<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>pentest</title>
    <link rel="self" type="application/atom+xml" href="https://links.pgmac.net.au/guest/tags/128/feed"/>
    <updated>2026-04-20T19:43:59+10:00</updated>
    <id>https://links.pgmac.net.au/guest/tags/128/feed</id>
            <entry>
            <id>https://links.pgmac.net.au/links/1765</id>
            <title type="text"><![CDATA[GitHub - TheMorpheus407/RepoLens: Multi-lens code audit tool — 280 expert AI agents for code review, security testing, and infrastructure auditing · GitHub]]></title>
            <link rel="alternate" href="https://github.com/TheMorpheus407/RepoLens" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1765"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Multi-lens code audit tool — 280 expert AI agents for code review, security testing, and infrastructure auditing - TheMorpheus407/RepoLens]]>
            </summary>
            <updated>2026-04-20T00:34:28+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1706</id>
            <title type="text"><![CDATA[METATRON - Open-Source AI Penetration Testing Assistant Brings Local LLM Analysis to Linux]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/metatron-ai-penetration-testing/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1706"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A new open-source penetration testing framework called METATRON is gaining attention in the security research community for its fully offline, AI-driven approach to vulnerability assessment.]]>
            </summary>
            <updated>2026-04-07T09:04:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1059</id>
            <title type="text"><![CDATA[Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyata | The Control Plane for Agentic Identity]]></title>
            <link rel="alternate" href="https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1059"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your […]]]>
            </summary>
            <updated>2025-08-07T18:54:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/954</id>
            <title type="text"><![CDATA[Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/kali-gpt/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/954"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Kali GPT, a specialized AI model built on GPT-4 architecture, has been specifically developed to integrate seamlessly with Kali Linux, offering unprecedented support for offensive security professionals and students alike.]]>
            </summary>
            <updated>2025-06-08T08:29:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/904</id>
            <title type="text"><![CDATA[GitHub - OperantAI/woodpecker: Red Teaming for AI and Cloud]]></title>
            <link rel="alternate" href="https://github.com/OperantAI/woodpecker" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/904"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Red Teaming for AI and Cloud. Contribute to OperantAI/woodpecker development by creating an account on GitHub.]]>
            </summary>
            <updated>2025-05-29T09:21:24+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/846</id>
            <title type="text"><![CDATA[Frida Penetration Testing Tool Kit Released With New APIs for Threat Monitoring]]></title>
            <link rel="alternate" href="https://search.app/1yiQn4N9PWiF9ZtL8" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/846"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Frida 16.7.0, the latest version of the popular dynamic instrumentation toolkit, has been released with powerful new APIs specifically.]]>
            </summary>
            <updated>2025-05-28T01:03:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/730</id>
            <title type="text"><![CDATA[Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Secu]]></title>
            <link rel="alternate" href="https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/730"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Introduction
Hello, I’m RyotaK (@ryotkak
), a security engineer at Flatt Security Inc.
A few days ago, I was upgrading my home lab network, and I decided to upgrade the OpenWrt
 on my router.1 After accessing the LuCI, which is the web interface of OpenWrt, I noticed that there is a section called Attended Sysupgrade, so I tried to upgrade the firmware using it.
After reading the description, I found that it states it builds new firmware using an online service.]]>
            </summary>
            <updated>2026-01-26T04:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/547</id>
            <title type="text"><![CDATA[Learn AWS Pentesting]]></title>
            <link rel="alternate" href="https://www.youtube.com/playlist?list=PLMoaZm9nyKaNRN0SoR_PBVYc_RAhbZdG4" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/547"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Share your videos with friends, family and the world]]>
            </summary>
            <updated>2025-12-24T04:00:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/357</id>
            <title type="text"><![CDATA[Purple Knight Active Directory Security Assessment]]></title>
            <link rel="alternate" href="https://www.purple-knight.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/357"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Purple Knight, built by Semperis, is the top Active Directory security assessment tool today. Identify threats and get prioritized guidance.]]>
            </summary>
            <updated>2026-01-22T16:00:27+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/229</id>
            <title type="text"><![CDATA[The Evil-Twin Framework: A tool for improving WiFi security | Opensource.co]]></title>
            <link rel="alternate" href="https://opensource.com/article/19/1/evil-twin-framework" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/229"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Pen-testing tool aims to protect network access points against a host of threats.]]>
            </summary>
            <updated>2026-01-07T16:00:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/155</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/23383]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/23383" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/155"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-19T08:00:24+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/152</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/23361]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/23361" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/152"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-18T08:00:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/107</id>
            <title type="text"><![CDATA[Home - PingCastle]]></title>
            <link rel="alternate" href="https://www.pingcastle.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/107"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Because the Active Directory security lies in the process and not in expensive tools, our solution is simple: download PingCastle and apply its methodology.]]>
            </summary>
            <updated>2026-03-04T06:00:21+10:00</updated>
        </entry>
    </feed>
