A security researcher has published details and proof-of-concept (PoC) code for a macOS vulnerability that could be exploited to get…
A security researcher has published details and proof-of-concept (PoC) code for a macOS vulnerability that could be exploited to get…
Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis,…
The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer…
Vesta Vesta is a static analysis of vulnerabilities, Docker, and Kubernetes cluster configuration detect toolkit. It inspects Kubernetes and Docker…