reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine’s correlation, it just makes recon effortless.
Mount an MS-DOS network drive for vintage machines with TCP
NetDrive is a DOS device driver that allows you to access a remote disk image hosted by another machine as though it was a local device with an assigned drive letter. The remote disk image can be a…
It’s been a while since my last post, so today i have something bigger and – most probably – more usefull than usually. [Download link here] I present to you Mèdved (bear in serbi…
Securing Microservices Communication with mTLS in Kubernetes
Microservices often communicate with each other to fulfill complex business operations, creating security and scaling challenges. Mutual Transport Layer Security (mTLS) can help. Here's how to get started.
Run Nomad servers in Kubernetes (last mile help) - Nomad - HashiCorp Discuss
We have our services and main application all in Kubernetes, but part of our system offers workers to run workloads on. This used to be all managed directly in Kubernetes, but we want to be able to run on “remote” machines too. So the idea of orchestrating through Nomad came up. We have a POC running in 2 VM instances with a server on each. But I want to be able to scale up servers as needed easily and just keep our infra in Kubernetes if possible. I did find the nomad-on-kubernetes repository...
How Container Networking Works - Building a Linux Bridge Network From Scratch
Understanding of Docker and Kubernetes networking starts with the basics - learn how to create and interconnect network namespaces using standard Linux tools.
Marshaling SSH Private Keys - Why there's always a different block? | Carlos Becker
Not long ago, when I was building melt, I learned something interesting: if you restore a private key from its seed, and marshal it back to the OpenSSH Private Key format, you’ll always get a different block in the middle.
Why? That lead to an investigation of how the private key format works. I didn’t find many good references out there, except OpenSSH’s source code.
Let’s start from there, shall we?