Skip to content
SQUID SEC
Menu
  • Home
  • Cheat Sheets
  • Hire SquidSec
  • SquidSec Team
  • Squid Sec Twitter
  • SquidSec Podcast
  • Home
  • Cheat Sheets
  • Hire SquidSec
  • SquidSec Team
  • Squid Sec Twitter
  • SquidSec Podcast

Category: Educational

BloodBash: A Lightweight Python Alternative to BloodHound for Active Directory Analysis
Cyber Security

BloodBash: A Lightweight Python Alternative to BloodHound for Active Directory Analysis

Active Directory (AD) reconnaissance is a critical step in red team engagements, penetration testing, and security assessments. Traditionally, tools like

by ☣️ Mr. The Plague ☣️
Read More
HackMap: A Powerful Local Penetration Testing Mapping Tool for Advanced Graph Note Keeping
Educational

HackMap: A Powerful Local Penetration Testing Mapping Tool for Advanced Graph Note Keeping

In the world of ethical hacking and penetration testing, visualizing attack paths and managing command history can make all the

by ☣️ Mr. The Plague ☣️
Read More
NPM Attacks in 2025: Escalating Supply Chain Threats in the JavaScript Ecosystem
News

NPM Attacks in 2025: Escalating Supply Chain Threats in the JavaScript Ecosystem

The Node Package Manager (npm) registry faced unprecedented supply chain attacks throughout 2025, marking a significant escalation in threats targeting

by ☣️ Mr. The Plague ☣️
Read More
HTTP Request Smuggling in 2025: How to Distinguish Real Desync Vulnerabilities from HTTP Request Pipelining (And Stop Wasting Everyone’s Time)
pentesting

HTTP Request Smuggling in 2025: How to Distinguish Real Desync Vulnerabilities from HTTP Request Pipelining (And Stop Wasting Everyone’s Time)

Introduction We saw this in 2019 after James popularized modern desync attacks. We saw it again in 2024 after his

by ☣️ Mr. The Plague ☣️
Read More
CyberDeck: The Ultimate Retro Sci-Fi Hacker’s Cookbook for Red Teamers & Pentesters
Educational

CyberDeck: The Ultimate Retro Sci-Fi Hacker’s Cookbook for Red Teamers & Pentesters

In the ever-evolving landscape of offensive security—where cloud misconfigs, Active Directory attacks, and living-off-the-land binaries dominate engagements—speed and muscle memory

by ☣️ Mr. The Plague ☣️
Read More
New Episode of SquidSec Podcast is Live! –
blue-team

New Episode of SquidSec Podcast is Live! –

by ☣️ Mr. The Plague ☣️
Read More
Abusing Software Supply Chain Vulnerabilities: A Comprehensive Analysis of Attacks, Techniques, and Defenses
blue-team

Abusing Software Supply Chain Vulnerabilities: A Comprehensive Analysis of Attacks, Techniques, and Defenses

Introduction Software supply chain attacks have become a cornerstone of modern cyber threats, exploiting the intricate web of dependencies, tools,

by ☣️ Mr. The Plague ☣️
Read More
Major Cybersecurity Incidents and Trends in May 2025: A Comprehensive Overview
pentesting

Major Cybersecurity Incidents and Trends in May 2025: A Comprehensive Overview

Cybersecurity threats continued to evolve in May 2025, with high-profile incidents, critical vulnerabilities, and emerging trends reshaping the landscape. From

by ☣️ Mr. The Plague ☣️
Read More
Coinbase Catastrophe: Uncle Pennybags Loses Big in Bitcoin Hack!
Educational

Coinbase Catastrophe: Uncle Pennybags Loses Big in Bitcoin Hack!

Key Points and Direct Answer Incident Overview On May 15, 2025, Coinbase disclosed a cyberattack where hackers bribed overseas support

by ☣️ Mr. The Plague ☣️
Read More
Major Cybersecurity Incidents and Trends in May 2025: A Comprehensive Overview
News

Weekly Cybersecurity Brief: May 5-9, 2025

Key Points Contents Overview This week’s cybersecurity news highlights several incidents that underscore the evolving threat landscape. From ransomware attacks

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

1 2 … 6 Next
© SQUID SEC 2026 - Website developed by WP Theme Space | Create Your Professional Website