sueden.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Eine Community für alle, die sich dem Süden hingezogen fühlen. Wir können alles außer Hochdeutsch.

Serverstatistik:

1,8 Tsd.
aktive Profile

#Pentesting

13 Beiträge12 Beteiligte1 Beitrag heute
BSides RDU<p>10 days left until BSidesRDU 2025!!!!!</p><p>$55.00 ticket and free parking</p><p>Friday, Sep 12, 2025 at 8:30 AM to 6:00 PM EDT</p><p>NCSU McKimmon Center, 1101, Gorman Street, Raleigh, NC, 27606, United States <br><a href="https://www.eventzilla.net/e/bsidesrdu-2025-2138649409" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eventzilla.net/e/bsidesrdu-202</span><span class="invisible">5-2138649409</span></a><br> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
dan_nanni<p>Steganography is the practice of concealing secret information within ordinary data such as images, audio, or text so that the hidden content is not detectable to unintended observers</p><p>Here are freely available steganography tools 😎👇 <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/datasecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datasecurity</span></a></p><p>Find a high-res pdf book with all my <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> related infographics from <a href="https://study-notes.org/cybersecurity-ebook.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">study-notes.org/cybersecurity-</span><span class="invisible">ebook.html</span></a></p>
BSides RDU<p>11 days left until BSidesRDU 2025!!!!!</p><p>$45.00 ticket and free parking</p><p>Friday, Sep 12, 2025 at 8:30 AM to 6:00 PM EDT</p><p>NCSU McKimmon Center, 1101, Gorman Street, Raleigh, NC, 27606, United States <br><a href="https://www.eventzilla.net/e/bsidesrdu-2025-2138649409" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eventzilla.net/e/bsidesrdu-202</span><span class="invisible">5-2138649409</span></a><br> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
PentHertz<p>🚀 Major updates dropping for rfswift.io before September!<br>🆕 Ghidra 11.4.2<br>🎯 ImHex 1.37.x<br>🌐 NEW: Caido for embedded web pentesting<br>Plus enhanced tools for:<br>📡 <a href="https://infosec.exchange/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a> • 🚗 <a href="https://infosec.exchange/tags/Automotive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Automotive</span></a> • 🏷️ <a href="https://infosec.exchange/tags/RFID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RFID</span></a> • 📱 <a href="https://infosec.exchange/tags/Mobile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mobile</span></a> • 🔍 <a href="https://infosec.exchange/tags/Reversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reversing</span></a> • ⚡ <a href="https://infosec.exchange/tags/Hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hardware</span></a> attacks <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/iot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iot</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
BSides RDU<p>12 days left until BSidesRDU 2025!!!!!</p><p>$45.00 ticket and free parking</p><p>Friday, Sep 12, 2025 at 8:30 AM to 6:00 PM EDT</p><p>NCSU McKimmon Center, 1101, Gorman Street, Raleigh, NC, 27606, United States <br><a href="https://www.eventzilla.net/e/bsidesrdu-2025-2138649409" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eventzilla.net/e/bsidesrdu-202</span><span class="invisible">5-2138649409</span></a><br> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
BSides RDU<p>13 days left until BSidesRDU 2025!!!!!</p><p>$45.00 ticket and free parking</p><p>Friday, Sep 12, 2025 at 8:30 AM to 6:00 PM EDT</p><p>NCSU McKimmon Center, 1101, Gorman Street, Raleigh, NC, 27606, United States <br><a href="https://www.eventzilla.net/e/bsidesrdu-2025-2138649409" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eventzilla.net/e/bsidesrdu-202</span><span class="invisible">5-2138649409</span></a><br> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
BSides RDU<p>Need a place to stay? Check out these hotels <br>StateView Hotel on NCSU Campus &amp; Aloft Raleigh</p><p><a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/kalilinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kalilinux</span></a> <a href="https://infosec.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a><br><a href="https://bsidesrdu.org/#hotels" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bsidesrdu.org/#hotels</span><span class="invisible"></span></a></p>
pentest-tools.com<p>🤝 We’re excited to announce our new partnership with Allnet GmbH!</p><p>This means easier access to our vulnerability scanning product for consultants, internal teams, and MSPs across Germany, Austria, and Switzerland.</p><p>🇩🇪 What makes this special: Allnet adds their local expertise and support, so you'll be able to get even more value from your pentesting workflows if you're in the DACH region.</p><p>🌍 Stronger tools + local know-how = better security for more organizations.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/MSPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSPs</span></a> <a href="https://infosec.exchange/tags/consulting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>consulting</span></a></p>
SecBurg<p>Caido v0.51.0 released</p><p><a href="https://secburg.com/posts/caido-v0510-released/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">secburg.com/posts/caido-v0510-</span><span class="invisible">released/</span></a></p><p><a href="https://infosec.exchange/tags/caido" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>caido</span></a> <a href="https://infosec.exchange/tags/tools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tools</span></a> <a href="https://infosec.exchange/tags/webapp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapp</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
Bill<p>I have been reading "The Language of Deception" by Justin Hutchins and woo boy is it nothing like those quick list of 'look at the cool stuff I've hacked' low effort books you see so often. This is the real deal. He put his time in on this going back to the 2014 scope, and it really shows. Absolutely worth the read.</p><p><a href="https://infosec.exchange/tags/genai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>genai</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
BSides RDU<p>The Triangle’s cybersecurity community is gathering at <a href="https://infosec.exchange/tags/BSidesRDU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSidesRDU</span></a>. Be part of it as a sponsor <a href="https://bsidesrdu.org/#sponsors" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bsidesrdu.org/#sponsors</span><span class="invisible"></span></a><br><a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/kalilinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kalilinux</span></a> <a href="https://infosec.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a></p>
Pen Test Partners<p>Ready to take Bluetooth Low Energy hacking a step further?</p><p>In part two, Sam Thom moves on from the free Android/Linux setup and brings in budget hardware. A £20 Sonoff dongle for sniffing. A £10 Nordic nRF52 for control.</p><p>With Sniffle and Wireshark, you can capture traffic. With nRFConnect, you can write to characteristics and make devices beep on command. It’s a cheap but powerful setup before we move on to advanced tools in the next post.</p><p>📌 <a href="https://www.pentestpartners.com/security-blog/start-hacking-bluetooth-low-energy-today-part-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/start-hacking-bluetooth-low-energy-today-part-2/</span></a></p><p><a href="https://infosec.exchange/tags/BLEHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BLEHacking</span></a> <a href="https://infosec.exchange/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a> <a href="https://infosec.exchange/tags/BLE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BLE</span></a> <a href="https://infosec.exchange/tags/HardwareHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareHacking</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://infosec.exchange/tags/Wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireshark</span></a></p>
pentest-tools.com<p>🔐 When security has to keep up with business, flexibility wins.</p><p>Arco IT GmbH needed more than just another scanner. They wanted:</p><p>⚙️ A cloud-native platform that fits into any client setup<br>⚡️ Fast, reliable results <br>📑 Reporting that works straight out of the box </p><p>Old-school, hardware-heavy tools slowed them down. With Pentest-Tools.com, they got the agility to deliver both trustworthy and efficient assessments from day #1.</p><p>As Marti Berini Sarrias, Arco IT Senior Security Architect, puts it:<br>“We couldn’t keep relying on local boxes or manual processes. We needed cloud-native scanning that was reliable, fast, and insightful.”</p><p>💡 See how Pentest-Tools.com helped Arco IT solve its scaling problems ➡️ <a href="https://pentest-tools.com/case-studies/arco-it" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pentest-tools.com/case-studies</span><span class="invisible">/arco-it</span></a> </p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>automation</span></a> <a href="https://infosec.exchange/tags/MSPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSPs</span></a> <a href="https://infosec.exchange/tags/consulting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>consulting</span></a></p>
ReynardSec<p>You’ve probably heard of Cold Boot attacks [1], but have you ever seen a practical example? If not, I recommend reading this report <a href="https://www.securitum.com/public-reports/medical-company-en.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securitum.com/public-reports/m</span><span class="invisible">edical-company-en.pdf</span></a> (point 002, page 15).</p><p>There is even more: for example, as a bonus, in point 001 there’s an interesting analysis concerning the incorrect configuration of PCR banks of the disk encryption process using LUKS.</p><p>[1] <a href="https://en.wikipedia.org/wiki/Cold_boot_attack" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Cold_boo</span><span class="invisible">t_attack</span></a></p><p><a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardware</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/computers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computers</span></a></p>
Pen Test Partners<p>Want to try Bluetooth Low Energy hacking but not sure where to begin?</p><p>This is the first post in a three-part series where Sam Thom takes a £2 key-finder tag and makes it beep by capturing and replaying its BLE traffic with free tools. It’s a simple, practical way to see how GATT, handles, and characteristics work without investing in expensive gear.</p><p>If you’ve been meaning to get into BLE, this is an easy starting point that sets you up for the more advanced tools and techniques we’ll cover in the series.</p><p>📌<a href="https://www.pentestpartners.com/security-blog/start-hacking-bluetooth-low-energy-today-part-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/start-hacking-bluetooth-low-energy-today-part-1/</span></a></p><p><a href="https://infosec.exchange/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a> <a href="https://infosec.exchange/tags/BLE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BLE</span></a> <a href="https://infosec.exchange/tags/HardwareHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareHacking</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://infosec.exchange/tags/Wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireshark</span></a></p>
maschmi<p>Learning about <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> had a nice side effect: Keeping logs of what I do and have done is now basically second nature. This also helps in my dayjob and creates documentation basically as I go.</p><p>Did you know you can log your terminal with <a href="https://mastodon.social/tags/tmux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tmux</span></a> <a href="https://github.com/tmux-plugins/tmux-logging" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/tmux-plugins/tmux-l</span><span class="invisible">ogging</span></a>? Or by using `script` and `scriptreplay` <a href="https://www.geeksforgeeks.org/linux-unix/script-command-in-linux-with-examples/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">geeksforgeeks.org/linux-unix/s</span><span class="invisible">cript-command-in-linux-with-examples/</span></a></p><p>When using script, do not wonder about the color-code-chars in the log :)</p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/terminal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>terminal</span></a></p>
Mike Sheward<p>Mini Pen Test Diaries story, happened in the last couple of years. The debrief meeting went like this:</p><p>“In your report you said you we’re able to crack the domain admin account instantly because the password was stored using the LM hash?”</p><p>“That’s right, yes.”</p><p>“But we’ve had LM hashing disabled for like 15 years, that can’t be possible?!”</p><p>“When was the last time that password was changed?”</p><p>“Well it’s been the same since I got here, 20 years ago.”</p><p>“And what hashing mechanism do you think was used back then?”</p><p>“Oh no."</p><p>For more, less mini stories like this, check out <a href="https://infosecdiaries.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">infosecdiaries.com</span><span class="invisible"></span></a>.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a></p>
parrotboi~<p>that feeling when there is a vulnerable service with a POC exploit but default payloads don't work O.O so you now have to sit down and try modifications ;*(<br>.<br><a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a></p>
ReynardSec<p>„Recursive Request Exploits (RRE) trace API chains backward from a protected resource (like a video stream) back to it's origin.<br>If any upstream API is unauthenticated, the whole chain can be abused to bypass access. This Burp extension automates this to find low-trust inputs that generate high-value outputs”</p><p><a href="https://github.com/jumpycastle/rre-burp" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/jumpycastle/rre-burp</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/webdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webdev</span></a> <a href="https://infosec.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
parrotboi~<p>Has anyone played around with this or know of alternatives, I am thinking of rolling it out for the team, I played with it a bit looks really awesome 👌 </p><p><a href="https://github.com/Cyberwatch/Pentest-Collaboration-Framework" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Cyberwatch/Pentest-</span><span class="invisible">Collaboration-Framework</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>