<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>ethical-hacking</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/1241/feed"/>
    <updated>2026-05-01T01:23:58+00:00</updated>
    <id>https://links.biapy.com/guest/tags/1241/feed</id>
            <entry>
            <id>https://links.biapy.com/links/1676</id>
            <title type="text"><![CDATA[BlackStone]]></title>
            <link rel="alternate" href="https://github.com/micro-joan/BlackStone" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1676"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Pentesting Reporting Tool.

BlackStone project or &amp;quot;BlackStone Project&amp;quot; is a tool created in order to automate the work of drafting and submitting a report on audits of ethical hacking or pentesting.

In this tool we can register in the database the vulnerabilities that we find in the audit, classifying them by internal, external audit or wifi, in addition, we can put your description and recommendation, as well as the level of severity and effort for its correction. This information will then help us generate in the report a criticality table as a global summary of the vulnerabilities found.

Related contents:

- [BlackStone, la pépite des rapports de test d&amp;#039;intrusions @ Laurent Biagiotti&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-biagiotti-19779284_osint-pentest-saezcuritaeznumaezrique-activity-7289225295671296001-9DsA/).]]>
            </summary>
            <updated>2025-08-28T20:35:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3197</id>
            <title type="text"><![CDATA[Hack4Values]]></title>
            <link rel="alternate" href="https://hack4values.eu/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3197"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Pro Bono Bug Hunting &amp;amp; Volunteer Hackers. Helping those who help.

Volunteer hackers to help nonprofits and NGOs strengthen their digital security.

- [Episode \#476 - Les Assises 2024 @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/les-assises-2024/).]]>
            </summary>
            <updated>2025-08-29T00:49:40+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4578</id>
            <title type="text"><![CDATA[security.txt]]></title>
            <link rel="alternate" href="https://securitytxt.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4578"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A proposed standard which allows websites to define security policies.

 “When security risks in web services are discovered by independent security researchers who understand the severity of the risk, they often lack the channels to disclose them properly. As a result, security issues may be left unreported. security.txt defines a standard to help organizations define the process for security researchers to disclose security vulnerabilities securely.”]]>
            </summary>
            <updated>2025-08-29T04:39:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5007</id>
            <title type="text"><![CDATA[Metasploit Unleashed]]></title>
            <link rel="alternate" href="https://www.offsec.com/metasploit-unleashed/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5007"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free Online Ethical Hacking Course

This course is a perfect starting point for Information Security Professionals who want to learn penetration testing and ethical hacking, but are not yet ready to commit to a paid course. We will teach you how to use Metasploit, in a structured and intuitive manner.]]>
            </summary>
            <updated>2025-08-29T05:51:22+00:00</updated>
        </entry>
    </feed>
