vocalounge.cafe is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance specializing in Vocaloid, UTAU, and anything relevant to vocalsynth culture.

Administered by:

Server stats:

37
active users

#pentesting

0 posts0 participants0 posts today
0x40k<p>Alright, Go developers, listen up! 🚨 Seriously crazy stuff is happening in the Go world right now. We're talking major typosquatting issues. Attackers are slithering in and spreading malware via fake packages, can you believe it?</p><p>So, for goodness sake, pay super close attention to the names of your modules! One little typo and bam! You've got yourself a nasty infection. As a pentester, I see this kind of thing all the time, sadly. Tiny mistakes, HUGE consequences. This malware then installs a backdoor. Totally not cool, right?</p><p>Therefore, check your imports, folks! And make sure you're getting your devs trained up on security. Automated scans? Nice to have, sure, but they're absolutely no substitute for a manual pentest! What are your go-to tools for fighting this kind of attack? Oh, and yeah, IT security *has* to be in the budget, that's just the way it is.</p><p><a href="https://infosec.exchange/tags/golang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>golang</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/typosquatting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>typosquatting</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>
0x40k<p>Hey everyone, what's cooking in the open-source universe? 🤯 I just stumbled upon something that's seriously mind-blowing.</p><p>So, there's this Python library pretending to be a music tool (automslc), but get this – it's actually illegally downloading songs from Deezer! And the worst part? It turns your computer into an accomplice in a huge music piracy operation. Seriously, a digital pirate cove. 🏴‍☠️</p><p>And then there's this npm saga with @ton-wallet/create... Crypto wallet emptied, just like that! 💸</p><p>The moral of the story? Open source rocks, but blindly trusting everything is a recipe for disaster. Always double-check those dependencies! Automated scans are cool, but a real penetration test? That's pure gold. 🥇</p><p>Clients are always so appreciative when we can spot and fix this kind of stuff beforehand!</p><p>Now, I'm curious: What are your go-to methods for keeping your codebase squeaky clean and secure? Any tips or tricks you'd like to share?</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/devsecops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devsecops</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a></p>
Karsten Johansson<p>True Story, bruh:</p><p>Back in the 90's people would go on about how superior emacs is as an editor. And some cheerleaders would hound me about why I "still" used (and still do today) vi... vim actually. Even for doing things like Usenet news, and the email client. Joe was in a lot of email readers, which is pretty much slobberproof, BUT...</p><p>My answer was and still is simple. I hack and break things for a living. I've never seen emacs installed on a bridge, router, or frankly any other network device. Hell, when the web came around, emacs was only rarely on those servers, either. But ed and vi is (was?) on pretty much all of them.</p><p>So that's what I learned. And my personal ecosystem and workflow is all about vi(m) and nothing about emacs.</p><p>Even though I'm a Lisp cheerleader, lol.</p><p>Do I hate emacs? No, but I do very much dislike the overpowering smell of religion that seems permeate it's very existence, like those dirty air lines fuming from the Peanuts character Pigpen.</p><p>Some call me a space cowboy. Some call me a gangsta of <a href="https://infosec.exchange/tags/Lisp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lisp</span></a> :ablobdj: </p><p><a href="https://infosec.exchange/tags/commonlisp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>commonlisp</span></a> <a href="https://infosec.exchange/tags/vi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vi</span></a> <a href="https://infosec.exchange/tags/emacs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>emacs</span></a> <a href="https://infosec.exchange/tags/vim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vim</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/editor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>editor</span></a> <a href="https://infosec.exchange/tags/clisp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clisp</span></a> <a href="https://infosec.exchange/tags/sbcl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sbcl</span></a></p>
nickbearded<p>The website is live!</p><p><a href="https://www.bashcore.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bashcore.org/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/bashcore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bashcore</span></a> <a href="https://mastodon.social/tags/cli" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cli</span></a> <a href="https://mastodon.social/tags/nogui" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nogui</span></a> <a href="https://mastodon.social/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>education</span></a> <a href="https://mastodon.social/tags/bash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bash</span></a></p>
FluConf<p>We are seeking proposals for the security and reverse-engineering track of <a href="https://social.cryptography.dog/tags/fluConf2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fluConf2025</span></a>. While we expect considerable overlap between these topics and those of our privacy and surveillance track, we want to highlight the many ways in which security research differs from privacy.</p><p>Consider submitting proposals for blog articles, presentations, or other formats on any of the following themes:</p><p>* approaches for incorporating security requirements into the software development lifecycle</p><p>* advocacy against stalkerware, resources for personal safety training</p><p>* honeypots, intrusion detection, and monitoring</p><p>* dependency management and static analysis</p><p>* research into cryptographic primitives, sidechannel attacks, and data exfiltration</p><p>* penetration testing and offensive security</p><p>* responsible disclosure, security policies, and related legal issues</p><p>* ransomware gangs, APTs, and other threat actors in the wild</p><p>Apply up until midnight of January 19th, 2025 (anywhere on Earth)</p><p><a href="https://fluconf.online/apply/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">fluconf.online/apply/</span><span class="invisible"></span></a></p><p><a href="https://social.cryptography.dog/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://social.cryptography.dog/tags/openSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openSource</span></a> <a href="https://social.cryptography.dog/tags/dataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataProtection</span></a> <a href="https://social.cryptography.dog/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://social.cryptography.dog/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://social.cryptography.dog/tags/blueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueTeam</span></a> <a href="https://social.cryptography.dog/tags/redTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redTeam</span></a> <a href="https://social.cryptography.dog/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://social.cryptography.dog/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> <a href="https://social.cryptography.dog/tags/secOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secOps</span></a> <a href="https://social.cryptography.dog/tags/surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>surveillance</span></a> <a href="https://social.cryptography.dog/tags/cyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberSecurity</span></a> <a href="https://social.cryptography.dog/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://social.cryptography.dog/tags/threatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatIntel</span></a> <a href="https://social.cryptography.dog/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://social.cryptography.dog/tags/reverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseEngineering</span></a> <a href="https://social.cryptography.dog/tags/passwords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwords</span></a></p>
yamato93<p>🚀 I’m excited to share my Stored XSS Testing Tool! This tool automates Stored XSS testing by injecting payloads and checking their persistence in web applications. 🕵️‍♂️💻</p><p>Check it out on GitHub:<br>🔗 GitHub Repo</p><p>Looking forward to connecting with the cybersecurity community! 👨‍💻🔐</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/XSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XSS</span></a> <a href="https://mastodon.social/tags/PenTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenTesting</span></a> <a href="https://mastodon.social/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a> <a href="https://mastodon.social/tags/GoLang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoLang</span></a> <a href="https://mastodon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.social/tags/Mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mastodon</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>
yamato93<p>🌐 My First Post on Mastodon! 🚀</p><p>I’m excited to share my Reflected XSS Testing Tool with the community! This tool helps penetration testers automate Reflected XSS testing by injecting payloads and logging responses. 🕵️‍♂️💻<br>Features:<br> Fully Dockerized for portability<br> Predefined payloads<br> HTTP response logs<br>Check it out on GitHub:<br>🔗 GitHub Repo<br>Looking forward to connecting with the cybersecurity community! 👨‍💻🔐<br><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/XSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XSS</span></a> <a href="https://mastodon.social/tags/PenTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenTesting</span></a> <a href="https://mastodon.social/tags/GoLang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoLang</span></a> <a href="https://mastodon.social/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a> <a href="https://mastodon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.social/tags/Mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mastodon</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>
Marcel SIneM(S)US<p>Für <a href="https://social.tchncs.de/tags/Pentester" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentester</span></a> und Sicherheitsforscher: <a href="https://social.tchncs.de/tags/KaliLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KaliLinux</span></a> 2024.4 mit 14 neuen Tools | Security <a href="https://www.heise.de/news/Fuer-Pentester-und-Sicherheitsforscher-Kali-Linux-2024-4-mit-14-neuen-Tools-10203399.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Fuer-Pentester-u</span><span class="invisible">nd-Sicherheitsforscher-Kali-Linux-2024-4-mit-14-neuen-Tools-10203399.html</span></a> <a href="https://social.tchncs.de/tags/PenTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenTesting</span></a> <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> :tux:</p>
CAPETOX<p>Tipos de protocolos de VPN</p><p><a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/cybersecuritytips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytips</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://mastodon.social/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a> <a href="https://mastodon.social/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattacks</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://mastodon.social/tags/bugbountytips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbountytips</span></a></p>
Kindred<p><span>If you are interested in cybersecurity and haven't heard of hack the box use my referral link to create an account it will help me a lot. Thank you<br><br></span><a href="https://referral.hackthebox.com/mzADKRi" rel="nofollow noopener noreferrer" target="_blank">https://referral.hackthebox.com/mzADKRi</a><span> </span><a href="https://electricrequiem.com/tags/pentesting" rel="nofollow noopener noreferrer" target="_blank">#pentesting</a><span> </span><a href="https://electricrequiem.com/tags/linux" rel="nofollow noopener noreferrer" target="_blank">#linux</a><span> </span><a href="https://electricrequiem.com/tags/cybersec" rel="nofollow noopener noreferrer" target="_blank">#cybersec</a></p>
Tinker ☀️<p>Soooooo I found a massive vulnerability today, the day before Thanksgiving. </p><p>Buuuuuuut it's looks like its existed for a couple of years.</p><p>So, should I report it RIGHT NOW!!!! The day before thanksgiving? Or wait until next week.</p><p>On one hand, they'll have to react to it as its huge. And it could interrupt their time with family and a major holiday.</p><p>On the other hand, it's been around for so long, what's another couple of days going to change anything?</p><p>On the third hand, if this gets exploited over the holiday weekend, it's on me and could affect even more people.</p><p>Hmmmmmmm.... choices choices. </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/risk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>risk</span></a></p>
Christopher Bauer :debian: :i3wm: :blobcatthinkingglare:<p>Hey everyone, here is my fifth post on the Ansible config and my final post on OpenVPN for Orange Cyber Defense's Game of Active Directory on bare-metal Proxmox. Hope you like lots of screencaps and written instructions!</p><p>With that, I can call this a success and wrap up my take on installing GOAD in an on prem home-lab. As always, I have to recognize Mayfly277's initial path-breaking work in providing the original guide.</p><p>Winter is coming. Happy pentesting! </p><p><a href="https://christopherbauer.org/2024/11/18/goad-ansible.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">christopherbauer.org/2024/11/1</span><span class="invisible">8/goad-ansible.html</span></a></p><p><a href="https://christopherbauer.org/2024/11/23/goad-vpn.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">christopherbauer.org/2024/11/2</span><span class="invisible">3/goad-vpn.html</span></a></p><p><a href="https://infosec.exchange/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxmox</span></a> <a href="https://infosec.exchange/tags/GOAD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GOAD</span></a> <a href="https://infosec.exchange/tags/GOADv2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GOADv2</span></a></p>
dan_nanni<p>Linux is a highly attractive platform for offensive security, offering a diverse array of pentesting tools, due to its flexibility, open-source nature, and robust command-line capabilities</p><p>Here is a collection of Linux-based cybersecurity tools commonly used by red teams. Remember, using these tools without authorization is illegal and unethical—stay informed, but keep it legal!</p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>
maschmi<p>Seeing four rabbit holes named <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> , <a href="https://mastodon.social/tags/proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxmox</span></a>, <a href="https://mastodon.social/tags/terraform" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>terraform</span></a> and <a href="https://mastodon.social/tags/ansible" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ansible</span></a> and start to dig at all four may have not been the wisest choice to make. So much new stuff to learn, it's kind of intimidating. But actually my brain feels very much alive.</p><p>I just need to organize the topics and other things a bit better, otherwise I lose track of stuff.... And I need to stick to note keeping. And in a few months I need a break from tech stuff. Maybe.</p>
Christopher Bauer :debian: :i3wm: :blobcatthinkingglare:<p>Hey all, here are my third and fourth posts on installing Orange CyberDefense's Game of Active Directory (GOAD). </p><p>Not too much to troubleshoot with Packer and Terraform in these posts, they're relatively straightforward. Still, the install as a whole is complicated enough to justify these posts to contribute to a diversity and abundance of information that I found lacking when I got started.</p><p>As I said before, I'm deeply indebted to Mayfly277's OG instructions. </p><p><a href="https://infosec.exchange/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxmox</span></a> <a href="https://infosec.exchange/tags/GOAD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GOAD</span></a> </p><p><a href="https://christopherbauer.org/2024/11/14/templates.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">christopherbauer.org/2024/11/1</span><span class="invisible">4/templates.html</span></a></p><p><a href="https://christopherbauer.org/2024/11/17/goad-terraform.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">christopherbauer.org/2024/11/1</span><span class="invisible">7/goad-terraform.html</span></a></p>
halil deniz<p>Advanced ARP Discovery Tool: Network Discovery with python </p><p><a href="https://denizhalil.com/2024/11/18/arp-discovery-tool-python/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">denizhalil.com/2024/11/18/arp-</span><span class="invisible">discovery-tool-python/</span></a></p><p><a href="https://mastodon.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://mastodon.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://mastodon.social/tags/pythonprogramming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pythonprogramming</span></a></p>
Josh Summitt<p>If you hate writing <br><a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> / <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> reports then we have <a href="https://infosec.exchange/tags/securitytools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securitytools</span></a> for you! You can download Faction here:</p><p><a href="https://github.com/factionsecurity/faction" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/factionsecurity/fac</span><span class="invisible">tion</span></a></p><p>We are looking for feedback. We want to make <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> easier and give you more time to hack!<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a><br> <br><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
dan_nanni<p>A honeypot is a defensive security mechanism that creates a decoy system to lure attackers, allowing system administrators or security researchers to monitor and analyze malicious activities and to prevent similar attacks in the future</p><p>Here are a list of honeypots you can set up on <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> 😎👇</p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>
Christopher Bauer :debian: :i3wm: :blobcatthinkingglare:<p>Hey all, here is my second post on installing Orange CyberDefense's Game of Active Directory. </p><p>I found setting up the provisioner a little tricky for reasons of needing an older version of python and due to Ansible dependencies. I've laid out all the steps I took in this post.</p><p>I'm deeply indebted to Mayfly277's OG instructions. I just felt more information in this space would help, and I hope someone finds it useful.</p><p><a href="https://infosec.exchange/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxmox</span></a> <a href="https://infosec.exchange/tags/GOAD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GOAD</span></a></p><p><a href="https://christopherbauer.org/2024/11/11/provisioner.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">christopherbauer.org/2024/11/1</span><span class="invisible">1/provisioner.html</span></a></p>
halil deniz<p>You can also access the discounted prices of our books with the codes below</p><p>EFKPI4P9</p><p><a href="https://buymeacoffee.com/halildeniz/extras" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">buymeacoffee.com/halildeniz/ex</span><span class="invisible">tras</span></a></p><p><a href="https://mastodon.social/tags/buymeacoffee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>buymeacoffee</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://mastodon.social/tags/pythonprogramming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pythonprogramming</span></a></p>