AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
CICD Risks - Part 2
Deep fence threat mapper looks for threats in your production platforms and ranks those threats based on risk of exploit. Pup process HTML at the command line reads from SDN. A project discovery sequel injection chain use a combination of subfinder HTTP acts katana GF and sequel map se to run sequel injection testing at scale. And a conversation with our kong zang of Jupiter one about what mistakes we keep making when it comes to vulnerability management.