@nce publie une alerte pour l&amp;#039;un de ses logiciels, la personne reçoit un bulletin de vigilance, contenant une explication simple de la faille, ses correctifs et ses contre-mesures.]]>
            </summary>
            <updated>2025-08-29T10:14:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6647</id>
            <title type="text"><![CDATA[OSINT-FR]]></title>
            <link rel="alternate" href="https://osintfr.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6647"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OSINT Community Open Source Intelligence.
OSINT-FR is a global community, gathering experts and learners, willing to develop their knowledge on open source intelligence techniques.]]>
            </summary>
            <updated>2025-08-29T10:25:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6648</id>
            <title type="text"><![CDATA[OZINT.eu]]></title>
            <link rel="alternate" href="https://ozint.eu/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6648"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[La plateforme communautaire dédiée à l&amp;#039;OSINT.
Plateforme dédiée à la pratique de l&amp;#039;Osint.]]>
            </summary>
            <updated>2025-08-29T10:25:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6664</id>
            <title type="text"><![CDATA[Metlo]]></title>
            <link rel="alternate" href="https://github.com/metlo-labs/metlo" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6664"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Metlo is an open-source API security platform.]]>
            </summary>
            <updated>2025-08-29T10:27:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6676</id>
            <title type="text"><![CDATA[MISP]]></title>
            <link rel="alternate" href="https://www.misp-project.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6676"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Source Threat Intelligence Platform &amp;amp; Open Standards For Threat Information Sharing.

The MISP threat sharing platform is a free and open source software helping information sharing of threat and cybersecurity indicators.

[MISP @ GitHub](https://github.com/MISP/).]]>
            </summary>
            <updated>2025-08-29T10:29:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6677</id>
            <title type="text"><![CDATA[OpenCTI]]></title>
            <link rel="alternate" href="https://filigran.io/solutions/open-cti/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6677"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Cyber Threat Intelligence Platform.

OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been created in order to structure, store, organize and visualize technical and non-technical information about cyber threats.

- [OpenCTI @ GitHub](https://github.com/OpenCTI-Platform/opencti).

Related contents:

- [Newsletter du 02 Février 2026 @ RudeOps :fr:](https://www.rudeops.com/newsletter/2026-02-02-rudeops-newsletter/).]]>
            </summary>
            <updated>2026-02-12T07:31:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6679</id>
            <title type="text"><![CDATA[Cobalt Strike]]></title>
            <link rel="alternate" href="https://www.cobaltstrike.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6679"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Software for Adversary Simulations and Red Team Operations.
Adversary Simulations and Red Team Operations are security assessments that replicate the tactics and techniques of an advanced adversary in a network. While penetration tests focus on unpatched vulnerabilities and misconfigurations, these assessments benefit security operations and incident response.]]>
            </summary>
            <updated>2025-08-29T10:30:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6690</id>
            <title type="text"><![CDATA[Falco]]></title>
            <link rel="alternate" href="https://falco.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6690"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Detect security threats in real time

Falco is a cloud-native security tool designed for Linux systems. It employs custom rules on kernel events, which are enriched with container and Kubernetes metadata, to provide real-time alerts. Falco helps you gain visibility into abnormal behavior, potential security threats, and compliance violations, contributing to comprehensive runtime security.

- [Falco @ GitHub](https://github.com/falcosecurity/falco).

Related contents:

- [k8s-custom-detections @ GitHub](https://github.com/heilancoos/k8s-custom-detections).
- [Réagir à temps aux menaces dans Kubernetes avec Falco (Rachid Zarouali,
  Thomas Labarussias) @ Voxxed Days Luxembourg&amp;#039;s YouTube :fr:](https://www.youtube.com/watch?v=Mx28fhyKX7Q).
- [Extending Falco for Bitcoin @ sysdig](https://sysdig.com/blog/falco-for-bitcoin/).
- [Falcoctl: Artifact Management for Falco @ Cloud Native Computing Foundation](https://www.cncf.io/blog/2025/03/10/falcoctl-artifact-management-for-falco/).
-  [How Falco and Stratoshark close the gap between open source runtime detection and deep forensic analysis @ sysdig](https://www.sysdig.com/blog/how-falco-and-stratoshark-close-the-gap-between-open-source-runtime-detection-and-deep-forensic-analysis).
- [Blueprinting Security in CI/CD: Building Trust Through Open Source @ CD Foundation](https://cd.foundation/blog/2026/02/06/blueprinting-security/).]]>
            </summary>
            <updated>2026-02-18T13:13:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6702</id>
            <title type="text"><![CDATA[OWASP Coraza WAF]]></title>
            <link rel="alternate" href="https://coraza.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6702"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Enterprise-grade open source web application firewall library.
Coraza is an open source, high performance, Web Application Firewall ready to protect your beloved applications.

- [Coraza @ GitHub](https://github.com/corazawaf/coraza).]]>
            </summary>
            <updated>2025-08-29T10:33:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6708</id>
            <title type="text"><![CDATA[vm2]]></title>
            <link rel="alternate" href="https://github.com/patriksimek/vm2" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6708"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Advanced vm/sandbox for Node.js.
vm2 is a sandbox that can run untrusted code with whitelisted Node&amp;#039;s built-in modules. Securely!]]>
            </summary>
            <updated>2025-08-29T10:34:48+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6709</id>
            <title type="text"><![CDATA[Confidential Containers]]></title>
            <link rel="alternate" href="https://github.com/confidential-containers" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6709"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Confidential Containers is an open source community working to enable cloud native confidential computing by leveraging Trusted Execution Environments to protect containers and data.]]>
            </summary>
            <updated>2025-08-29T10:35:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6717</id>
            <title type="text"><![CDATA[enable cross-origin resource sharing]]></title>
            <link rel="alternate" href="https://enable-cors.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6717"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[enable cross-origin resource sharing.
Cross-Origin Resource Sharing (CORS) is a specification that enables truly open access across domain-boundaries. If you serve public content, please consider using CORS to open it up for universal JavaScript/browser access.]]>
            </summary>
            <updated>2025-08-29T10:37:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6718</id>
            <title type="text"><![CDATA[Auth Analyzer]]></title>
            <link rel="alternate" href="https://github.com/portswigger/auth-analyzer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6718"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Burp extension helps you to find authorization bugs. Just navigate through the web application with a high privileged user and let the Auth Analyzer repeat your requests for any defined non-privileged user. With the possibility to define Parameters the Auth Analyzer is able to extract and replace parameter values automatically. With this for instance, CSRF tokens or even whole session characteristics can be auto extracted from responses and replaced in further requests. Each response will be analyzed and tagged on its bypass status.]]>
            </summary>
            <updated>2025-08-29T10:37:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6720</id>
            <title type="text"><![CDATA[ExifCleaner]]></title>
            <link rel="alternate" href="https://exifcleaner.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6720"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[FREE Desktop app to clean image metadata. Privacy and Performance.
Attackers use GPS and device metadata to profile their victims. It also increases image file size. Sweep it away, with ExifCleaner.]]>
            </summary>
            <updated>2025-08-29T10:37:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6736</id>
            <title type="text"><![CDATA[EDRSandblast]]></title>
            <link rel="alternate" href="https://github.com/wavestone-cdt/EDRSandblast" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6736"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Notify Routine callbacks, Object Callbacks and ETW TI provider) and LSASS protections. Multiple userland unhooking techniques are also implemented to evade userland monitoring.

As of release, combination of userland (--usermode) and Kernel-land (--kernelmode) techniques were used to dump LSASS memory under EDR scrutiny, without being blocked nor generating &amp;quot;OS Credential Dumping&amp;quot;-related events in the product (cloud) console. The tests were performed on 3 distinct EDR products and were successful in each case.]]>
            </summary>
            <updated>2025-08-29T10:39:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6737</id>
            <title type="text"><![CDATA[Holehe OSINT]]></title>
            <link rel="alternate" href="https://github.com/megadose/holehe" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6737"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
Efficiently finding registered accounts from emails.
Holehe checks if an email is attached to an account on sites like twitter, instagram, imgur and more than 120 others.]]>
            </summary>
            <updated>2025-08-29T10:39:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6741</id>
            <title type="text"><![CDATA[Snyk]]></title>
            <link rel="alternate" href="https://snyk.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6741"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Developer security | Develop fast. Stay secure.
Developer loved, Security trusted.
Find and automatically fix vulnerabilities in your code, open source dependencies, containers, and infrastructure as code — all powered by Snyk’s industry-leading security intelligence.]]>
            </summary>
            <updated>2025-08-29T10:41:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6744</id>
            <title type="text"><![CDATA[Shodan Search Engine]]></title>
            <link rel="alternate" href="https://www.shodan.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6744"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Search Engine for the Internet of Everything
Shodan is the world&amp;#039;s first search engine for Internet-connected devices. Discover how Internet intelligence can help you make better decisions.]]>
            </summary>
            <updated>2025-08-29T10:41:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6747</id>
            <title type="text"><![CDATA[IPsum]]></title>
            <link rel="alternate" href="https://github.com/stamparm/ipsum" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6747"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Daily feed of bad IPs (with blacklist hit scores).
IPsum is a threat intelligence feed based on 30+ different publicly available lists of suspicious and/or malicious IP addresses. All lists are automatically retrieved and parsed on a daily (24h) basis and the final result is pushed to this repository. List is made of IP addresses together with a total number of (black)list occurrence (for each). Greater the number, lesser the chance of false positive detection and/or dropping in (inbound) monitored traffic. Also, list is sorted from most (problematic) to least occurent IP addresses.]]>
            </summary>
            <updated>2025-08-29T10:41:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6749</id>
            <title type="text"><![CDATA[Impacket]]></title>
            <link rel="alternate" href="https://github.com/SecureAuthCorp/impacket" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6749"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself. Packets can be constructed from scratch, as well as parsed from raw data, and the object-oriented API makes it simple to work with deep hierarchies of protocols. The library provides a set of tools as examples of what can be done within the context of this library.]]>
            </summary>
            <updated>2025-08-29T10:41:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6762</id>
            <title type="text"><![CDATA[INSECA]]></title>
            <link rel="alternate" href="https://github.com/DGAC/inseca" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6762"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[INSECA is a set of tools to build and manage very secure live Linux based endpoint systems.

It builds on top of Debian&amp;#039;s livebuild technology and adds many security oriented features to ensure a high level of security while keeping the overall usage as simple as any system.]]>
            </summary>
            <updated>2025-08-29T10:43:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6763</id>
            <title type="text"><![CDATA[Shredos Disk Eraser]]></title>
            <link rel="alternate" href="https://github.com/PartialVolume/shredos.x86_64" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6763"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[ShredOS is a USB bootable (BIOS or UEFI) small linux distribution with the sole purpose of securely erasing the entire contents of your disks using the program nwipe. If you are familiar with dwipe from DBAN then you will feel right at home with ShredOS and nwipe. What are the advantages of nwipe over dwipe/DBAN? Well as everybody probably knows, DBAN development stopped in 2015 which means it has not received any further bug fixes or support for new hardware since that date. Nwipe originally was a fork of dwipe but has continued to have improvements and bug fixes and is now available in many Linux distros. ShredOS hopefully will always provide the latest nwipe on a up to date Linux kernel so it will support modern hardware.]]>
            </summary>
            <updated>2025-08-29T10:45:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6772</id>
            <title type="text"><![CDATA[Incogni]]></title>
            <link rel="alternate" href="https://incogni.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6772"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Opt Out from Data Brokers.
Get your personal data off the market.

Thousands of companies are collecting, aggregating and trading your personal data without you knowing anything about it. We make them remove it.]]>
            </summary>
            <updated>2025-08-29T10:45:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6774</id>
            <title type="text"><![CDATA[Buttercup]]></title>
            <link rel="alternate" href="https://buttercup.pw/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6774"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Buttercup is a beautifully-simple password manager designed to help manage your credentials. Buttercup uses very strong encryption to protect your sensitive details under a single master password - Feel free to use stronger and more complex passwords for each service and let Buttercup store them securely.

[Buttercup @ GitHub](https://github.com/buttercup/buttercup-desktop).]]>
            </summary>
            <updated>2025-08-29T10:45:57+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6775</id>
            <title type="text"><![CDATA[Blackbird]]></title>
            <link rel="alternate" href="https://github.com/p1ngul1n0/blackbird" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6775"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An OSINT tool to search for accounts by username in social networks.
An OSINT tool to search fast for accounts by username across 574 sites.]]>
            </summary>
            <updated>2025-08-29T10:45:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6779</id>
            <title type="text"><![CDATA[Keycloak]]></title>
            <link rel="alternate" href="https://www.keycloak.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6779"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Source Identity and Access Management.
Add authentication to applications and secure services with minimum effort.
No need to deal with storing users or authenticating users.
Keycloak provides user federation, strong authentication, user management, fine-grained authorization, and more. 

- [Keycloak @ GitHub](https://github.com/keycloak/keycloak).

Related contents:

- [Deploy Keycloak Single Sign-On With Ansible @ DZone](https://dzone.com/articles/deploy-keycloak-single-sign-on-with-ansible).
- [Building trust with OpenID Federation trust chain on Keycloak @ Cloud Native Computing Foundation](https://www.cncf.io/blog/2025/04/25/building-trust-with-openid-federation-trust-chain-on-keycloak/).]]>
            </summary>
            <updated>2025-08-29T10:46:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6780</id>
            <title type="text"><![CDATA[authentik]]></title>
            <link rel="alternate" href="https://goauthentik.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6780"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Making authentication simple.

authentik is an open-source Identity Provider focused on flexibility and versatility.
It can be seamlessly integrated into existing environments to support new protocols.
authentik is also a great solution for implementing sign-up, recovery,
and other similar features in your application, saving you the hassle of dealing with them.

- [authentik @ GitHub](https://github.com/goauthentik/authentik).

Sources:

- [GoAuthentik de A à Y @ Une tasse de café :fr:](https://une-tasse-de.cafe/blog/goauthentik/).
- [La veille des Ours n°31 @ Bearstech&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/pulse/la-veille-des-ours-n31-bearstech-gbmgf/).
- [Ultimate Authentik Docker Compose Guide with Traefik 2025 @ SmartHomeBeginner](https://www.smarthomebeginner.com/authentik-docker-compose-guide-2025/).
- [Improving Security with Hardware Keys - Authentik &amp;amp; Pocket-ID @ Jim&amp;#039;s Garage&amp;#039;s YouTube](https://www.youtube.com/watch?v=QC5IUmu7cgw).
- [Secure Jellyfin with Authentik (SSO + LDAP + 2FA/MFA Tutorial) @ IBRACORP&amp;#039;s YouTube](https://www.youtube.com/watch?v=WvXXKNyB0ig).
- [Manage Authentik Resources in Terraform @ Christian Lempa&amp;#039;s YouTube](https://www.youtube.com/watch?v=R6koN4ZmbOY).]]>
            </summary>
            <updated>2025-10-06T07:03:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6781</id>
            <title type="text"><![CDATA[inAppBrowser.com]]></title>
            <link rel="alternate" href="https://inappbrowser.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6781"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Check if an in-app browser is injecting JavaScript code
Some iOS and Android apps make use of a custom in-app browser (full details). This causes potential security and privacy risks to the user. 

- [InAppBrowser.com @ GitHub](https://github.com/KrauseFx/InAppBrowser.com).]]>
            </summary>
            <updated>2025-08-29T10:47:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6789</id>
            <title type="text"><![CDATA[Wazuh]]></title>
            <link rel="alternate" href="https://wazuh.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6789"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

- [Wazuh @ GitHub](https://github.com/wazuh/wazuh).

Related contents:

- [Sécuriser son homelab (et les PC des ados) avec Wazuh : une plateforme open source qui a tout d’une grande @ Cyril Beaufrere&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/pulse/s%25C3%25A9curiser-son-homelab-et-les-pc-des-ados-avec-wazuh-une-beaufrere-2inae/).
- [Wazuh - The FREE SIEM You Need to Try! - Installation Guide \[Part 1\] @ Jim&amp;#039;s Garage&amp;#039;s YouTube](https://www.youtube.com/watch?v=R2fQHiOm39A).
- [You Probably Have 1000s of Vulnerabilities... Wazuh Walkthrough @ Jim&amp;#039;s Garage&amp;#039;s YouTube](https://www.youtube.com/watch?v=yKHm2hpnUzM).]]>
            </summary>
            <updated>2025-09-19T12:37:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6827</id>
            <title type="text"><![CDATA[OSSEC]]></title>
            <link rel="alternate" href="https://www.ossec.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6827"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[World&amp;#039;s Most Widely Used Host Intrusion Detection System - HIDS.
OSSEC offers comprehensive host-based intrusion detection across multiple platforms including Linux, Solaris, AIX, HP-UX, BSD, Windows, Mac and VMware ESX.]]>
            </summary>
            <updated>2025-08-29T10:54:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6830</id>
            <title type="text"><![CDATA[Samhain]]></title>
            <link rel="alternate" href="https://www.la-samhna.de/samhain/index.html" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6830"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes.]]>
            </summary>
            <updated>2025-08-29T10:55:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6835</id>
            <title type="text"><![CDATA[Sentry-Picam]]></title>
            <link rel="alternate" href="https://github.com/TinkerTurtle/Sentry-Picam" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6835"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A simple wildlife camera for Raspberry Pis.
Sentry-Picam is a simple wildlife / security camera solution for the Raspberry Pi Zero W, providing 1080p/30fps motion activated H.264 video capture. The built in web interface makes it easy to review video clips and identify the busiest times of day.]]>
            </summary>
            <updated>2025-08-29T10:57:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6863</id>
            <title type="text"><![CDATA[Suricata]]></title>
            <link rel="alternate" href="https://suricata.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6863"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Suricata is a high performance, open source network analysis and threat detection software used by most private and public organizations, and embedded by major vendors to protect their assets.]]>
            </summary>
            <updated>2025-08-29T11:02:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6895</id>
            <title type="text"><![CDATA[Netmaker]]></title>
            <link rel="alternate" href="https://www.netmaker.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6895"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Modern Virtual Networking Platform]]>
            </summary>
            <updated>2025-08-29T11:06:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6914</id>
            <title type="text"><![CDATA[GoodbyeDPI]]></title>
            <link rel="alternate" href="https://github.com/ValdikSS/GoodbyeDPI" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6914"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Deep Packet Inspection circumvention utility (for Windows).

This software designed to bypass Deep Packet Inspection systems found in many Internet Service Providers which block access to certain websites.

It handles DPI connected using optical splitter or port mirroring (Passive DPI) which do not block any data but just replying faster than requested destination, and Active DPI connected in sequence.]]>
            </summary>
            <updated>2025-08-29T11:10:07+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6939</id>
            <title type="text"><![CDATA[Vault by HashiCorp]]></title>
            <link rel="alternate" href="https://www.vaultproject.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6939"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Manage Secrets &amp;amp; Protect Sensitive Data

Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API.

- [Vault @ GitHub](https://github.com/hashicorp/vault).

Related contents:

- [How To Centralize Kubernetes Secrets Management With Vault @ The New Stack](https://thenewstack.io/how-to-centralize-kubernetes-secrets-management-with-vault/).
- [From key sprawl to scalable control: Rethinking SSH access @ Hashicorp&amp;#039;s The Stack](https://www.hashicorp.com/en/blog/from-key-sprawl-to-scalable-control-rethinking-ssh-access).]]>
            </summary>
            <updated>2025-10-15T12:28:10+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6940</id>
            <title type="text"><![CDATA[OWASP WebGoat]]></title>
            <link rel="alternate" href="https://owasp.org/www-project-webgoat/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6940"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[WebGoat is a deliberately insecure application that allows interested developers just like you to test vulnerabilities commonly found in Java-based applications that use common and popular open source components.

- [OWASP WebGoat @ GitHub](https://github.com/WebGoat/WebGoat).

Related contents:

- [WebGoat - Pour vous former au hacking éthique @ Korben :fr:](https://korben.info/webgoat-owasp-apprendre-hacking-ethique.html).]]>
            </summary>
            <updated>2025-09-29T10:19:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6942</id>
            <title type="text"><![CDATA[RasPwn OS]]></title>
            <link rel="alternate" href="https://raspwn.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6942"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Welcome to RasPwn OS, The intentionally vulnerable image for the Raspberry Pi.

Raspwn OS is a GNU/Linux distro in the spirit of Damn Vulnerable Linux and uses a Raspberry Pi 2B or 3 to emulate a vulnerable Linux Server. RasPwn was designed as a training tool and exists only to be attacked and pwned. Everything from the OS itself to the daemons and services to the web applications installed are all vulnerable to some degree. The idea is to provide a &amp;#039;safe&amp;#039; (relatively) and affordable training environment and playground for hackers and pen-testers. By loading Raspwn OS and connecting to the Raspberry Pi via WiFi, one can practice pen-testing as well as both offensive and defensive hacking techniques without ever even getting on the internet for only around $50.]]>
            </summary>
            <updated>2025-08-29T11:14:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6946</id>
            <title type="text"><![CDATA[AutoPWN Suite]]></title>
            <link rel="alternate" href="https://kaangultekin.net/projects/autopwn-suite/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6946"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.

- [AutoPWN Suite @ GitHub](https://github.com/GamehunterKaan/AutoPWN-Suite).]]>
            </summary>
            <updated>2026-03-27T11:15:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7012</id>
            <title type="text"><![CDATA[tomMoulard/fail2ban: Traefik plugin on fail2ban middleware]]></title>
            <link rel="alternate" href="https://github.com/tomMoulard/fail2ban" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7012"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This plugin is a small implementation of a fail2ban instance as a middleware plugin for Traefik.]]>
            </summary>
            <updated>2025-08-29T11:26:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7014</id>
            <title type="text"><![CDATA[Can You Block It ? - A Simple Ad Block Tester]]></title>
            <link rel="alternate" href="https://canyoublockit.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7014"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Can You Block It was built to help you test if your ad-blocker is working as intended. The various tests help you in identifying what formats of advertisements are blocked or unblocked so that you can understand your ad-blockers effectiveness. Use the various tests to test ad-blockers such as AdBlock, AdBlock Plus, AdBlocker Ultimate, AdGuard, Ghostery, uBlock Origin, Pi-Hole, NoScript and more with various ad formats such as Web Banners, Native Ads, Pop-Unders,  In-Page Push Ads, etc from popular Ad Networks.]]>
            </summary>
            <updated>2025-08-29T11:26:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7034</id>
            <title type="text"><![CDATA[Boulder]]></title>
            <link rel="alternate" href="https://github.com/letsencrypt/boulder" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7034"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An ACME-based certificate authority, written in Go.
This is an implementation of an ACME-based CA. The ACME protocol allows the CA to automatically verify that an applicant for a certificate actually controls an identifier, and allows domain holders to issue and revoke certificates for their domains. Boulder is the software that runs Let&amp;#039;s Encrypt.]]>
            </summary>
            <updated>2025-08-29T11:30:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7099</id>
            <title type="text"><![CDATA[OWASP ZAP]]></title>
            <link rel="alternate" href="https://www.zaproxy.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7099"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The world&amp;#039;s most widely used web app scanner. Free and open source. Actively maintained by a dedicated international team of volunteers.

- [ZAP @ GitHub](https://github.com/zaproxy/zaproxy).
- [Building a Scanner and a Community with Zed Attack Proxy - Simon Bennetts - ASW #254  @ YouTube](https://www.youtube.com/watch?v=alIBoz7AooI).
- [Strengthening Your Web Application Security: Integrating OWASP ZAP with GitHub Actions @ System Weakness](https://systemweakness.com/strengthening-your-web-application-security-integrating-owasp-zap-with-github-actions-2c177545f21d).]]>
            </summary>
            <updated>2025-08-29T11:40:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7125</id>
            <title type="text"><![CDATA[Authelia]]></title>
            <link rel="alternate" href="https://www.authelia.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7125"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Authentication server providing two-factor and SSO.
Protect your applications with Single Sign-On and 2 Factor.
Authelia is an open-source full-featured authentication server available on Github .

- [Authelia @ GitHub](https://github.com/authelia/authelia).

Related contents:

- [Authelia — Self-hosted Single Sign-On (SSO) for your homelab services @ Akash Rajpurohit](https://akashrajpurohit.com/blog/setup-authelia-for-sso-authentication/).
- [Episode \#125: The state of homelab tech (2026) @ Changelog &amp;amp; Friends](https://changelog.com/friends/125).]]>
            </summary>
            <updated>2026-01-27T07:19:15+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7135</id>
            <title type="text"><![CDATA[Safing - Love Freedom]]></title>
            <link rel="alternate" href="https://safing.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7135"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Discover everything that is happening on your computer. Expose every connection your applications make and detect evil ones. Finally get the power to act accordingly.]]>
            </summary>
            <updated>2025-08-29T11:46:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7156</id>
            <title type="text"><![CDATA[CyberGhost VPN]]></title>
            <link rel="alternate" href="https://www.cyberghostvpn.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7156"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[VPN rapide, sécurisé et anonyme]]>
            </summary>
            <updated>2025-08-29T11:50:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7161</id>
            <title type="text"><![CDATA[Qubes OS]]></title>
            <link rel="alternate" href="https://www.qubes-os.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7161"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A reasonably secure operating system.

Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages Xen-based virtualization to allow for the creation and management of isolated compartments called qubes.]]>
            </summary>
            <updated>2025-08-29T11:50:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7193</id>
            <title type="text"><![CDATA[TEHTRIS]]></title>
            <link rel="alternate" href="https://tehtris.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7193"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[From the cloud to your endpoints to your IoT, TEHTRIS technologies neutralize ransomware and 0-days attacks in real time. Our solutions are modular and can be deployed individually or in a suite within the TEHTRIS XDR Platform.]]>
            </summary>
            <updated>2025-08-29T11:56:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7194</id>
            <title type="text"><![CDATA[Checkov]]></title>
            <link rel="alternate" href="https://www.checkov.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7194"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Checkov scans cloud infrastructure configurations to find misconfigurations before they&amp;#039;re deployed.

Checkov uses a common command line interface to manage and analyze infrastructure as code (IaC) scan results across platforms such as Terraform, CloudFormation, Kubernetes, Helm, ARM Templates and Serverless framework.

- [Checkov @ GitHub](https://github.com/bridgecrewio/checkov).

Related contents:

- [Checkov vérifie votre code d&amp;#039;infrastructure @ Culture et Outils DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/outils/checkov/).
- [Getting Started with Terraform Vulnerability Scanning @ scalr](https://scalr-cdn.com/getting-started-with-terraform-vulnerability-scanning/).]]>
            </summary>
            <updated>2025-11-17T06:06:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7198</id>
            <title type="text"><![CDATA[Canarytokens]]></title>
            <link rel="alternate" href="https://canarytokens.org/generate" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7198"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Canary tokens are a free, quick, painless way to help defenders discover they&amp;#039;ve been breached (by having attackers announce themselves. How tokens works (in 3 short steps):

1. Visit the site and get a free token (which could look like an URL or a hostname, depending on your selection.) 
2. If an attacker ever uses the token somehow, we will give you an out of band (email or sms) notification that it&amp;#039;s been visited.
3. As an added bonus, we give you a bunch of hints and tools that increase the likelihood of an attacker tripping on a canary token.]]>
            </summary>
            <updated>2025-08-29T11:56:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7226</id>
            <title type="text"><![CDATA[DaProfiler]]></title>
            <link rel="alternate" href="https://github.com/TheRealDalunacrobate/DaProfiler" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7226"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[DaProfiler allows you to get emails, social medias, adresses, works and more on your target using web scraping and google dorking techniques, based in France Only. The particularity of this program is its ability to find your targets e-mail adresses.]]>
            </summary>
            <updated>2025-08-29T12:02:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7326</id>
            <title type="text"><![CDATA[FreeOTP]]></title>
            <link rel="alternate" href="https://freeotp.github.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7326"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[FreeOTP is a two-factor authentication application for systems utilizing one-time password protocols. Tokens can be added easily by scanning a QR code. If you need to generate a QR code, try our QR code generator.

- [FreeOTP @ GitHub](https://github.com/freeotp).]]>
            </summary>
            <updated>2025-08-29T12:18:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7396</id>
            <title type="text"><![CDATA[OpenSnitch]]></title>
            <link rel="alternate" href="https://github.com/evilsocket/opensnitch" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7396"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenSnitch is a GNU/Linux port of the Little Snitch application firewall.]]>
            </summary>
            <updated>2025-08-29T12:30:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7417</id>
            <title type="text"><![CDATA[What every Browser knows about you]]></title>
            <link rel="alternate" href="http://webkay.robinlinus.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7417"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[What every Browser knows about you]]>
            </summary>
            <updated>2025-08-29T12:34:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7426</id>
            <title type="text"><![CDATA[Blackbird]]></title>
            <link rel="alternate" href="http://www.getblackbird.net/download" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7426"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[désactive OneDrive, Cortana, Bing, le fameux Wifi Sense, et bien sûr tout ce qui envoie des données à Microsoft, le partage des mises à jour en P2P, les services Xbox Live, les pubs dans le menu Démarrer, les popups de mise à jour reloues, boucher quelques failles qui permettent la fuite de données via Edge et Defender et même supprimer les identifiants uniques qui permettent de différencier votre installation Windows d&amp;#039;un autre.]]>
            </summary>
            <updated>2025-08-29T12:34:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7439</id>
            <title type="text"><![CDATA[Passbolt]]></title>
            <link rel="alternate" href="https://www.passbolt.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7439"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open source password manager for teams
The password manager your team was waiting for. Free, open source, extensible, based on OpenPGP.

- [Passbolt @ GitHub](https://github.com/passbolt/passbolt_api).

Related contents:

- [Passbolt : gestionnaire de mots de passe open-source pour équipes @ DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/secrets/passbolt/).]]>
            </summary>
            <updated>2026-02-06T09:46:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7506</id>
            <title type="text"><![CDATA[FastNetMon DDoS detection tool]]></title>
            <link rel="alternate" href="https://fastnetmon.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7506"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[FastNetMon is a very high performance DDoS detector built on top of multiple packet capture engines: NetFlow, IPFIX, sFLOW.

- [FastNetMon @ GitHub](https://github.com/FastNetMon/).]]>
            </summary>
            <updated>2025-08-29T12:48:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7524</id>
            <title type="text"><![CDATA[riffle.pdf]]></title>
            <link rel="alternate" href="http://people.csail.mit.edu/devadas/pubs/riffle.pdf" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7524"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An Efficient Communication System With Strong Anonymity]]>
            </summary>
            <updated>2025-08-29T12:52:00+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7527</id>
            <title type="text"><![CDATA[Keybase]]></title>
            <link rel="alternate" href="https://keybase.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7527"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Keybase maps your identity to your public keys, and vice versa.
Keybase is secure messaging and file-sharing.

- [Keybase @ GitHub](https://github.com/keybase/client/).]]>
            </summary>
            <updated>2025-08-29T12:52:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7555</id>
            <title type="text"><![CDATA[Parrot Security OS]]></title>
            <link rel="alternate" href="https://www.parrotsec.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7555"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cloud oriented pentesting distribution.

Related contents:

- [ 💡💡Parrot 6.3 est sorti avec une sécurité améliorée et de nouveaux outils de piratage @ Almamy Diakho&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/almamy-diakho-63397b146_parrotos-linux-update-activity-7292460460526727170-7dMq/).]]>
            </summary>
            <updated>2025-08-29T12:57:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7556</id>
            <title type="text"><![CDATA[memleax]]></title>
            <link rel="alternate" href="https://github.com/WuBingzheng/memleax" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7556"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[debugs memory leak of running process, without recompiling or restarting, on GNU/Linux and FreeBSD.

Not maintained anymore, try `libleak` please.]]>
            </summary>
            <updated>2025-08-29T12:57:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7586</id>
            <title type="text"><![CDATA[I2P]]></title>
            <link rel="alternate" href="https://geti2p.net/en/about/intro" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7586"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[I2P is an anonymous network, exposing a simple layer that applications can use to anonymously and securely send messages to each other. The network itself is strictly message based (a la IP), but there is a library available to allow reliable streaming communication on top of it (a la TCP). All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points (&amp;quot;destinations&amp;quot;) are cryptographic identifiers (essentially a pair of public keys).]]>
            </summary>
            <updated>2025-08-29T13:03:06+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7605</id>
            <title type="text"><![CDATA[Vulners]]></title>
            <link rel="alternate" href="https://vulners.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7605"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Vulnerability Database and Search Engine]]>
            </summary>
            <updated>2025-08-29T13:05:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7622</id>
            <title type="text"><![CDATA[Facebook CTF]]></title>
            <link rel="alternate" href="https://github.com/facebook/fbctf" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7622"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Facebook CTF is a platform to host Jeopardy and “King of the Hill” style Capture the Flag competitions.]]>
            </summary>
            <updated>2025-08-29T13:07:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7661</id>
            <title type="text"><![CDATA[OpenSCAP]]></title>
            <link rel="alternate" href="https://www.open-scap.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7661"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[NIST Certified SCAP 1.2 toolkit. The oscap program is a command line tool that allows users to load, scan, validate, edit, and export SCAP documents.

The OpenSCAP ecosystem provides multiple tools to assist administrators and auditors with assessment, measurement and enforcement of security baselines. We maintain great flexibility and interoperability, reducing costs of performing security audits.

- [OpenSCAP @ GitHub](https://github.com/OpenSCAP/openscap).

Related contents:

- [Auditez la sécurité de vos serveurs avec OpenScap @ Culture et Outils DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/durcissement/openscap/).]]>
            </summary>
            <updated>2025-12-03T09:23:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7687</id>
            <title type="text"><![CDATA[KeeWeb: KeePass web app (unofficial)]]></title>
            <link rel="alternate" href="https://github.com/antelle/keeweb" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7687"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This webapp is a browser and desktop password manager compatible with KeePass databases. It doesn&amp;#039;t require any server or additional resources. The app can run either in browser, or as a desktop app.]]>
            </summary>
            <updated>2025-08-29T13:19:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7738</id>
            <title type="text"><![CDATA[SFLvault]]></title>
            <link rel="alternate" href="http://www.sflvault.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7738"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SFLvault is a Networked credentials store and authentication manager developed and maintained by Savoir-faire Linux.

It has a client/vault (server) architecture allowing encrypted storage and organization of a multitude passwords for different machines and services.

[SFLVault @ GitHub](https://github.com/savoirfairelinux/sflvault)]]>
            </summary>
            <updated>2025-08-29T13:27:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7740</id>
            <title type="text"><![CDATA[gitMask]]></title>
            <link rel="alternate" href="http://www.gitmask.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7740"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Develop Anonymously on github]]>
            </summary>
            <updated>2025-08-29T13:27:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7810</id>
            <title type="text"><![CDATA[Panopticlick]]></title>
            <link rel="alternate" href="https://panopticlick.eff.org/#2" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7810"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[When you visit a website, online trackers and the site itself may be able to identify you – even if you’ve installed software to protect yourself. It’s possible to configure your browser to thwart tracking, but many people don’t know how.

Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software.]]>
            </summary>
            <updated>2025-08-29T13:39:33+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7825</id>
            <title type="text"><![CDATA[SQLmap]]></title>
            <link rel="alternate" href="http://sqlmap.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7825"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[automatic SQL injection and database takeover tool.

SQLmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.

- [SQLmap @ GitHub](https://github.com/sqlmapproject/sqlmap).
- [How To Attack Sql Injection Using [SQLMAP] Via Method [POST] @ System Weakness](https://systemweakness.com/how-to-attack-sql-injection-using-sqlmap-via-method-post-cae19495319f).]]>
            </summary>
            <updated>2025-08-29T13:41:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7904</id>
            <title type="text"><![CDATA[dnstwist]]></title>
            <link rel="alternate" href="https://github.com/elceef/dnstwist" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7904"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Domain name permutation engine for detecting typo squatting, phishing and corporate espionage]]>
            </summary>
            <updated>2025-08-29T13:55:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7952</id>
            <title type="text"><![CDATA[Kali Linux]]></title>
            <link rel="alternate" href="https://www.kali.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7952"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The most advanced Penetration Testing Distribution.

Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.]]>
            </summary>
            <updated>2025-08-29T14:03:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7964</id>
            <title type="text"><![CDATA[Vault by HashiCorp]]></title>
            <link rel="alternate" href="https://developer.hashicorp.com/vault" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7964"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Vault presents a unified API to access multiple backends: HSMs, AWS IAM, SQL databases, raw key/value, and more.

- [HashiCorp Vault @ GitHub](https://github.com/hashicorp/vault).

Related contents:

- [Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault @ Cyata](https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/).
- [No More Hardcoded Secrets: Automatic Database Credential Rotation with Vault, AKS and Postgres🔐 @ Poojan Mehta](https://dev.to/poojan18/no-more-hardcoded-secrets-automatic-database-credential-rotation-with-vault-aks-and-postgres-1nmn).]]>
            </summary>
            <updated>2025-09-15T13:26:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/8016</id>
            <title type="text"><![CDATA[OPNsense]]></title>
            <link rel="alternate" href="https://opnsense.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/8016"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[pfsense fork - Your next Open Source Firewall !
Secure Your Network with ease.
From Virtual Private Networking to Intrusion Detection, Best in class, FREE Open Source Project.

- [OPNsense @ GitHub](https://github.com/opnsense/core).

Related contents:

- [How to Configure an OPNsense Dashboard @ bsmithio](https://www.bsmithio.com/post/opnsense-dashboard/).
- [Introduction à OPNsense : comment installer ce firewall ? @ IT-Connect :fr:](https://www.it-connect.fr/tuto-installer-et-configurer-opnsense/).
- [Une façon créative de bloquer les indésirables @ Richard Dern :fr:](https://richard-dern.fr/interets/informatique/2026/03/08/une-facon-creative-de-bloquer-les-indesirables/).
- [Comprendre OPNsense : le pare-feu open source @ DevSecOps :fr:](https://blog.stephane-robert.info/docs/securiser/reseaux/opnsense/comprendre/).
- [OPNsense Transparent Filtering Bridge (v26.1) @ Home Network Guy&amp;#039;s YouTube](https://www.youtube.com/watch?v=ZCDXNxDhrIQ).]]>
            </summary>
            <updated>2026-05-22T13:31:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/8056</id>
            <title type="text"><![CDATA[IPFS]]></title>
            <link rel="alternate" href="http://ipfs.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/8056"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[IPFS is a new hypermedia distribution protocol, addressed by content and identities. IPFS enables the creation of completely distributed applications. It aims to make the web faster, safer, and more open.]]>
            </summary>
            <updated>2025-08-29T14:20:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/8329</id>
            <title type="text"><![CDATA[Darik&amp;#039;s Boot And Nuke]]></title>
            <link rel="alternate" href="http://www.dban.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/8329"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Hard Drive Disk Wipe and Data Clearing
DBAN is a self-contained boot disk that automatically deletes the contents of any hard disk that it can detect. This method can help prevent identity theft before recycling a computer. It is also a solution commonly used to remove viruses and spyware from Microsoft Windows installations. DBAN prevents all known techniques of hard disk forensic analysis. It does not provide users with a proof of erasure, such as an audit-ready erasure report.]]>
            </summary>
            <updated>2025-08-29T15:06:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/8411</id>
            <title type="text"><![CDATA[Tox]]></title>
            <link rel="alternate" href="http://tox.im/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/8411"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[La messagerie sécurisée pour tous.
Alors que les programmes de surveillance gouvernementaux étendent leur influence, Tox est une application facile à utiliser qui vous permet de contacter vos amis et vos proches sans que quelqu&amp;#039;un d&amp;#039;autre soit à l&amp;#039;écoute]]>
            </summary>
            <updated>2025-08-29T15:20:35+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/8777</id>
            <title type="text"><![CDATA[Prey]]></title>
            <link rel="alternate" href="http://preyproject.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/8777"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open source anti-theft solution for laptops, phones &amp;amp;amp; tablets
Prey lets you keep track of your laptop, phone and tablet whenever stolen or missing -- easily and all in one place. It&amp;#039;s lightweight, open source software that gives you full and remote control, 24/7.]]>
            </summary>
            <updated>2025-08-29T16:21:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/9030</id>
            <title type="text"><![CDATA[Wifite]]></title>
            <link rel="alternate" href="https://github.com/derv82/wifite2" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/9030"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[automated wireless auditor.

To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the &amp;quot;set it and forget it&amp;quot; wireless auditing tool.

It&amp;#039;s a Python script for auditing wireless networks.
Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments &amp;amp; switches!
Wifite is designed to use all known methods for retrieving the password of a wireless access point (router).]]>
            </summary>
            <updated>2025-08-29T17:03:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/9390</id>
            <title type="text"><![CDATA[Sucuri]]></title>
            <link rel="alternate" href="https://sitecheck.sucuri.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/9390"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free website malware and security checker

Enter a URL like example.com and the Sucuri SiteCheck scanner will check the website for known malware, viruses, blacklisting status, website errors, out-of-date software, and malicious code.]]>
            </summary>
            <updated>2025-08-29T18:19:34+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/9475</id>
            <title type="text"><![CDATA[Nikto]]></title>
            <link rel="alternate" href="http://cirt.net/nikto2" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/9475"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Nikto web server scanner.

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers.

It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.

- [Nikto @ GitHub](https://github.com/sullo/nikto).
- [Nikto : outil pour scanner la sécurité d’un serveur web @ Memo-Linux.com](https://memo-linux.com/nikto-outil-scanner-de-securite-serveur-web/).
- [ La version 2.5 de Nikto est sortie @ Stéphane MORICO&amp;#039;s LinkedIn](https://www.linkedin.com/posts/stephane-morico_la-version-25-de-nikto-est-sortie-nikto-activity-7137480505309937665-jQDK/).]]>
            </summary>
            <updated>2025-08-29T18:18:00+00:00</updated>
        </entry>
    </feed>
