?>

๐Ž๐ฏ๐ž๐ซ 16 ๐๐ข๐ฅ๐ฅ๐ข๐จ๐ง ๐๐š๐ฌ๐ฌ๐ฐ๐จ๐ซ๐๐ฌ ๐‹๐ž๐š๐ค๐ž๐ ๐Ÿ๐ซ๐จ๐ฆ ๐€๐ฉ๐ฉ๐ฅ๐ž, ๐…๐š๐œ๐ž๐›๐จ๐จ๐ค, ๐†๐จ๐จ๐ ๐ฅ๐ž & ๐Ž๐ญ๐ก๐ž๐ซ๐ฌ โ€” ๐–๐ก๐š๐ญ ๐˜๐จ๐ฎ ๐๐ž๐ž๐ ๐ญ๐จ ๐Š๐ง๐จ๐ฐ

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

๐Ž๐ฏ๐ž๐ซ 16 ๐๐ข๐ฅ๐ฅ๐ข๐จ๐ง ๐๐š๐ฌ๐ฌ๐ฐ๐จ๐ซ๐๐ฌ ๐‹๐ž๐š๐ค๐ž๐ ๐Ÿ๐ซ๐จ๐ฆ ๐€๐ฉ๐ฉ๐ฅ๐ž, ๐…๐š๐œ๐ž๐›๐จ๐จ๐ค, ๐†๐จ๐จ๐ ๐ฅ๐ž & ๐Ž๐ญ๐ก๐ž๐ซ๐ฌ โ€” ๐–๐ก๐š๐ญ ๐˜๐จ๐ฎ ๐๐ž๐ž๐ ๐ญ๐จ ๐Š๐ง๐จ๐ฐ

Dedicated to those passionate about security.

๐Ž๐ฏ๐ž๐ซ 16 ๐๐ข๐ฅ๐ฅ๐ข๐จ๐ง ๐๐š๐ฌ๐ฌ๐ฐ๐จ๐ซ๐๐ฌ ๐‹๐ž๐š๐ค๐ž๐ ๐Ÿ๐ซ๐จ๐ฆ ๐€๐ฉ๐ฉ๐ฅ๐ž, ๐…๐š๐œ๐ž๐›๐จ๐จ๐ค, ๐†๐จ๐จ๐ ๐ฅ๐ž & ๐Ž๐ญ๐ก๐ž๐ซ๐ฌ โ€” ๐–๐ก๐š๐ญ ๐˜๐จ๐ฎ ๐๐ž๐ž๐ ๐ญ๐จ ๐Š๐ง๐จ๐ฐ

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

What Feature Do You Think Makes or Breaks a Security Tool?

Dedicated to those passionate about security.

What Feature Do You Think Makes or Breaks a Security Tool?

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

What Feature Do You Think Makes or Breaks a Security Tool?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

What Feature Do You Think Makes or Breaks a Security Tool?

Welcome to Cybersources Collective! This community is for sharing, exploring, and contributing cybersecurity resources like tools, guides, and tutorials. Whether you're a pro or a beginner, join us in expanding the Cybersources GitHub repository and building a valuable resource for all. Letโ€™s collaborate!

Get 5 Full Scan Credits Worth $125

Welcome to Cybersources Collective! This community is for sharing, exploring, and contributing cybersecurity resources like tools, guides, and tutorials. Whether you're a pro or a beginner, join us in expanding the Cybersources GitHub repository and building a valuable resource for all. Letโ€™s collaborate!

Have you ever caught a critical vulnerability in production with a free scanner?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

What are the must-have features in a modern pentesting tool today?

A forum for discussion on penetration testing, otherwise known as ethical hacking.

What are the must-have features in a modern pentesting tool today?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

How many of you are scanning login-protected pages in your pentests?

Welcome to Cybersources Collective! This community is for sharing, exploring, and contributing cybersecurity resources like tools, guides, and tutorials. Whether you're a pro or a beginner, join us in expanding the Cybersources GitHub repository and building a valuable resource for all. Letโ€™s collaborate!

Share your answer in comment section

Post image
Welcome to Cybersources Collective! This community is for sharing, exploring, and contributing cybersecurity resources like tools, guides, and tutorials. Whether you're a pro or a beginner, join us in expanding the Cybersources GitHub repository and building a valuable resource for all. Letโ€™s collaborate!

What vulnerability scanner do you use?

Welcome to Cybersources Collective! This community is for sharing, exploring, and contributing cybersecurity resources like tools, guides, and tutorials. Whether you're a pro or a beginner, join us in expanding the Cybersources GitHub repository and building a valuable resource for all. Letโ€™s collaborate!

Is automated pentesting a threat to manual pentesters?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

Is zerothreat.ai legit for DAST scans or just marketing hype?

A forum for discussion on penetration testing, otherwise known as ethical hacking.

Is zerothreat.ai legit for DAST scans or just marketing hype?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

Is ZeroThreatโ€™s free scan safe to use in a staging environment?

Welcome to Cybersources Collective! This community is for sharing, exploring, and contributing cybersecurity resources like tools, guides, and tutorials. Whether you're a pro or a beginner, join us in expanding the Cybersources GitHub repository and building a valuable resource for all. Letโ€™s collaborate!

Anyone tried the free AI-based pentesting from ZeroThreat lately? Worth it?

Welcome to Cybersources Collective! This community is for sharing, exploring, and contributing cybersecurity resources like tools, guides, and tutorials. Whether you're a pro or a beginner, join us in expanding the Cybersources GitHub repository and building a valuable resource for all. Letโ€™s collaborate!

Is the industry still underestimating low-code/no-code app vulnerabilities?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

Whatโ€™s the most overlooked vulnerability in modern web apps today?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

How do you handle clients who think pentesting is just automated scanning?

A forum for discussion on penetration testing, otherwise known as ethical hacking.

How do you handle clients who think pentesting is just automated scanning?

Dedicated to those passionate about security.

How do you handle clients who think pentesting is just automated scanning?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

Tight Budget, Big Threats: 5 Free Vulnerability Scanners for Every Ethical Hacker

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.