Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blackhillsinfosec.com

Get the latest updates from directly as they happen.

Follow now 131 followers

Latest posts

Last updated about 9 hours ago

Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 2: Copilot

about 9 hours ago

A common use case for LLMs is rapid software development. One of...

Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 1: Burpference

7 days ago

Artificial Intelligence (AI) has been a hot topic in information technology and...

Using a Proxy for Mobile Applications That Are System Proxy Unaware

14 days ago

This is a foolproof guide to intercepting traffic from mobile applications built...

How to Root Android Phones

21 days ago

This blog will cover how to root an AVD emulator and a...

Communicating Security to the C-Suite: A Strategic Approach

28 days ago

Engaging with the C-suite is not just about addressing security concerns or...

Offline Memory Forensics With Volatility

about 1 month ago

Volatility is a memory forensics tool that can pull SAM hashes from...

Getting Started with AI Hacking: Part 1

about 1 month ago

You may have read some of our previous blog posts on Artificial...

Go-Spoof: A Tool for Cyber Deception

about 2 months ago

Go-Spoof brings an old tool to a new language. The Golang rewrite...

How to Test Adversary-in-the-Middle Without Hacking Tools

about 2 months ago

In this video, Michael Allen discusses how to test Adversary-in-the-Middle attacks without...

Canary in the Code: Alert()-ing on XSS Exploits

about 2 months ago

I’ve been a web application pentester for a while now and over...

How to Hack Wi-Fi with No Wi-Fi

about 2 months ago

In this video, John Strand and his team discuss the challenges of...

Introducing Orbit

2 months ago

When I set out to build Orbit, I knew that the interface...