<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>scanning</title>
    <link rel="self" type="application/atom+xml" href="https://links.pgmac.net.au/guest/tags/15/feed"/>
    <updated>2026-05-06T23:10:39+10:00</updated>
    <id>https://links.pgmac.net.au/guest/tags/15/feed</id>
            <entry>
            <id>https://links.pgmac.net.au/links/1734</id>
            <title type="text"><![CDATA[A security scanner as fast as a linter – written in Rust]]></title>
            <link rel="alternate" href="https://github.com/peaktwilight/foxguard" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1734"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A linter-fast, local-first security scanning tool written in rust. - PwnKit-Labs/foxguard]]>
            </summary>
            <updated>2026-04-12T14:41:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1417</id>
            <title type="text"><![CDATA[Show HN: Whosthere: A LAN discovery tool with a modern TUI, written in Go]]></title>
            <link rel="alternate" href="https://github.com/ramonvermeulen/whosthere" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1417"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Local Area Network discovery tool with a modern Terminal User Interface (TUI) written in Go.  Discover, explore, and understand your LAN in an intuitive way. Knock Knock.. who&amp;#039;s there? 🚪 - ramonvermeulen/whosthere]]>
            </summary>
            <updated>2026-01-24T13:20:43+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1415</id>
            <title type="text"><![CDATA[GitHub - scanopy/scanopy: Clean network diagrams. One-time setup, zero upkeep.]]></title>
            <link rel="alternate" href="https://github.com/scanopy/scanopy" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1415"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Clean network diagrams. One-time setup, zero upkeep. - scanopy/scanopy]]>
            </summary>
            <updated>2026-01-24T07:15:28+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/791</id>
            <title type="text"><![CDATA[Secret scanning detects Base64-encoded GitHub tokens - GitHub Changelog]]></title>
            <link rel="alternate" href="https://github.blog/changelog/2025-02-14-secret-scanning-detects-base64-encoded-github-tokens/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/791"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[GitHub continually updates its detectors for secret scanning with new patterns and upgrades of existing patterns, ensuring your repositories have comprehensive detection for different secret types. GitHub now automatically detects…]]>
            </summary>
            <updated>2025-05-28T00:54:06+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/543</id>
            <title type="text"><![CDATA[Nuclei: Open-source vulnerability scanner - Help Net Security]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2024/08/26/nuclei-open-source-vulnerability-scanner/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/543"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Nuclei is a fast and customizable open-source vulnerability scanner powered by YAML-based templates. With its flexible templating system, Nuclei can be]]>
            </summary>
            <updated>2025-12-24T04:00:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/484</id>
            <title type="text"><![CDATA[Security overview dashboards secret scanning metrics and enablement trends]]></title>
            <link rel="alternate" href="https://github.blog/changelog/2024-07-19-security-overview-dashboards-secret-scanning-metrics-and-enablement-trends-reports-are-now-generally-available/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/484"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Today, we’re excited to announce the general availability of our new organization and enterprise-level security overview dashboards, alongside enhanced secret scanning metrics and the enablement trends reports. These features are…]]>
            </summary>
            <updated>2025-12-13T00:00:12+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/478</id>
            <title type="text"><![CDATA[OXO vulnerability scanning orchestrator for the modern age]]></title>
            <link rel="alternate" href="https://oxo.ostorlab.co/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/478"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[OXO is a vulnerability scanning orchestrator that automatically binds tools together allowing for rapid scale.]]>
            </summary>
            <updated>2025-12-06T12:00:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/437</id>
            <title type="text"><![CDATA[Google Online Security Blog: Announcing OSV-Scanner: Vulnerability Scanner]]></title>
            <link rel="alternate" href="https://security.googleblog.com/2022/12/announcing-osv-scanner-vulnerability.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/437"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-27T04:00:43+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/427</id>
            <title type="text"><![CDATA[Free: Dastardly from Burp Suite | Blog - PortSwigger]]></title>
            <link rel="alternate" href="https://portswigger.net/blog/free-dastardly-from-burp-suite" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/427"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Introducing Dastardly - a free, lightweight web application security scanner for your CI/CD pipeline, from the makers of Burp Suite. Secure web development ain&amp;#039;t easy Ensuring your code is written sec]]>
            </summary>
            <updated>2026-01-26T08:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/397</id>
            <title type="text"><![CDATA[prowler-cloud/prowler]]></title>
            <link rel="alternate" href="https://github.com/prowler-cloud/prowler" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/397"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuos monitoring, security assessments and audits, incident response, compliance, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, ENS and more - prowler-cloud/prowler]]>
            </summary>
            <updated>2026-01-26T06:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/368</id>
            <title type="text"><![CDATA[https://isc.sans.edu/forums/diary/Quick+and+dirty+Python+masscan/27384/?s=09]]></title>
            <link rel="alternate" href="https://isc.sans.edu/forums/diary/Quick+and+dirty+Python+masscan/27384/?s=09" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/368"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-22T16:00:36+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/317</id>
            <title type="text"><![CDATA[How to build a CI/CD pipeline for container vulnerability scanning with Tri]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-build-ci-cd-pipeline-container-vulnerability-scanning-trivy-and-aws-security-hub/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/317"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[In this post, I’ll show you how to build a continuous integration and continuous delivery (CI/CD) pipeline using AWS Developer Tools, as well as Aqua Security‘s open source container vulnerability scanner, Trivy. You’ll build two Docker images, one with vulnerabilities and one without, to learn the capabilities of Trivy and how to send all vulnerability […]]]>
            </summary>
            <updated>2026-01-19T06:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/286</id>
            <title type="text"><![CDATA[checkov]]></title>
            <link rel="alternate" href="https://www.checkov.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/286"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.]]>
            </summary>
            <updated>2026-01-16T08:00:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/210</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/24320]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/24320" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/210"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-30T20:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/7</id>
            <title type="text"><![CDATA[OpenVAS - OpenVAS - Open Vulnerability Assessment System]]></title>
            <link rel="alternate" href="http://www.openvas.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/7"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-31T08:00:10+10:00</updated>
        </entry>
    </feed>
