veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

295
active users

#pentesting

13 posts10 participants1 post today
TerminalTools<p>Think your network is safe? Try a vulnerability scan today.</p><p>It’s the first step in spotting gaps before hackers exploit them.</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://mastodon.social/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a></p>
nickbearded<p>Metasploit on BashCoreT: LoadError - cannot load such file: parallel.</p><p>Translation: “Nice build you have there… shame if something happened to it.” 😅</p><p>Time to tear it down and start over...</p><p><a href="https://mastodon.social/tags/BashCoreT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCoreT</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/Metasploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Metasploit</span></a> <a href="https://mastodon.social/tags/DevLife" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevLife</span></a></p>
nickbearded<p>Benchmarking hashcat -b on BashCoreT from BashCoreX via SSH, both running inside VirtualBox, just because we can 😎</p><p>Yes, the numbers are irrelevant (VM overhead galore), but the stability test matters 💪</p><p>📸 htop says: “I’m fine.” 👊</p><p><a href="https://mastodon.social/tags/BashCoreT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCoreT</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/Hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashcat</span></a> <a href="https://mastodon.social/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> <a href="https://mastodon.social/tags/VirtualBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirtualBox</span></a> <a href="https://mastodon.social/tags/BecauseWeCan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BecauseWeCan</span></a></p>
nickbearded<p>🚀 Build completed successfully, BashCoreT (Trixie stable CLI edition) is officially among us! 🤟</p><p>Powered by Linux kernel 6.12.38-1 with PREEMPT_RT and packed with the full arsenal from both apt and github. </p><p>Ready to push boundaries and redefine minimalism in security distros.</p><p>Tests will start today 💪</p><p><a href="https://mastodon.social/tags/BashCoreT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCoreT</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Trixie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trixie</span></a> <a href="https://mastodon.social/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://mastodon.social/tags/Kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kernel</span></a> <a href="https://mastodon.social/tags/BashCore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCore</span></a></p>
Simon Roses Femerling<p>I loved when I see web shells challenges (Red or Blue) in CTF games. Reminds me of my web shells research I did years ago, paper: <a href="https://vulnex.com/data/VULNEX_VB2017_ShellInTheWeb.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vulnex.com/data/VULNEX_VB2017_</span><span class="invisible">ShellInTheWeb.pdf</span></a> <a href="https://infosec.exchange/tags/WebShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebShell</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a></p>
nickbearded<p>Finally, Trixie has been stable since yesterday and I’m no longer wasting time.</p><p>I’m giving up the beach vibes to focus on building BashCoreT, packed with kernel 6.12 + PREEMPT_RT and the full arsenal of tools.</p><p>Tests will start soon, then the release 🤞</p><p>🚀 <a href="https://mastodon.social/tags/BashCoreT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCoreT</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/NoCompromise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoCompromise</span></a> <a href="https://mastodon.social/tags/Trixie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trixie</span></a> <a href="https://mastodon.social/tags/BashCore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCore</span></a> <a href="https://mastodon.social/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a></p>
operat0r<p><a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
RMcCurdyDOTcom<p><a href="https://techhub.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://techhub.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://techhub.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://techhub.social/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a></p>
shadowByteX<p>Anakramy is redefining cybersecurity.<br>From AI-driven Managed Detection &amp; Response (MDR) to cutting-edge offensive security tools like Anakramy Guard, Anakramy Aegis, and Anakramy Bug Hunter — we’re building the future of digital defense.</p><p>Our mission: Empower organizations to predict, prevent, and respond to cyber threats faster than ever.<br>Our approach: Innovation, automation, and relentless commitment to security.</p><p>🌐 Learn more: <a href="https://anakramy.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">anakramy.com</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/MDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MDR</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a></p>
Rye<p>Detection Engineering in Dynamic Systems</p><p><a href="https://sa.wentcloud.com/detection-engineering-in-dynamic-systems/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sa.wentcloud.com/detection-eng</span><span class="invisible">ineering-in-dynamic-systems/</span></a></p><p><a href="https://ioc.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://ioc.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://ioc.exchange/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> <a href="https://ioc.exchange/tags/systemsengineer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemsengineer</span></a> <a href="https://ioc.exchange/tags/systems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systems</span></a> <a href="https://ioc.exchange/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <br><a href="https://ioc.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a></p>
OWASP Foundation<p>💥 3 Days. 4 Elite Trainings. Unlimited AppSec Growth.</p><p>Join us in Washington, D.C., Nov 3–5, 2025 for immersive, hands-on 3-day sessions at OWASP Global AppSec USA:<br>⚡ Threat Modeling with AI – Adam Shostack<br>⚡ AI Security for Developers – Jim Manico<br>⚡ Attacking &amp; Defending Cloud Apps – AWS, Azure, GCP<br>⚡ Full-Stack Pentesting Lab – 100% hands-on + lifetime access</p><p>Register: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p><a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/WashingtonDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WashingtonDC</span></a></p>
pentest-tools.com<p>As a security professional, time is always tight — so speed matters!</p><p>That's why we've upgraded our Website Scanner! Spidering is now 4x faster, powered by Locality Sensitive Hashing (LSH).</p><p>You get:<br>✅ Broader coverage in less time<br>✅ Faster endpoint discovery<br>✅ Better injection points<br>✅ Cleaner, more actionable reports</p><p>Whether you're consulting for clients or testing internal apps, this update helps you move faster with greater confidence.</p><p>🕷️ Try smarter spidering in your next scan → <a href="https://pentest-tools.com/website-vulnerability-scanning/website-scanner" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pentest-tools.com/website-vuln</span><span class="invisible">erability-scanning/website-scanner</span></a></p><p><a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
Pen Test Partners<p>You’re security testing AWS infrastructure. You’ve done the work and need to exfiltrate the evidence files. But there's no internet access and no inbound ports... 🤔<br> <br>Here’s how to use AWS Services Systems Manager (SSM) to create a port forwarding session, access what you need, and securely exfiltrate data with a simple Python web server.<br> <br>📌 Read the blog post here: <a href="https://www.pentestpartners.com/security-blog/how-to-transfer-files-in-aws-using-ssm/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/how-to-transfer-files-in-aws-using-ssm/</span></a><br> <br><a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/SSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSM</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a></p>
SPARK42AI Agents in Penetration Testing
Konstantin :C_H:<p>Two criticals. Two known exploited. One a zero-day.<br>July saw a spike in high-severity vulnerabilities.</p><p>Here are CVE Crowd's Top 3 from the 624 CVEs discussed across the Fediverse last month.<br>For each CVE, I've included a standout post from the community.<br>Enjoy exploring! 👇</p><p><a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/CveCrowd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CveCrowd</span></a></p>
S1M0N3<p>BlackArch Linux on Artix:<br>Installing and configuring BlackArch packages on Artix Linux (XFCE), optimizing build settings, and updating the system with pacman while monitoring resources and processes in real time using Conky, htop, and neofetch.<br><a href="https://mastodon.social/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> <a href="https://mastodon.social/tags/Artix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Artix</span></a> <a href="https://mastodon.social/tags/BlackArch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackArch</span></a> <a href="https://mastodon.social/tags/XFCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XFCE</span></a> <a href="https://mastodon.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdmin</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a></p>

New Open-Source Tool Spotlight 🚨🚨🚨

Pivotnacci is a toolkit for network pivoting in pentesting. It automates SOCKS proxies, SSH tunnels, and port forwards, making lateral movement more efficient during red team operations. Great for complex multi-hop environments. #CyberSecurity #PenTesting

🔗 Project link on #GitHub 👉 github.com/blackarrowsec/pivot

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️