Caido v0.56.1 released
Caido v0.56.1 released

Modern infrastructure changes daily โ and cyber threats evolve just as fast.๐
Continuous Penetration Testing helps detect vulnerabilities across cloud platforms, APIs, and web applications in real time.
Wireless pentesting is about finding weak spots in Wi-Fi and other wireless networks by capturing traffic, analyzing signals, and testing how well authentication holds up against real-world attacks.
Here are popular wireless pentest tools ๐๐
Find high-res pdf ebooks with all my Linux and cybersecurity related infographics at https://study-notes.org
#cybersecurity #wifi #wifihacking #pentesting #networksecurity
Mini Pen Test Diaries Story:
The year was 2010, and I was onsite at a UK local authority doing an internal network assessment.
One of the tasks was - if given a standard, non-privileged, domain user account, with minimal access afforded to it - what could I do? Could I access sensitive documents? Could I login to systems I shouldn't be able to? Could I elevate myself. Standard stuff.
I got my account, and immediately started fishing around the main file share with the users home directories on it. To my immense surprise, I found out that I was able to access the content of every single users home directory. Including all the top level folks.
They must've accidentally given me some account in an IT group or something, so I check it out. Nope - groups look normal.
The permissions on the share look pretty normal too.
I play around with the account more and more and encounter zero resistance to anything, access wise.
Something must be very wrong - but what?
Finally I go over and speak to the IT people who I'd been working with.
"So," I said. "This account, it's supposed to have a very minimal permissions set right?"
"Yes, the lowest of the low." They reply.
"So how come I can get into all these files?" I ask, and show them my rummaging around the very senior peoples confidential files.
"You shouldn't be able to do that!!"
Now, the three of us are rapidly trying to figure out what the heck is going on. It's surprisingly difficult to figure out.
Eventually, I make what to this day remains one of my all time favorite pen testing discoveries.
This organisation, had somehow, managed to add the entire "Domain Users" group to the "Domain Admins" group!
All 1,500 people who worked there, had domain admin access. And after investigation, we found out it had been like that for 10 months.
Someone couldn't get something working, until they found this "fix".
Amazing.
For more, slightly less mini pen test diaries stories, check out https://infosecdiaries.com.
Alguien construyรณ 35 agentes de pentesting de IA para Claude Code... y es honestamente una locura.
Ataques AD, explotaciรณn web, pentests en la nube, anรกlisis de malware, ingenierรญa inversa, operaciones C2, incluso red teaming de LLM โ todo dentro de un solo marco.
Este es uno de los proyectos de IA de seguridad ofensiva mรกs avanzados que he visto en GitHub รบltimamente.
Seven FuelCMS CVEs documented. XSS callbacks now show IP and headers. Website Scanner detects exposed private keys passively. Scheduled scan exports. API risk filtering.
Also: free scanner for CVE-2026-41940, the cPanel auth bypass exploited for 64 days before a patch existed. No account needed.
Mythos for Offensive Security: XBOW's Evaluation
Anthropic์ Mythos Preview ๋ชจ๋ธ์ ์์ค ์ฝ๋ ๋ถ์๊ณผ ์ทจ์ฝ์ ํ์ง์์ ๊ธฐ์กด ๋ชจ๋ธ ๋๋น ํฐ ์ง์ ์ ๋ณด์๋ค. ํนํ ์์ค ์ฝ๋ ๊ธฐ๋ฐ ์ทจ์ฝ์ ๋ฐ๊ฒฌ๊ณผ ๋ค์ดํฐ๋ธ ์ฝ๋ ๋ถ์, ๋ฆฌ๋ฒ์ค ์์ง๋์ด๋ง์์ ๋ฐ์ด๋ ์ฑ๋ฅ์ ๋ณด์์ผ๋, ๋ผ์ด๋ธ ์ฌ์ดํธ ์ํธ์์ฉ์ด ์ ํ๋๋ฉด ์ฑ๋ฅ์ด ์ ํ๋๋ ํ๊ณ๊ฐ ์๋ค. XBOW์ ํ๊ฐ์ ๋ฐ๋ฅด๋ฉด Mythos Preview๋ ์ฝ๋ ์ฝ๊ธฐ ๋ฅ๋ ฅ์ด ๋งค์ฐ ๋ฐ์ด๋๋ฉฐ, ๋ผ์ด๋ธ ์ฌ์ดํธ์ ๊ฒฐํฉํ ๋ ์ต์ ์ ์ทจ์ฝ์ ํ์ง๊ฐ ๊ฐ๋ฅํ๋ค. ๋ค๋ง, ํ๋จ๋ ฅ์ ๋ค์ ๋ณด์์ ์ด๊ณ ๋ฌธ์ ๊ทธ๋๋ก ํด์ํ๋ ๊ฒฝํฅ์ด ์์ด ์ ๋ฐํ ํ๋กฌํํธ์ ๊ฒ์ฆ ์ธํ๋ผ๊ฐ ํ์ํ๋ค.
https://xbow.com/blog/mythos-offensive-security-xbow-evaluation
#llm #security #vulnerabilitydetection #sourcecodeanalysis #pentesting