pentest-ai - 6 Claude Code subagents for offensive security research (engagement planning, recon analysis, exploit methodology, detection engineering, STIG compliance, report writing)
https://0xsteph.github.io/pentest-ai/
Submitted March 28, 2026 at 11:26PM by stephnot
via reddit https://ift.tt/Ahx9eZU
https://0xsteph.github.io/pentest-ai/
Submitted March 28, 2026 at 11:26PM by stephnot
via reddit https://ift.tt/Ahx9eZU
0xsteph.github.io
pentest-ai -- Offensive Security Research Assistant for Claude Code
6 specialized AI subagents for penetration testing. Plan engagements, analyze recon, research exploits, build detections, check STIGs, and write reports -- all through Claude Code.
We Social Engineered Our Own AI
https://ift.tt/8cV25pK
Submitted March 29, 2026 at 01:14AM by Initial-Return8802
via reddit https://ift.tt/K9rjXt7
https://ift.tt/8cV25pK
Submitted March 29, 2026 at 01:14AM by Initial-Return8802
via reddit https://ift.tt/K9rjXt7
reikon.io
We Social Engineered Our Own AI | Reikon
We gave our AI agent admin access to production infrastructure. Then we tried to trick it into leaking everything. Here's what happened.
The Sequels Are Never As Good, But We're Still In Pain (Citrix NetScaler CVE-2026-3055 Memory Overread) - watchTowr Labs
https://ift.tt/yMEhRag
Submitted March 29, 2026 at 02:10AM by dx7r__
via reddit https://ift.tt/zXiNwaB
https://ift.tt/yMEhRag
Submitted March 29, 2026 at 02:10AM by dx7r__
via reddit https://ift.tt/zXiNwaB
watchTowr Labs
The Sequels Are Never As Good, But We're Still In Pain (Citrix NetScaler CVE-2026-3055 Memory Overread)
Sequels? Pain? We're obviously talking about Citrix NetScalers, yet again.
Welcome back to another watchTowr Labs blog post - pull up a chair, we always welcome new members to our group therapy sessions.
If you asked a C programmer what they most dislike…
Welcome back to another watchTowr Labs blog post - pull up a chair, we always welcome new members to our group therapy sessions.
If you asked a C programmer what they most dislike…
OAuth Consent and Device Code Phishing for Red Teams
https://ift.tt/yhsDe0Q
Submitted March 29, 2026 at 07:19AM by IndySecMan
via reddit https://ift.tt/uRSxblp
https://ift.tt/yhsDe0Q
Submitted March 29, 2026 at 07:19AM by IndySecMan
via reddit https://ift.tt/uRSxblp
PhishU
Microsoft Entra Device Code Phishing Simulation in the PhishU Framework
How the PhishU Framework simulates Microsoft Entra device code phishing with silent token capture, live notifications, and Token Explorer follow-on actions.
Breakdown: How TeamPCP hid malware inside WAV files using audio steganography
https://ift.tt/BxtRSrb
Submitted March 29, 2026 at 07:52PM by pwnguide
via reddit https://ift.tt/vnAoQKi
https://ift.tt/BxtRSrb
Submitted March 29, 2026 at 07:52PM by pwnguide
via reddit https://ift.tt/vnAoQKi
pwn.guide
Audio Steganography in Supply Chain Attacks
Learn how attackers hide malware inside WAV audio files using steganography, based on the real-world TeamPCP supply chain campaign.
Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2) - watchTowr Labs
https://ift.tt/7DRJw09
Submitted March 30, 2026 at 01:40AM by dx7r__
via reddit https://ift.tt/brK59d2
https://ift.tt/7DRJw09
Submitted March 30, 2026 at 01:40AM by dx7r__
via reddit https://ift.tt/brK59d2
watchTowr Labs
Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2)
Today, we woke up with a nagging feeling: what if Citrix had, in fact, patched multiple Memory Overread vulnerabilities as part of CVE-2026-3055?
While we've been using our analysis from Part 1 (please read it first, as this post will be brief) to accurately…
While we've been using our analysis from Part 1 (please read it first, as this post will be brief) to accurately…
LangDrained: Path traversal, SQL injection, and Deserialization of untrusted data in LangChain
https://ift.tt/HcMxRt6
Submitted March 30, 2026 at 12:31PM by qwerty0x41
via reddit https://ift.tt/FLGWVNU
https://ift.tt/HcMxRt6
Submitted March 30, 2026 at 12:31PM by qwerty0x41
via reddit https://ift.tt/FLGWVNU
Cyera
LangDrained: 3 Paths to Your Data Through LangChain, the World’s Most Popular AI Framework | Cyera Research
AI middleware shouldn’t be a data drain. Cyera uncovers 3 critical LangChain vulnerabilities. See the research and learn how to patch your AI stack now.
The Team PCP Snowball Effect: A Quantitative Analysis
https://ift.tt/6VLT8ir
Submitted March 30, 2026 at 01:51PM by mabote
via reddit https://ift.tt/Id0x8V7
https://ift.tt/6VLT8ir
Submitted March 30, 2026 at 01:51PM by mabote
via reddit https://ift.tt/Id0x8V7
GitGuardian Blog - Take Control of Your Secrets Security
The Team PCP Snowball Effect: A Quantitative Analysis
Supply chain attacks cascade through ecosystems in ways traditional metrics hardly capture. GitGuardian evaluates the PCP Team incidents and finds damage spread to thousands of public targets.
ThreatPad — an open-source, self-hosted note-taking app for CTI teams.
https://threat-pad-web.vercel.app/login
Submitted March 30, 2026 at 07:04PM by Remarkable_Pop3697
via reddit https://ift.tt/LieKgpG
https://threat-pad-web.vercel.app/login
Submitted March 30, 2026 at 07:04PM by Remarkable_Pop3697
via reddit https://ift.tt/LieKgpG
threat-pad-web.vercel.app
ThreatPad
Collaborative threat intelligence note-taking platform
An attack class that passes every current LLM filter
https://ift.tt/984tf2L
Submitted March 30, 2026 at 08:12PM by lurkyloon
via reddit https://ift.tt/CA94SQv
https://ift.tt/984tf2L
Submitted March 30, 2026 at 08:12PM by lurkyloon
via reddit https://ift.tt/CA94SQv
Shapingrooms
The Atmosphere Attack — Research — shapingrooms.com
Postural manipulation as a new attack class. Empirical record across four frontier models, propagation findings, six-layer defensive architecture. AG Davidson, 2026.
One POST request, six API keys: breaking into popular MCP servers
https://ift.tt/nO6LgaR
Submitted March 30, 2026 at 09:05PM by Kind-Release-3817
via reddit https://ift.tt/MDuCj8v
https://ift.tt/nO6LgaR
Submitted March 30, 2026 at 09:05PM by Kind-Release-3817
via reddit https://ift.tt/MDuCj8v
agentseal.org
AgentSeal - AI Agent Security Scanner
Break your AI agents before someone else does. Security scanning for system prompts, MCP servers, and AI coding agents.
Vulnerability Research Is Cooked
https://ift.tt/Mvao5k0
Submitted March 31, 2026 at 12:18AM by YogiBerra88888
via reddit https://ift.tt/bxTA6Rg
https://ift.tt/Mvao5k0
Submitted March 31, 2026 at 12:18AM by YogiBerra88888
via reddit https://ift.tt/bxTA6Rg
sockpuppet.org
Vulnerability Research Is Cooked
red-run 2.0: Agent Teams
https://ift.tt/vubHMKf
Submitted March 31, 2026 at 12:14AM by aconite33
via reddit https://ift.tt/Qg8V03r
https://ift.tt/vubHMKf
Submitted March 31, 2026 at 12:14AM by aconite33
via reddit https://ift.tt/Qg8V03r
Blacklanternsecurity
red-run 2.0: Agent Teams
A Claude Code Agent Dashboard
OpenAI Codex: How a Branch Name Stole GitHub Tokens
https://ift.tt/GvykJnP
Submitted March 31, 2026 at 03:51AM by LostPrune2143
via reddit https://ift.tt/RlksfJ0
https://ift.tt/GvykJnP
Submitted March 31, 2026 at 03:51AM by LostPrune2143
via reddit https://ift.tt/RlksfJ0
blog.barrack.ai
OpenAI Codex: How a Branch Name Stole GitHub Tokens | Barrack AI
BeyondTrust Phantom Labs disclosed a critical command injection vulnerability in OpenAI Codex that allowed attackers to steal GitHub OAuth tokens through unsanitized branch names. The flaw affected ChatGPT, Codex CLI, SDK, and IDE extensions, and could scale…
Your Agent Runs Code You Never Wrote - Why agent isolation is a different problem
https://ift.tt/nt7J9Yp
Submitted March 31, 2026 at 10:41AM by bakibab
via reddit https://ift.tt/cvmb5qg
https://ift.tt/nt7J9Yp
Submitted March 31, 2026 at 10:41AM by bakibab
via reddit https://ift.tt/cvmb5qg
Substack
Your Agent Runs Code You Never Wrote
Containers, VMs, and serverless were built for code you wrote. Agents write their own.
Axios npm package compromised in supply chain attack. Downloads malware dropper package
https://ift.tt/erufC72
Submitted March 31, 2026 at 10:39AM by raptorhunter22
via reddit https://ift.tt/EI1tsSK
https://ift.tt/erufC72
Submitted March 31, 2026 at 10:39AM by raptorhunter22
via reddit https://ift.tt/EI1tsSK
The CyberSec Guru
Axios NPM Packages Compromised: Active Supply Chain Attack Alert | The CyberSec Guru
Axios NPM packages v1.14.1 and v0.30.4 compromised. Malicious plain-crypto-js@4.2.1 dependency injected. Full technical breakdown
Introducing the Rootkit Techniques Matrix and updates to the Guide
https://aibaranov.github.io/rootkit-matrix/
Submitted March 31, 2026 at 01:40PM by rkhunter_
via reddit https://ift.tt/nCvZosk
https://aibaranov.github.io/rootkit-matrix/
Submitted March 31, 2026 at 01:40PM by rkhunter_
via reddit https://ift.tt/nCvZosk
Home
Introducing the Rootkit Techniques Matrix and updates to the Guide
Common Entra ID Security Assessment Findings – Part 2: Privileged Unprotected Groups
https://ift.tt/jnx3smB
Submitted March 31, 2026 at 07:41PM by GonzoZH
via reddit https://ift.tt/QDnGtw1
https://ift.tt/jnx3smB
Submitted March 31, 2026 at 07:41PM by GonzoZH
via reddit https://ift.tt/QDnGtw1
Lesser-Known Military College Triumphs in Pentagon Student Hacking Contest
https://ift.tt/wDxpj89
Submitted March 31, 2026 at 10:44PM by WatermanReports
via reddit https://ift.tt/UbSHEac
https://ift.tt/wDxpj89
Submitted March 31, 2026 at 10:44PM by WatermanReports
via reddit https://ift.tt/UbSHEac
Govinfosecurity
University of North Georgia Triumphs in DOD Hacking Contest
A team of cybersecurity students from the University of North Georgia vanquished seven opposing teams from other senior military colleges and elite service
ImageMagick: From Arbitrary File Read to File Write In Every Policy (ZeroDay)
https://ift.tt/BtarETq
Submitted March 31, 2026 at 10:28PM by _vavkamil_
via reddit https://ift.tt/oRb3SQa
https://ift.tt/BtarETq
Submitted March 31, 2026 at 10:28PM by _vavkamil_
via reddit https://ift.tt/oRb3SQa
PWN.AI
ImageMagick: From Arbitrary File Read to File Write In Every Policy (ZeroDay)
How pwn.ai turned a routine client pentest into multiple ImageMagick exploits. By autonomously researching the product’s internals for days, it found a path from a single image upload to file leaks, security policy bypasses, and remote code execution across…
PSA: That 'Disable NTLMv1' GPO you set years ago? It’s lying to you. LmCompatibilityLevel set to 5 is not enough.
https://ift.tt/2gndwR0
Submitted April 1, 2026 at 12:19AM by hardeningbrief
via reddit https://ift.tt/tF8YARm
https://ift.tt/2gndwR0
Submitted April 1, 2026 at 12:19AM by hardeningbrief
via reddit https://ift.tt/tF8YARm
Silverfort
If you think you blocked NTLMv1 in your org, think again
If you think you’ve blocked NTLMv1 in your organization, think again. Silverfort’s research team recently discovered that attackers bypass the Group Policy designed to disable NTLMv1…