Putting #security and minimalism first - I migrated Luminous Onion from a vulnerable base image to Chainguard's image built with #Wolfi dropping the vulnerabilities to a manageable 0 count! All with only 2 lines of code changed. Yes, it's really that easy! Highly recommend checking out Chainguard images for your projects. https://lnkd.in/edSZXMAV #applicationsecurity #containersecurity
Zachary Karpinski’s Post
More Relevant Posts
-
File path traversal, simple case
To view or add a comment, sign in
-
File path traversal, simple case
To view or add a comment, sign in
-
🚀 Version 1.1.1 Released - Nightingale: Docker for Pentesters I’ve just rolled out version 1.1.1, addressing several enhancements and fixes to improve tool capabilities and streamline workflows in the lastest commit. Key Updates: - Added multiple new tools, including Hashcat, naabu, and Trufflehog. - Enhanced secret detection and SQL exploitation capabilities. - Fixed a tagging issue in the main branch. you can find more details here https://lnkd.in/g6XPkczj FYI Here is the latest stable image - https://lnkd.in/gCXCSeEC and for more info - https://lnkd.in/gAjY6XBw #CyberSecurity #PenetrationTesting #DockerTools #nightingale
To view or add a comment, sign in
-
🦎Greptile can now review your pull requests! The hardest part about reviewing PRs is having full context of the codebase, which is exactly what Greptile is great at! Greptile's PR review bot can comment on things like: ✨ potential bugs introduced by the changes ✨ potential security issues introduced by the changes ✨ duplicate code which may exist elsewhere in the codebase ✨ potentially missed edge cases ...and more! Learn more here 👉 https://lnkd.in/eiwnEiHx
To view or add a comment, sign in
-
-
Here is My 1st Writeups About PortSwigger Path Traversal Writeups : https://lnkd.in/gM_bQd_G Please Ignore my mistakes and Follow Zaber Mahmud Asif
To view or add a comment, sign in
-
Lab: Click-jacking with a frame buster script
To view or add a comment, sign in
-
Hello everyone 👋 I just finished creating a pentest report design to be used with Syslifters' Sysreptor based on TCM Security's penetration test sample report. Using Sysreptor saves you loads of time, I recommend you have a look at Sysreptor and maybe even give my report design a try. Using these designs, all you have to do is enter the assessment information in their designated input areas, select your assessment components, enter your finding details, and you're done! I also created a design for TCMS's reports, in case you guys want to ditch Word and try Sysreptor out ;) https://lnkd.in/gDKZfbJP
To view or add a comment, sign in
-
Greptile can now review your PRs with full context of the codebase!
🦎Greptile can now review your pull requests! The hardest part about reviewing PRs is having full context of the codebase, which is exactly what Greptile is great at! Greptile's PR review bot can comment on things like: ✨ potential bugs introduced by the changes ✨ potential security issues introduced by the changes ✨ duplicate code which may exist elsewhere in the codebase ✨ potentially missed edge cases ...and more! Learn more here 👉 https://lnkd.in/eiwnEiHx
To view or add a comment, sign in
-
-
Ultimate Subdomain Enumeration Tool After spending countless hours enumerating subdomains and using various tools like Amass, Sublist3r, Subfinder, and crt.sh, I decided to streamline the process. I’ve built a tool that combines all these tools in one place. Here’s how it works: 1. Enter your target domain. 2. Choose the tools you want to use for enumeration. 3. Compare unique subdomains and check if they’re live. 4. You get a clean list of active subdomains, ready for further testing. I’ve tested it thoroughly, and it works superbly! I’ll be releasing it on GitHub soon for everyone to use and contribute to. Stay tuned! 🚀 When I enrolled in PJPT from TCM Security, Heath Adams built a similar tool, which gave me the idea to create my own version.
To view or add a comment, sign in
-
-
Structure of an URL 👇 https://lnkd.in/ef3NUDc5
To view or add a comment, sign in
Enterprise Account Executive at Chainguard | Champion for Women in Sales & Tech
1yGreat stuff Zachary!