Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

Darknet – The Darkside

Get the latest updates from Darknet – The Darkside directly as they happen.

Follow now 880 followers

Latest posts

Last updated 1 day ago

Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

3 days ago

Reconnoitre automates network reconnaissance and service enumeration for penetration testers and red...

Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

6 days ago

Scanners-Box is an open-source reconnaissance and scanning toolkit for red teams and...

Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

8 days ago

Offensive red teaming of large language models (LLMs) in 2025 – actionable...

gitlab-runner-research – PoC for abusing self-hosted GitLab runners

10 days ago

gitlab-runner-research: PoC scripts demonstrating abuse of self-hosted GitLab runners and practical hardening...

mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

13 days ago

mcp-scanner: Python tool to scan Model Context Protocol servers for prompt injection...

Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

15 days ago

Deepfake-as-a-Service 2025. How voice cloning and synthetic media fraud hit enterprises, with...

Reaper – Unified Application Security Testing with AI Support

17 days ago

Reaper – an open-source AppSec testing framework combining recon, proxying, fuzzing and...

NetExec – Network Execution Toolkit for Windows and Active Directory

20 days ago

NetExec provides multi-protocol network execution for Windows Active Directory environments. Install, run...

Post-Quantum Cryptography in 2025 – Migration Paths, Early Movers and CISO/RedTeam Impact

22 days ago

Post-quantum cryptography in 2025: standards, hybrid migration, and what CISOs and red...

XRayC2 – Weaponizing AWS X-Ray for Covert Command and Control (C2)

24 days ago

XRayC2 shows how AWS X-Ray can be abused as a covert command...

HoneyBee – Misconfigured App Generator for Red Team Validation

27 days ago

HoneyBee generates intentionally misconfigured Docker environments and Nuclei templates using LLMs so...

Exploit-as-a-Service Resurgence in 2025 – Broker Models, Bundles & Subscription Access

29 days ago

Exploit-as-a-Service in 2025: how exploit brokerages, subscription bundles, and underground access models...