<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>infosec</title>
    <link rel="self" type="application/atom+xml" href="https://gleipne.volse.net/guest/tags/130/feed"/>
    <updated>2026-05-23T08:40:19+00:00</updated>
    <id>https://gleipne.volse.net/guest/tags/130/feed</id>
            <entry>
            <id>https://gleipne.volse.net/links/183</id>
            <title type="text"><![CDATA[GitHub - LordNoteworthy/al-khaser: Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.]]></title>
            <link rel="alternate" href="https://github.com/LordNoteworthy/al-khaser" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/183"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.  - GitHub - LordNoteworthy/al-khaser: Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.]]>
            </summary>
            <updated>2024-09-14T10:58:09+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/180</id>
            <title type="text"><![CDATA[Dark Visitors - Track and Control Artificial Agents Crawling Your Website]]></title>
            <link rel="alternate" href="https://darkvisitors.com/" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/180"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[API and WordPress plugin to generate a robot.txt file to block AI scrapers and other bots. Also provides an API to get analytics of bot traffic.]]>
            </summary>
            <updated>2024-08-07T09:48:15+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/139</id>
            <title type="text"><![CDATA[Frida scripts to directly MitM all HTTPS traffic from a target mobile application]]></title>
            <link rel="alternate" href="https://github.com/httptoolkit/frida-interception-and-unpinning" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/139"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[This set of scripts can be used all together, to handle interception, manage certificate trust & disabling certificate pinning & transparency checks, for MitM interception of HTTP(S) traffic on Android.]]>
            </summary>
            <updated>2023-10-24T21:12:36+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/123</id>
            <title type="text"><![CDATA[Honeytoken - Wikipedia]]></title>
            <link rel="alternate" href="https://en.wikipedia.org/wiki/Honeytoken" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/123"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2023-07-26T17:34:42+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/122</id>
            <title type="text"><![CDATA[What Are Honey Tokens?]]></title>
            <link rel="alternate" href="https://www.fortinet.com/resources/cyberglossary/honey-tokens" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/122"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[Honey tokens have data made and monitored to catch digital thieves. They contain a marker, which is fake data that looks like a valuable asset to a thief but has no real value for the organization.]]>
            </summary>
            <updated>2023-07-26T17:32:38+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/120</id>
            <title type="text"><![CDATA[PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF]]></title>
            <link rel="alternate" href="https://github.com/swisskyrepo/PayloadsAllTheThings" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/120"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[A list of useful payloads and bypass for Web Application Security and Pentest/CTF]]>
            </summary>
            <updated>2023-06-08T09:01:09+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/119</id>
            <title type="text"><![CDATA[nuclei: Fast and customizable vulnerability scanner based on simple YAML based DSL.]]></title>
            <link rel="alternate" href="https://github.com/projectdiscovery/nuclei" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/119"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks.]]>
            </summary>
            <updated>2023-06-07T18:43:28+00:00</updated>
        </entry>
    </feed>
