open source

Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)

This post is part 2 of a series of blog posts on container hacking. If you haven’t read the part1, you should check it out. Today I’m going to tell you about a new collection of scripts, and a lab VM for hacking containers. Both of these resources are currently works in progress, and are …

Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2) Read More »

SamuraiWTF 3.0 and into the future!

We are really excited to announce that SamuraiWTF 3.0 is now available publicly.  (We did a previous release but found some issues and so that was pulled back.)  This release is available at immediately and we hope you enjoy it. In this release we have updated the base operating system to Ubuntu 14.04 (hence the …

SamuraiWTF 3.0 and into the future! Read More »

Laudanum by Example: Shell

Previously, I wrote a post providing a brief introduction to Laudanum.  If you haven’t read it, or don’t know what Laudanum is, I encourage you to read that post first (don’t worry, it is fairly short).  In this post, I am going to take a look at how Laudanum can be used.  Specifically, I am …

Laudanum by Example: Shell Read More »

Introduction to Laudanum

As a security consultant, there are so many scenarios that I run into every day that there is no one tool or script that solves every problem.  The best consultants have the know-how to understand which tool to use in which scenario.  Imagine if during a penetration test I used SQLMap to look for CSRF …

Introduction to Laudanum Read More »

Scroll to Top