Plum, for Proactive Land Uncovering & Monitoring, is an orchestration tool to learn, monitor, and document an exposure surface. It coordinates work between scanning agents, keeps historical results, and makes observations searchable over time.

This project, part of D4 which was initially co-funded by the European Union, is still young, but it already addresses a concrete need: helping CIRCL to keep a global view of Luxembourg’s IP space, especially in the context of NIS2-related activities. The goal is not only to scan, but to maintain actionable knowledge of the national perimeter, its visible exposures and allows vulnerability discovery in the context of incident response.

#plum #scanning #networkscanning #cybersecurity #recon #csirt

https://www.d4-project.org/2026/04/29/Plum-knowing-and-monitoring-your-perimeter.html

Plum: knowing and monitoring your perimeter | D4 Project

Movies Featuring the Nmap Security Scanner

The Nmap Security Scanner appears in many major motion pictures and smaller films. This gallery provides screen shots and details for each movie.

New Learning Tool Nmap Timing Visualizer

In the spirit of helping others master Nmap, i made this widget for you to play with. Enjoy and i hope it makes learning about Nmap's timing arguments fun and interactive.

chickenpwny.github.io/NmapTimingTe...

#Nmap #PenetrationTesting #NetworkScanning

New tool: Interactive Nmap Timing Template Visualizer

In the spirit of helping others master Nmap, i made this widget for you to play with. Enjoy and i hope it makes learning about Nmap's timing arguements fun and interactive.

https://chickenpwny.github.io/NmapTimingTemplateVisualizer/

#Nmap #PenetrationTesting #NetworkScanning

Nmap Timing Template Visualizer

I submitted a Pull Request to update MacPorts' nmap to 7.97 here:https://github.com/macports/macports-ports/pull/28589

GitHub Continuous Integration checks went OK. It's up to someone else with commit access to merge it.

(Thankfully, someone else already updated zenmap to 7.97; but why zenmap was broken out into its own port instead of maintained as a subport is beyond me. It's also beyond me why someone would go through the trouble to update zenmap without also updating nmap; but given that my zenmap 7.96 update was apparently not making another MacPorts maintainer happy, maybe it's all for the best?)

#nmap #MacPorts #NetworkScanning #infosec #security
nmap: update to 7.97 by artkiver · Pull Request #28589 · macports/macports-ports

Description Type(s) bugfix enhancement security fix Tested on macOS 15.5 24F74 arm64 Command Line Tools 16.4.0.0.1.1747106510 Verification Have you followed our Commit Message Guidelines...

GitHub
I submitted a Pull Request to update MacPorts' ZMap to 4.3.4 here:

https://github.com/macports/macports-ports/pull/28422

GitHub Actions Continuous Integration checks are running (2 of 3 completed successfully so far).

Hopefully those will go OK?

It will be up to someone else with write access to merge it if so.

#ZMap #MacPorts #NetworkScanning #OpenSource
I submitted a Pull Request to update MacPorts' ZMap to 4.3.2 here:

https://github.com/macports/macports-ports/pull/27538

2/3 of GitHub's Continuous Integration checks are running with a third queued. Hopefully those will go OK?

If they do, it's up to someone else with commit access to merge it.

#ZMap #MacPorts #NetworkScanning #InfoSec #OpenSource

Is Palo Alto actually scanning for their compromised and vulnerable customers? At least from the logs on one of my servers, there is a log entry for a GET HTTP request with a peculiar User-Agent.

To be honest, it would have been a positive step to see vendors actively scanning and notifying their customers.

Maybe they should team up with @shadowserver to perform it at a larger scale?

205.210.31.109 - - [01/Jan/2025:11:18:03 +0000] "GET / HTTP/1.1" 200 186832 "-" "Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: [email protected]"

#paloalto #cybersecurity #vulnerability #networkscanning

Version Fingerprinting Tricks: Automating Software Identification for Vulnerability Scanners.

Presentation done at FIRST conference 2024.

🔗 https://d4-project.org/2024/07/02/version-fingerprinting-tricks.html

#infosec #opensource #networkscanning
#netsec

@jtk @firstdotorg

Version Fingerprinting Tricks: Automating Software Identification for Vulnerability Scanners | D4 Project