Sec. Forge Hub
1.02K subscribers
56 photos
11 files
36 links
Security tools, automation, and insights - from pocket helpers to CI/CD integrations.
Built for red teamers, security engineers, and everyone shaping cyber defense.
Download Telegram
πŸ’₯ YOU CAN NOT MISS THIS! GIVEAWAY! πŸ’₯

πŸ‘‰ Certified Offensive Security Junior (COSJ)

RedOps Academy has made their course FREE for 24 hours!

All enrolled students will enjoy lifetime access β€” so you can keep learning and revisiting the labs anytime.
❀1🀝1
☠️ Cross-Site Scripting (XSS) Attacks ☠️
✍3
πŸ€–Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks πŸ€–

πŸ‘‰ Feel free to use! πŸ‘ˆ

With the release of Kali Linux 2025.3, a major update introduces an innovative tool that combines artificial intelligence and cybersecurity: the Gemini Command-Line Interface (CLI).

This new open-source package integrates Google's powerful Gemini AI directly into the terminal, offering penetration testers and security professionals an intelligent assistant designed to streamline and automate complex security workflows.

πŸ› οΈ Installation πŸ› οΈ

#kali_linux #pentest_os #red_team
πŸ”₯2
☠️ Kubernetes for Pentesters ☠️

A selection of articles on practical Kubernetes penetration testing:

πŸ‘‰ Kubernetes for Pentesters: Part 1
πŸ‘‰ A Pentester’s Approach to Kubernetes Security β€” Part 1
πŸ‘‰ A Pentester’s Approach to Kubernetes Security β€” Part 2

#red_team #kubernetes
✍2
The new πŸ‘‰ https://cs.github.com πŸ‘ˆ search allows for regex, which means brand *new* regex GitHub Dorks are possible!

Eg, find SSH and FTP passwords via connection strings with:

/ssh:\/\/.*:.*@.*target\.com/
/ftp:\/\/.*:.*@.*target\.com/

#info_security #red_team #osint
πŸ”₯3
Hack The Box Challenges

Something stirs in the shadows... and it’s coming for your flags! πŸŽƒ
Hack The Boo returns this October with some spooky Challenges. Dare to face your fears?

πŸ“† 22-27 October: Practice CTF to polish your skills
πŸ“† 24-27 October: The competition!

Register for free πŸ‘‰ Here

#HackTheBox #HTB #Cybersecurity #CTF #Halloween #Hackers
✍2
πŸ”ΈToday we'll talk about logs.πŸ”Έ

πŸ”Ή What2Log
is an open project that centralizes recommendations on what logs to collect and how to configure them for various systems.

πŸ”Ή It helps SOC analysts quickly identify the right log sources and standardized configurations, streamlining detection creation and log audit processes.

πŸ‘‰ What2Log πŸ‘ˆ
πŸ”₯3
🐳 Docker - How It Works 🐳

Docker is a containerization platform that lets you package your app and all its dependencies into lightweight, portable containers.

Each container runs on the same Docker Engine, sharing the OS kernel but staying completely isolated - with its own filesystem, processes, and network.

πŸ”Ή Core Components:

🧩 Image - a blueprint containing code, libraries, and configs.
πŸ“¦ Container - a running instance of that image.
βš™οΈ Docker Engine - runs and manages containers.
☁️ Docker Hub - the global registry for sharing images.

πŸ’‘ Philosophy:


β€œIf it works on my machine - it works everywhere.”

#docker #containerization
πŸ”₯3
Docker Security - Quick Guide πŸ”’

Keeping your containers secure means minimizing attack surface, scanning for vulnerabilities, and enforcing runtime policies.

πŸ”§ Essential Practices:

πŸ”Έ Run container as non-root
docker run --user 1000:1000 nginx:latest


πŸ”Έ Scan Docker image for vulnerabilities
docker scan myimage:latest


πŸ”Έ Apply default seccomp security profile
docker run --security-opt seccomp=default.json myimage


🧰 Top 3 Docker Security Tools:

Trivy
πŸ”Ή All-in-one vulnerability scanner for container images, OS packages, and IaC.

Docker Bench for Security
πŸ”Ή Automated script to check for common Docker security best practices.

Cosign
πŸ”Ή Tool for signing and verifying container images to ensure integrity and trust:

Key takeaway:
πŸ‘‰ Always scan, sign, and sandbox - secure containers start with secure images.

#docker #containerization #security
πŸ‘3πŸ”₯1
⚠️ CVE-2025-24813 Apache Tomcat as Actively Exploited with 9.8 CVSS ⚠️

πŸ”₯ PoC: https://github.com/brs6412/CVE-2025-24813

🎯 6.7m+ Results are found on the https://en.fofa.info nearly year.

πŸ”— FOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJBUEFDSEUtVG9tY2F0Ig%3D%3D

FOFA Query:app="APACHE-Tomcat"

πŸ”– Refer: https://securityonline.info/cisa-flags-apache-tomcat-cve-2025-24813-as-actively-exploited-with-9-8-cvss/

#OSINT #FOFA #CyberSecurity #Vulnerability
πŸ”₯3
🚨 CVE-2025-22167 (CVSS 8.7): Jira Path Traversal flaw allows arbitrary file writes to any JVM-writable path. Possible RCE when chained with other exploits. 🚨

Search by vul.cve Filter: πŸ‘‰ vul.cve="CVE-2025-22167"
ZoomEye Dork: πŸ‘‰ app="Atlassian JIRA"
Over 107k vulnerable instances.
ZoomEye Link: Here

Refer:
1. https://jira.atlassian.com/browse/JSDSERVER-16409
2. https://hub.zoomeye.ai/detail/68f99417ad32f0b8765c0a99

#ZoomEye #cybersecurity #infosec #OSINT
πŸ”₯2
The best way to learn Web Cache Deception is through this learning path. πŸ‘‡

You'll learn to spot discrepancies in how origin servers and caches handle requests and then leverage these differences to create path confusion.

You'll learn:

πŸ”Ά Identifying web caches
πŸ”Ά How to construct a web cache deception attack
πŸ”Ά How to exploit cache rules
πŸ”Ά Leveraging path mapping and delimiter discrepancies
πŸ”Ά Preventing web cache deception vulnerabilities

Get Started: πŸ‘‰ Here
πŸ‘1πŸ”₯1
☠️ Web Cache Poisoning ☠️ - is an attack where a hacker manipulates HTTP requests to store malicious or incorrect content in a web cache or CDN.

πŸ‘‰ As a result, all users who later access the cached page receive the poisoned version, potentially leading to mass XSS, phishing, or content manipulation.

πŸ‘‰ Read more about: Here
✍1❀1
πŸ€– Prompt Injection Methodology for GenAI Application Pentesting πŸ€–

πŸ‘‰ Get Started: Here

#AI #Pentest #Red_Team
❀2
πŸ› οΈ SSH Tunnels: Port Forwarding on Steroids πŸ› οΈ

πŸ”Έ A short Cheat Sheet to help you understand SSH tunneling.

#ssh_tunneling #pentest #red_team
❀1✍1
β›” Microsoft: DNS outage impacts Azure and Microsoft 365 services β›”

Microsoft is suffering an ongoing DNS outage affecting customers worldwide, preventing them from logging into company networks and accessing Microsoft Azure and Microsoft 365 services.
❀1😱1
☠️ Evading Elastic Security - Deep dive into bypassing detections through string obfuscation, symbol randomization, XOR-encoded fragments & behavioral evasion techniques. ☠️

Here πŸ‘‰ https://matheuzsecurity.github.io/hacking/bypassing-elastic

#infosec #redteam #linux #rootkit #elastic #malware
πŸ”₯2
🧨 The Top 10 Most Dangerous Web3 Vulnerabilities Right Now 🧨

πŸ”Έ Access Control Vulnerabilities
πŸ”Έ Price Oracle Manipulation
πŸ”Έ Logic Errors
πŸ”Έ Lack of Input Validation
πŸ”Έ Reentrancy Attacks
πŸ”Έ Unchecked External Calls
πŸ”Έ Flash Loan Attacks
πŸ”Έ Integer Overflow and Underflow
πŸ”Έ Insecure Randomness
πŸ”Έ Denial of Service (DoS) Attacks

Details: πŸ‘‰ Here
πŸ’―2🀑1
⚠️ How To Secure A Linux Server. ⚠️

This guides purpose is to teach you how to secure a Linux server.
There are a lot of things you can do to secure a Linux server and this guide will attempt to cover as many of them as possible.

πŸ‘‰ Read more - Here πŸ‘ˆ

#info_sec #linux #hardening
πŸ‘2
Top virtual machines for Cybersecurity Engineers.

#info_sec #Red_Team #pentest_OS
✍3
Host-Pulse - a fast, lightweight domain liveness probe for pentesters and security engineers.

Scans large domain lists, quickly skips dead targets, detects reachable hosts (including 403/401/5xx), and produces clean alive.txt and compact results.csv reports.

Tool: πŸ‘‰ https://github.com/xV4nd3Rx/Host-Pulse

⚑ Fast-skip dead targets.
🎯 Alive logic tuned for pentesting
🧩 Randomized User-Agent per request to avoid simple UA-based filtering.
πŸ” Parallel workers + controlled delays
πŸ” Insecure HTTPS requests are supported (suppressed warnings) so scanning continues even with untrusted certs

#pentest_tools #Red_Team #cybersecurity #Passive_Recon
πŸ”₯2