Offensive red teaming of large language models (LLMs) in 2025 – actionable tactics, case studies, and CISO controls for GenAI risk
gitlab-runner-research – PoC for abusing self-hosted GitLab runners
gitlab-runner-research: PoC scripts demonstrating abuse of self-hosted GitLab runners and practical hardening and detection guidance.
mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents
mcp-scanner: Python tool to scan Model Context Protocol servers for prompt injection, jailbreaks, and insecure tool patterns.
Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses
Deepfake-as-a-Service 2025. How voice cloning and synthetic media fraud hit enterprises, with case studies, detection tactics, and CISO actions.
Reaper – Unified Application Security Testing with AI Support
Reaper – an open-source AppSec testing framework combining recon, proxying, fuzzing and AI-agent workflows for penetration testers and red teams.
NetExec – Network Execution Toolkit for Windows and Active Directory
NetExec provides multi-protocol network execution for Windows Active Directory environments. Install, run and use nxc for lateral movement, enumeration and command execution.
Post-Quantum Cryptography in 2025 – Migration Paths, Early Movers and CISO/RedTeam Impact
Post-quantum cryptography in 2025: standards, hybrid migration, and what CISOs and red teams should do about harvest-now-decrypt-later risk.
XRayC2 – Weaponizing AWS X-Ray for Covert Command and Control (C2)
XRayC2 shows how AWS X-Ray can be abused as a covert command and control channel. Practical walkthrough, install, attack scenario, detections.
HoneyBee – Misconfigured App Generator for Red Team Validation
HoneyBee generates intentionally misconfigured Docker environments and Nuclei templates using LLMs so red teams can rehearse exploitation and validate detection.
Exploit-as-a-Service Resurgence in 2025 – Broker Models, Bundles & Subscription Access
Exploit-as-a-Service in 2025: how exploit brokerages, subscription bundles, and underground access models are reshaping cyber crime economics.










