Tagged articles
39 articles
Page 1 of 1
Black & White Path
Black & White Path
May 12, 2026 · Information Security

Automate Chinese Graded Protection Assessment with OpenOcta AI Skill on Kali

This guide shows how to install the open‑source OpenOcta AI Skill on Kali Linux, then use it to automate the four‑stage Chinese graded‑protection (等保) assessment—including information gathering, vulnerability scanning, exploit verification, and full compliance report generation—without manual configuration.

Kali LinuxOpenOctacompliance report
0 likes · 4 min read
Automate Chinese Graded Protection Assessment with OpenOcta AI Skill on Kali
Ops Community
Ops Community
Oct 28, 2025 · Information Security

Master Vulnerability Scanning: Xray, X‑Scan, AppScan & Nessus Quick‑Start Guide

This article explains what vulnerability scanning is and provides concise, step‑by‑step instructions for using four popular security scanners—Xray, X‑Scan, IBM AppScan, and Nessus—including download links, command‑line examples, plugin selection, and result export, while omitting promotional content.

AppScanX-ScanXray
0 likes · 6 min read
Master Vulnerability Scanning: Xray, X‑Scan, AppScan & Nessus Quick‑Start Guide
MaGe Linux Operations
MaGe Linux Operations
Aug 13, 2025 · Information Security

Master Docker Security: End-to-End Hardening from Image Build to Runtime

Learn how to protect Docker containers throughout their lifecycle—starting with secure base image selection and vulnerability scanning, through Dockerfile hardening, runtime configurations, network isolation, storage encryption, and continuous monitoring—using practical examples, scripts, and tools like Trivy, Docker Content Trust, Falco, and custom Seccomp profiles.

Container SecurityDockerci/cd
0 likes · 19 min read
Master Docker Security: End-to-End Hardening from Image Build to Runtime
MaGe Linux Operations
MaGe Linux Operations
May 4, 2025 · Information Security

Essential Linux System Security: Account Hardening, Password Policies, and Vulnerability Scanning

This guide covers Linux system security fundamentals, including account cleanup, password aging and locking, command‑history protection, BIOS/GRUB boot hardening, login restrictions, weak‑password detection with John the Ripper, and network port scanning using Nmap, providing practical commands and configuration steps for each topic.

Account ManagementJohn the RipperPassword Policies
0 likes · 18 min read
Essential Linux System Security: Account Hardening, Password Policies, and Vulnerability Scanning
Open Source Linux
Open Source Linux
Apr 10, 2025 · Information Security

Explore Tscanplus: A Powerful All-in-One Network Security & Asset Management Tool

Tscanplus is a comprehensive network security and operations platform that quickly discovers and identifies assets, builds an asset database, and offers features such as port scanning, service detection, URL fingerprinting, POC validation, weak‑password guessing, encoding tools, privilege‑escalation aids, and more, with usage screenshots and a GitHub download link.

Tscanplusasset discoveryinformation security
0 likes · 2 min read
Explore Tscanplus: A Powerful All-in-One Network Security & Asset Management Tool
MaGe Linux Operations
MaGe Linux Operations
Jan 24, 2025 · Information Security

How to Secure Docker Images with Trivy: Step-by-Step Guide

This guide explains how to set up Docker on Ubuntu 18.04, install and configure the Trivy vulnerability scanner, and use it to analyze container images such as Redis, BusyBox, and Nginx, covering database updates, output formats, and practical command examples.

CVEContainer SecurityDocker
0 likes · 9 min read
How to Secure Docker Images with Trivy: Step-by-Step Guide
Linux Ops Smart Journey
Linux Ops Smart Journey
Aug 26, 2024 · Information Security

How to Secure Container Images: Integrating Trivy with Harbor for Seamless Vulnerability Scanning

This guide explains why container image security matters, details the Trivy toolchain, shows step‑by‑step how to install Trivy, scan images, obtain offline vulnerability and Java index databases, and verify scans, preparing you to integrate Trivy with Harbor for a safer CI/CD pipeline.

Cloud NativeTrivyoffline database
0 likes · 11 min read
How to Secure Container Images: Integrating Trivy with Harbor for Seamless Vulnerability Scanning
Software Development Quality
Software Development Quality
Apr 1, 2024 · Information Security

Master One-Click Info Collection & Scanning with jws-cli: A Python Security Tool

jws-cli is a Python‑based, extensible one‑click information collection and scanning tool that automates subdomain discovery, CDN and WAF detection, port and C‑segment scanning, and integrates third‑party vulnerability scanners, offering visual reports and email delivery for rapid penetration testing workflows.

AutomationInformation GatheringPython
0 likes · 6 min read
Master One-Click Info Collection & Scanning with jws-cli: A Python Security Tool
Software Development Quality
Software Development Quality
Feb 21, 2024 · Information Security

Master JWT Security: Test, Forge, and Exploit Tokens with jwt_tool.py

jwt_tool.py is a Python toolkit that validates, forges, scans, and manipulates JSON Web Tokens, offering features such as token validity checks, testing of known CVE‑related vulnerabilities, misconfiguration scanning, claim fuzzing, secret/key verification, dictionary‑based weak‑key detection, timestamp tampering, RSA/ECDSA key reconstruction, and interactive token editing.

JWTPythonsecurity testing
0 likes · 4 min read
Master JWT Security: Test, Forge, and Exploit Tokens with jwt_tool.py
Open Source Linux
Open Source Linux
Nov 8, 2023 · Information Security

Top 10 Docker Vulnerability Scanners to Secure Your Containers in 2023

This article reviews the most popular Docker security tools, explains their key features, and shows how they help organizations automatically scan images, detect vulnerabilities, enforce policies, and improve container runtime protection across development and production environments.

Cloud NativeContainer SecurityDevOps
0 likes · 12 min read
Top 10 Docker Vulnerability Scanners to Secure Your Containers in 2023
Liangxu Linux
Liangxu Linux
Mar 26, 2023 · Information Security

Top 10 Vulnerability Scanners Every Security Professional Should Know

This article reviews the ten most popular vulnerability scanning tools—including OpenVAS, Tripwire IP360, Nessus, and others—detailing their key features, scanning capabilities, deployment options, and typical use cases to help security professionals choose the right solution for network and application vulnerability assessment.

OpenVASnessusnetwork security
0 likes · 10 min read
Top 10 Vulnerability Scanners Every Security Professional Should Know
MaGe Linux Operations
MaGe Linux Operations
Mar 5, 2023 · Information Security

Top 10 Vulnerability Scanners Every Security Team Needs

This guide reviews the ten leading vulnerability scanning solutions, detailing each tool's key features, deployment options, and how they help organizations detect and remediate security weaknesses across networks, servers, cloud and container environments.

information securitynetwork securityopen source
0 likes · 7 min read
Top 10 Vulnerability Scanners Every Security Team Needs
21CTO
21CTO
Jan 3, 2023 · Information Security

How Google’s OSV-Scanner Helps Secure Your Open‑Source Dependencies

Google’s open‑source OSV‑Scanner provides a powerful front‑end to the OSV vulnerability database, allowing developers to scan directories, SBOMs, and Docker images for known security issues across 16 ecosystems, outputting results in JSON or table format and supporting ignore rules for specific vulnerabilities.

OSV-ScannerSBOMdependency management
0 likes · 6 min read
How Google’s OSV-Scanner Helps Secure Your Open‑Source Dependencies
MaGe Linux Operations
MaGe Linux Operations
Sep 20, 2022 · Information Security

Top 10 Essential Tools Every Ethical Hacker Must Use

Discover the ten most widely used security tools—from Nmap and Nessus to Metasploit—that ethical hackers rely on for network mapping, vulnerability scanning, wireless analysis, and automated exploitation, each with key features, platform support, and practical applications for strengthening defenses.

Metasploitethical hackingnessus
0 likes · 7 min read
Top 10 Essential Tools Every Ethical Hacker Must Use
21CTO
21CTO
Sep 15, 2022 · Information Security

How govulncheck Helps Go Developers Spot Real Vulnerabilities

The new govulncheck tool leverages the Go vulnerability database to pinpoint actual vulnerable function calls in code, reducing noise and addressing developer challenges around error handling and third‑party library security, while recent surveys highlight the growing need for such solutions.

GoSecuritygovulncheck
0 likes · 6 min read
How govulncheck Helps Go Developers Spot Real Vulnerabilities
Open Source Linux
Open Source Linux
May 11, 2022 · Information Security

Top 9 Essential Tools Every Ethical Hacker Should Master

This article introduces ethical hacking and presents nine widely used security tools—including Nmap, Nessus, Nikto, Kismet, NetStumbler, Acunetix, Netsparker, Intruder, and Metasploit—detailing their main features, platforms, and how they help professionals identify vulnerabilities and protect networks.

ethical hackingpenetration testingsecurity tools
0 likes · 7 min read
Top 9 Essential Tools Every Ethical Hacker Should Master
DevOps Cloud Academy
DevOps Cloud Academy
Mar 14, 2022 · Information Security

Integrating Trivy Vulnerability Scanner with GitLab CI/CD Pipelines

This article explains what Trivy is, how to install and use it for container vulnerability scanning, demonstrates saving results in JSON, and provides a step‑by‑step guide to integrating Trivy into a GitLab CI/CD pipeline with example configuration and troubleshooting tips.

Container SecurityDockerGitLab CI
0 likes · 7 min read
Integrating Trivy Vulnerability Scanner with GitLab CI/CD Pipelines
21CTO
21CTO
Jul 28, 2021 · Information Security

How Google’s Open‑Source Tsunami Scanner Secures Massive Enterprise Networks

Google has open‑sourced a large‑scale vulnerability scanner called Tsunami, designed for enterprise networks with thousands of devices, featuring a two‑part architecture, extensible plugins, and a focus on accurate, high‑severity vulnerability detection to reduce false positives and alert fatigue.

GoogleTsunamienterprise security
0 likes · 5 min read
How Google’s Open‑Source Tsunami Scanner Secures Massive Enterprise Networks
Dada Group Technology
Dada Group Technology
Jul 16, 2021 · Information Security

Application Security Testing Practices and Risk Assessment at JD Daojia

This article outlines JD Daojia's comprehensive application security strategy, including risk analysis, threat modeling, DevSecOps processes, open‑source component scanning, SAST/DAST/IAST testing, manual security assessments, and evaluation of testing effectiveness to mitigate vulnerabilities before production.

Application SecurityDevSecOpsThreat Modeling
0 likes · 13 min read
Application Security Testing Practices and Risk Assessment at JD Daojia
JD Cloud Developers
JD Cloud Developers
Nov 11, 2020 · Information Security

How JD.com Secures Its 11.11 Shopping Festival: Inside the Fortress

This article explains how JD.com treats its platform as a bustling city and builds a multi‑layered security fortress—including baseline inspections, asset management, rapid vulnerability scanning, key‑system hardening, red‑blue attack simulations, and TB‑level DDoS defense—to ensure safe, orderly operations during the massive 11.11 sales event.

DDoS protectionLarge-Scale EventsRed-Blue Team
0 likes · 9 min read
How JD.com Secures Its 11.11 Shopping Festival: Inside the Fortress
IT Architects Alliance
IT Architects Alliance
Aug 13, 2020 · Information Security

Top 7 Web Vulnerability Scanners: Features, Pros, and How to Use Them

After gathering reconnaissance data in a penetration test, this article reviews seven popular web vulnerability scanners, outlining their core capabilities, typical usage scenarios, and visual screenshots to help security professionals choose the right tool for detecting SQL injection, XSS, file inclusion, and other common web flaws.

Tool comparisonWeb Securityawvs
0 likes · 7 min read
Top 7 Web Vulnerability Scanners: Features, Pros, and How to Use Them
Architects Research Society
Architects Research Society
Aug 9, 2020 · Information Security

Understanding Open Source Software Dependency Security Risks and Available Tools

The article explains how the widespread use of third‑party open‑source components creates a large, often overlooked attack surface, describes the fragmented nature of vulnerability information, and reviews a variety of tools that help organizations detect and manage security risks in their software dependencies.

Software Securitydependency managementinformation security
0 likes · 12 min read
Understanding Open Source Software Dependency Security Risks and Available Tools
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Apr 30, 2020 · Information Security

How to Combine Proxies and Scanners to Cut Web Vulnerability False Positives

This article explores the limitations of traditional web vulnerability scanners and manual testing, proposes a proxy‑based architecture that captures real user requests for centralized analysis, demonstrates a demo implementation using Burp and custom scanners, and reflects on the design's strengths and remaining challenges.

ProxyWeb Securityfalse positives
0 likes · 7 min read
How to Combine Proxies and Scanners to Cut Web Vulnerability False Positives
21CTO
21CTO
Feb 24, 2020 · Information Security

Top 10 Open‑Source Security Tools Every Professional Should Know

This article introduces ten essential open‑source security tools—including Nessus, Snort, Nagios, Ettercap, Infection Monkey, Delta, Cuckoo Sandbox, The Sleuth Kit, Lynis, and Certbot—detailing their main features, licensing models, and typical use cases for vulnerability scanning, intrusion detection, network monitoring, and forensic analysis.

Network Monitoringdigital forensicsencryption
0 likes · 9 min read
Top 10 Open‑Source Security Tools Every Professional Should Know
360 Quality & Efficiency
360 Quality & Efficiency
Nov 15, 2019 · Information Security

Improving Product Quality through Code Vulnerability Inspection and Deep Code‑Search Techniques

The article explains how static source‑code scanning, binary analysis, and advanced code‑search technologies—including incremental indexing, deduplication, real‑time Sphinx indexing, and BM25 ranking—can be combined to detect and remediate product‑level vulnerabilities early, thereby significantly raising software quality and reducing risk.

BM25Sphinxcode search
0 likes · 13 min read
Improving Product Quality through Code Vulnerability Inspection and Deep Code‑Search Techniques
Architects Research Society
Architects Research Society
Jul 17, 2019 · Information Security

Understanding Open‑Source Dependency Security Risks and Available Scanning Tools

This article explains why open‑source components constitute a major attack surface, outlines the fragmented nature of vulnerability information, debunks the myth that open‑source code is inherently safer, and reviews a range of tools—both open‑source and commercial—that help organizations detect and manage security risks in software dependencies.

Software Securitydependency managementinformation security
0 likes · 11 min read
Understanding Open‑Source Dependency Security Risks and Available Scanning Tools
360 Tech Engineering
360 Tech Engineering
May 31, 2019 · Information Security

Dynamic Web Crawling Techniques for Vulnerability Scanning with Pyppeteer

This article details the practical implementation of a dynamic web crawler for vulnerability scanning, covering Chrome headless setup, browser initialization, JavaScript hook injection for DOM events, navigation locking, form handling, link collection, deduplication, and task scheduling using pyppeteer.

Browser AutomationDynamic analysisWeb Crawling
0 likes · 30 min read
Dynamic Web Crawling Techniques for Vulnerability Scanning with Pyppeteer
Zhongtong Tech
Zhongtong Tech
Jan 11, 2019 · Information Security

How Hunter Automates Web Security Scanning in CI/CD Pipelines

This article explains how the Hunter system integrates automated web vulnerability scanning—including black‑box testing, browser‑extension traffic capture, and distributed analysis engines—into CI/CD workflows to detect security risks early, improve efficiency, and reduce manual effort.

Web Securitybrowser extensionci/cd
0 likes · 13 min read
How Hunter Automates Web Security Scanning in CI/CD Pipelines
Ctrip Technology
Ctrip Technology
Jul 6, 2017 · Information Security

Automating Web Vulnerability Detection at Ctrip: Architecture and Implementation of the Hulk Project

This article describes Ctrip's automated web vulnerability detection system, detailing the shift from active to passive scanning, the distributed architecture using traffic mirroring, message queues, Redis, and MySQL, and the processes for data collection, de‑duplication, scanning, and vulnerability management.

CtripWeb Securitydistributed architecture
0 likes · 8 min read
Automating Web Vulnerability Detection at Ctrip: Architecture and Implementation of the Hulk Project
Efficient Ops
Efficient Ops
Feb 20, 2017 · Information Security

Inside YY's Security Ops: Real-World Incident Stories and Architecture

This article shares YY's security operations journey, detailing real incident response scenarios, the evolution of their security infrastructure from 2012 onward, and the key factors considered when building a robust security ops system, including DDoS protection, WAF, vulnerability scanning, intrusion detection, and data‑driven automation.

DDoS protectionSecurity Operationsbig data analytics
0 likes · 24 min read
Inside YY's Security Ops: Real-World Incident Stories and Architecture
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
May 23, 2016 · Information Security

Testing HTTP Header Parameters for SQL Injection: Coverage, Tools, and Best Practices

The article examines how HTTP header and cookie parameters can serve as SQL injection vectors, evaluates the coverage of commercial and open‑source web vulnerability scanners, demonstrates manual testing techniques, and recommends tools such as sqlmap for comprehensive security assessments.

SQL injectionSQLMapWeb Security
0 likes · 13 min read
Testing HTTP Header Parameters for SQL Injection: Coverage, Tools, and Best Practices
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
Jul 16, 2015 · Information Security

Beyond GET/POST: Testing HTTP Headers and Cookies for SQL Injection

This article examines how web vulnerability scanners handle non‑traditional input vectors such as HTTP headers and cookies, demonstrates manual exploitation techniques for header‑based SQL injection, compares scanner coverage and accuracy, and offers practical guidance for developers and penetration testers.

SQL injectionSQLMapWeb Security
0 likes · 14 min read
Beyond GET/POST: Testing HTTP Headers and Cookies for SQL Injection