Skip to content
SQUID SEC
Menu
  • Home
  • *NEW* SquidScan
  • Cheat Sheets
  • Hire SquidSec
  • SquidSec Team
  • Squid Sec Twitter
  • SquidSec Podcast
  • Home
  • *NEW* SquidScan
  • Cheat Sheets
  • Hire SquidSec
  • SquidSec Team
  • Squid Sec Twitter
  • SquidSec Podcast

Category: pentesting

Active Directory Hacking Cheat Sheet
cheat-sheet

Active Directory Hacking Cheat Sheet

Active Directory remains the crown jewel of most enterprise environments — and the #1 target for red teamers, pentesters, and

by ☣️ Mr. The Plague ☣️
Read More
Modular Agentic Attack Surface Scanning — Built on Rails, Not Magic
Cyber Security

Modular Agentic Attack Surface Scanning — Built on Rails, Not Magic

Security teams today face a paradox. The attack surface is exploding — cloud assets, containers, APIs, shadow IT, and forgotten

by ☣️ Mr. The Plague ☣️
Read More
Leadership Reckoning in 2026: Actionable Blueprints for Senior Cybersecurity Leaders to Forge Enduring Resilience in a Weaponized, Borderless Digital Economy
Cyber Security

Leadership Reckoning in 2026: Actionable Blueprints for Senior Cybersecurity Leaders to Forge Enduring Resilience in a Weaponized, Borderless Digital Economy

This is the fifth and final installment in the “Building Resilience in a Globalized Digital Economy” series. Over the past

by ☣️ Mr. The Plague ☣️
Read More
Anthropic’s Double Leak: Misconfigurations, npm Packaging Blunders, and the Rising Cyber Risks of “Agentic” AI Development
blue-team

Anthropic’s Double Leak: Misconfigurations, npm Packaging Blunders, and the Rising Cyber Risks of “Agentic” AI Development

In the span of just five days in late March 2026, Anthropic—one of the AI industry’s most vocal proponents of

by ☣️ Mr. The Plague ☣️
Read More
Data Sovereignty Battles in the Cloud: Securing Cross-Border Operations Without Getting Crushed by Privacy Laws or Misconfigs
News

Data Sovereignty Battles in the Cloud: Securing Cross-Border Operations Without Getting Crushed by Privacy Laws or Misconfigs

Part 4 of “Building Resilience in a Globalized Digital Economy.” After geopolitics weaponized your supply chain, the next battlefield is

by ☣️ Mr. The Plague ☣️
Read More
Cyber Geopolitics: Nation-State Actors, Trade Wars, and Sanctions Weaponizing the Digital Economy – Resilience Tactics That Actually Work
blue-team

Cyber Geopolitics: Nation-State Actors, Trade Wars, and Sanctions Weaponizing the Digital Economy – Resilience Tactics That Actually Work

Part 3 of “Building Resilience in a Globalized Digital Economy.” After NPM worms and full-spectrum supply-chain armageddon, here’s the ugly

by ☣️ Mr. The Plague ☣️
Read More
Supply Chain Armageddon Now: Defending Software, Hardware, and MSP Dependencies in a World Without Borders
blue-team

Supply Chain Armageddon Now: Defending Software, Hardware, and MSP Dependencies in a World Without Borders

From Shai-Hulud worms cascading across npm to UEFI bootkit persistence and MSP credential abuse turning one breach into hundreds—2025–2026 proved

by ☣️ Mr. The Plague ☣️
Read More
BloodBash: A Lightweight Python Alternative to BloodHound for Active Directory Analysis
pentesting

BloodBash: A Lightweight Python Alternative to BloodHound for Active Directory Analysis

Active Directory (AD) reconnaissance is a critical step in red team engagements, penetration testing, and security assessments. Traditionally, tools like

by ☣️ Mr. The Plague ☣️
Read More
HackMap: A Powerful Local Penetration Testing Mapping Tool for Advanced Graph Note Keeping
blue-team

HackMap: A Powerful Local Penetration Testing Mapping Tool for Advanced Graph Note Keeping

In the world of ethical hacking and penetration testing, visualizing attack paths and managing command history can make all the

by ☣️ Mr. The Plague ☣️
Read More
HTTP Request Smuggling in 2025: How to Distinguish Real Desync Vulnerabilities from HTTP Request Pipelining (And Stop Wasting Everyone’s Time)
Educational

HTTP Request Smuggling in 2025: How to Distinguish Real Desync Vulnerabilities from HTTP Request Pipelining (And Stop Wasting Everyone’s Time)

Introduction We saw this in 2019 after James popularized modern desync attacks. We saw it again in 2024 after his

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

1 2 … 4 Next
SQUID SECURITY LLC 2026