A honeypot is a deliberately exposed decoy system or service designed to attract attackers so their behavior, tools, and techniques can be observed and analyzed.

Here are a list of honeypots you can set up on Linux ๐Ÿ˜Ž๐Ÿ‘‡

Find high-res pdf ebooks with all my cybersecurity related infographics at https://study-notes.org

#linux #cybersecurity #pentesting #infosec #kalilinux

Hey infosec folks ๐Ÿ‘‹

I built RYN27 โ€” a free, open-source CLI recon tool written in Python.
MIT licensed โ€” fork it, contribute, do whatever you want with it.

Iโ€™d love feedback from people who actually do this work.

What it does:

๐Ÿ” WHOIS ยท Full DNS enumeration ยท Subdomain brute-force
๐Ÿ”’ SSL/TLS cert inspection with expiry countdown
โšก Threaded port scan + banner grabbing (30 workers)
๐Ÿ“Š HTTP security header audit with 0โ€“100% scoring
๐ŸŒ IP geolocation + proxy/VPN detection
โœ‰๏ธ Email & contact harvester
๐Ÿ› ๏ธ Tech stack fingerprinting
๐Ÿ“„ robots.txt reader, metadata crawler, zone transfer

19 modules. One interactive menu. Zero config.

Runs on:
Linux ยท macOS ยท Windows ยท Termux โœ“

All dependencies auto-install on first run.

If you try it โ€” I genuinely want to know:

โ†’ Whatโ€™s missing?
โ†’ Whatโ€™s broken?
โ†’ What would you do differently?

Open to all feedback, suggestions, PRs, criticism โ€” all of it. ๐Ÿ™

๐Ÿ”— https://github.com/ruyynn/RYN27

โญ A star helps more people find it

#infosec #bugbounty #osint #recon #pentesting #opensource #python

Our pentest professionals at #usdHeroLab identified several vulnerabilities in #KofaxCommunicationServer (KCS) and in the #ArcGIS scripting language Arcade ranging from path traversal to XSS.

All #vulnerabilities were responsibly reported to the vendors.

๐Ÿ‘‰ Details on our #SecurityAdvisories can be found here: https://www.usd.de/en/security-advisories-kofax-communication-server-arcgis-arcade/

#Kofax #InfoSec #CyberSecurity #Pentesting #AppSec #Hacking

Security Advisories: Kofax Communication Server & ArcGIS | usd AG

Our penetration testing professionals have identified critical vulnerabilities in Kofax Communication Server and ArcGIS Arcade. Learn more here.

more security. usd AG
From pentesting tips to cloud defense, todayโ€™s curated cyber playlist has it all. ๐ŸŽฅ https://www.youtube.com/playlist?list=PLXqx05yil_mdh4Ohb1HI2oWy0OXhX9OqO
#PenTesting #AppSec #CyberSecurity #ThreatIntelligence #IncidentResponse
260319 rootshell.online

YouTube

A good penetration tester is tenacious.

#security #pentesting

Quantum computers may break todayโ€™s RSA and ECC in about 3 years using hybrid CPU + GPU + quantum, exposing TLS VPN keys.

OTW and David Bombal explain the post quantum gap and risks.

https://youtu.be/pZZxYN9Pa9Q?si=1-Jag6Qxv-L5uT3N
@davidbombal
#cybersecurity #encryption #cryptography #hacking #infosec #pentesting

#Introduction

Hello everyone! Just migrated over and looking to connect with folks in a few different spaces.

Iโ€™m a Texas-based cyber expert currently diving deep into Python and Cybersecurity (specifically #BugBounty and #Pentesting). When Iโ€™m not looking for vulnerabilities, Iโ€™m usually analyzing Gold charts and SMC/ICT trading setups. ๐Ÿ“ˆ

Also big into health, fitness, . Looking forward to learning from the community here!

#Python #CyberSec #Trading #ICT #Texas #Infosec #TradingCommunity

WEBINAR โ€“ TOMORROW โณ

๐—Ÿ๐—ฎ๐˜€๐˜ ๐—ฐ๐—ต๐—ฎ๐—ป๐—ฐ๐—ฒ ๐˜๐—ผ ๐—ฟ๐—ฒ๐—ด๐—ถ๐˜€๐˜๐—ฒ๐—ฟ: https://outpost24.wistia.com/live/events/iwupxfel25

This session is perfect for anyone interested in how Penetration Testing as a Service (PTaaS) and External Attack Surface Management (EASM), two seemingly separate disciplines, together can create stronger, measurable digital risk protection.

March 19, 2026 I 4:00 PM CET I Marcelo Castro Escalada, Jacob Ent

#ASM #PTaaS #PenTesting #EASM #InfoSec

๐Ÿฆœ El Curso de Hacking ร‰tico estรก disponible de manera permanente en el aula virtual con acceso inmediato. ๐Ÿ“ฑ WhatsApp: https://wa.me/51949304030 ๐ŸŒŽ https://www.reydes.com/archivos/cursos/Curso_Hacking_Etico.pdf #ethicalhacking #cybersecurity #infosec #penetrationtesting #pentesting #whitehat #hacking

Will this scan overload my prod server?

How do you automatically confirm a finding?

Can I scan internal infrastructure or only public assets?

What does a report look like?

These are questions you ask when youโ€™re about to trust a security tool with real work.

We answer them directly in the Pentest-Tools.com FAQ - with specifics on scan safety, validation evidence, data storage, and much, MUCH more.

The answers for your questions are here ๐Ÿ‘‰ https://pentest-tools.com/product/faq

#offensivesecurity #vulnerabilitymanagement #pentesting