<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Hackerspot: Tools]]></title><description><![CDATA[This section will offer a comprehensive overview of essential security tools and a variety of open-source repositories that are integral to the field of cybersecurity. We will explore various types of security tools, including intrusion detection systems, firewalls, and encryption software, as well as highlight notable open-source projects that facilitate threat detection, vulnerability assessment, and incident response. Additionally, we will discuss the significance of these resources in strengthening cybersecurity measures and promoting collaboration within the cybersecurity community.]]></description><link>https://www.hackerspot.net/s/tools</link><image><url>https://substackcdn.com/image/fetch/$s_!o8CQ!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d62e87e-ddb5-4613-87de-9c210c430032_160x160.png</url><title>Hackerspot: Tools</title><link>https://www.hackerspot.net/s/tools</link></image><generator>Substack</generator><lastBuildDate>Mon, 04 May 2026 08:45:23 GMT</lastBuildDate><atom:link href="https://www.hackerspot.net/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Hackerspot]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[hackerspot@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[hackerspot@substack.com]]></itunes:email><itunes:name><![CDATA[Chady]]></itunes:name></itunes:owner><itunes:author><![CDATA[Chady]]></itunes:author><googleplay:owner><![CDATA[hackerspot@substack.com]]></googleplay:owner><googleplay:email><![CDATA[hackerspot@substack.com]]></googleplay:email><googleplay:author><![CDATA[Chady]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[How to Protect Your Secrets from Data Breaches with TruffleHog]]></title><description><![CDATA[In the world of cybersecurity, a &#8220;secret&#8221; is like a digital key.]]></description><link>https://www.hackerspot.net/p/how-to-protect-your-code-from-data</link><guid isPermaLink="false">https://www.hackerspot.net/p/how-to-protect-your-code-from-data</guid><dc:creator><![CDATA[Chady]]></dc:creator><pubDate>Sat, 31 Jan 2026 04:30:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qr01!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the world of <strong>cybersecurity</strong>, a &#8220;secret&#8221; is like a digital key. These secrets include your <strong>passwords</strong>, <strong>API keys</strong>, and <strong>private tokens</strong>.</p><p>If you accidentally leave a secret in your code and upload it to <a href="https://github.com/">GitHub</a>, a hacker can find it in seconds. This is called a <strong>leak</strong>. Once a hacker has your key, they can steal your data or run up a huge bill on your account.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qr01!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qr01!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qr01!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qr01!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qr01!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qr01!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg" width="1024" height="545" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:545,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:156421,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qr01!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qr01!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qr01!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qr01!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F009bf86b-65a2-46e4-958f-1b97739ccfc5_1024x545.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>To &#8230;</p>
      <p>
          <a href="https://www.hackerspot.net/p/how-to-protect-your-code-from-data">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Trivy: A Scanner for CICD]]></title><description><![CDATA[Keeping software secure is not easy.]]></description><link>https://www.hackerspot.net/p/trivy-a-scanner-for-modern-devsecops</link><guid isPermaLink="false">https://www.hackerspot.net/p/trivy-a-scanner-for-modern-devsecops</guid><dc:creator><![CDATA[Chady]]></dc:creator><pubDate>Fri, 23 Jan 2026 15:37:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wYrg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Keeping software secure is not easy. Applications today depend on containers, open-source libraries, cloud services, and infrastructure as code. Each of these layers can introduce security risks if they are not checked regularly. This is where <strong>Trivy</strong> becomes very useful.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wYrg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wYrg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wYrg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wYrg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wYrg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wYrg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg" width="1024" height="679" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:679,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:147361,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wYrg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wYrg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wYrg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wYrg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a5e55c-cf01-40e3-a1de-eef2af61f73f_1024x679.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Trivy is an open-source security scanner created by Aqua Security. It helps teams fin&#8230;</p>
      <p>
          <a href="https://www.hackerspot.net/p/trivy-a-scanner-for-modern-devsecops">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Nuclei Vulnerability Scanner: A Simple and Practical Guide for Security Teams]]></title><description><![CDATA[Nuclei is an open-source vulnerability scanner created by ProjectDiscovery. It uses simple YAML templates to detect vulnerabilities in web applications, APIs, networks, DNS services, and cloud environments. This blog explains what Nuclei is, how it works, and why many security professionals rely on it.]]></description><link>https://www.hackerspot.net/p/nuclei-vulnerability-scanner-a-practical</link><guid isPermaLink="false">https://www.hackerspot.net/p/nuclei-vulnerability-scanner-a-practical</guid><dc:creator><![CDATA[Chady]]></dc:creator><pubDate>Fri, 09 Jan 2026 14:56:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YsM3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Nuclei</strong> is an open-source vulnerability scanner created by <strong>ProjectDiscovery</strong>. It uses simple YAML templates to detect vulnerabilities in web applications, APIs, networks, DNS services, and cloud environments. This blog explains what Nuclei is, how it works, and why many security professionals rely on it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YsM3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YsM3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YsM3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YsM3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YsM3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YsM3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg" width="915" height="486" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:486,&quot;width&quot;:915,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:65824,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YsM3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YsM3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YsM3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YsM3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48e98c-3cbd-4226-a762-d32315ada784_915x486.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>What Is Nuclei?</h2><p>Nuclei is a <strong>template-based vulnerabil&#8230;</strong></p>
      <p>
          <a href="https://www.hackerspot.net/p/nuclei-vulnerability-scanner-a-practical">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[What Is Open Policy Agent (OPA) and How You Can Use It]]></title><description><![CDATA[Managing security across a large company is often messy.]]></description><link>https://www.hackerspot.net/p/what-is-open-policy-agent-opa-and</link><guid isPermaLink="false">https://www.hackerspot.net/p/what-is-open-policy-agent-opa-and</guid><dc:creator><![CDATA[Chady]]></dc:creator><pubDate>Fri, 02 Jan 2026 15:30:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-xK8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Managing security across a large company is often messy. Every team uses different tools and has their own way of writing rules. In a large environment, it's possible that no one knows which system follows which policy. <strong>Open Policy Agent (OPA)</strong> fixes this by bringing order to the chaos.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-xK8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-xK8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png 424w, https://substackcdn.com/image/fetch/$s_!-xK8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png 848w, https://substackcdn.com/image/fetch/$s_!-xK8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png 1272w, https://substackcdn.com/image/fetch/$s_!-xK8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-xK8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png" width="1456" height="403" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:403,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1012421,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackerspot.net/i/180678443?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!-xK8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png 424w, https://substackcdn.com/image/fetch/$s_!-xK8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png 848w, https://substackcdn.com/image/fetch/$s_!-xK8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png 1272w, https://substackcdn.com/image/fetch/$s_!-xK8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc45e766-55de-4d14-ab18-d25f11df2854_1612x446.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>OPA gives you one consistent way to write and enforce rules across yo&#8230;</p>
      <p>
          <a href="https://www.hackerspot.net/p/what-is-open-policy-agent-opa-and">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Prowler: Open-Source Multi-Cloud Compliance & Threat Visibility]]></title><description><![CDATA[Multi-cloud posture management, AWS, Azure, GCP security audit, open source cloud scanner, CIS benchmark automated checks, Kubernetes compliance scanner, cloud misconfiguration detection, Prowler CLI security, FedRAMP NIST SOC2 compliance tool]]></description><link>https://www.hackerspot.net/p/prowler-open-source-multi-cloud-compliance</link><guid isPermaLink="false">https://www.hackerspot.net/p/prowler-open-source-multi-cloud-compliance</guid><dc:creator><![CDATA[Chady]]></dc:creator><pubDate>Fri, 26 Dec 2025 15:27:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!83uz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c589ae-683a-4b4a-a0df-1c9d78f416ce_1024x359.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Security teams today juggle AWS misconfigurations, Azure policy drift, Kubernetes posture concerns, GCP access exposure, M365 governance gaps, and the occasional compliance audit that arrives like a surprise tax bill. But instead of duct-taping scripts and dashboards together, there is an open-source tool that already does the heavy lifting:</p><p><strong>Prowler</strong> &#8211; a &#8230;</p>
      <p>
          <a href="https://www.hackerspot.net/p/prowler-open-source-multi-cloud-compliance">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[XSStrike: A Smarter Scanner for Pentesters]]></title><description><![CDATA[XSStrike approaches XSS testing differently. Instead of blindly injecting payloads, it analyzes the application&#8217;s response, understands the injection context, and generates payloads that are more likely to execute successfully. This makes XSStrike a valuable tool for pentesters who want accurate results and real exploitation paths.Cross-Site Scripting (XSS) isn&#8217;t a new vulnerability.]]></description><link>https://www.hackerspot.net/p/xsstrike-a-smarter-scanner-for-pentesters</link><guid isPermaLink="false">https://www.hackerspot.net/p/xsstrike-a-smarter-scanner-for-pentesters</guid><dc:creator><![CDATA[Chady]]></dc:creator><pubDate>Sat, 06 Dec 2025 03:09:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!h9sM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Cross-Site Scripting (XSS) isn&#8217;t a new vulnerability. It&#8217;s persistent, versatile, and still very effective in real-world exploitation. Even mature applications fail against it. Most scanners attack XSS like a toddler with a keyboard: repeated payloads, random fuzzing, pure noise. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h9sM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h9sM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg 424w, https://substackcdn.com/image/fetch/$s_!h9sM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg 848w, https://substackcdn.com/image/fetch/$s_!h9sM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!h9sM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h9sM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg" width="1024" height="559" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:559,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!h9sM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg 424w, https://substackcdn.com/image/fetch/$s_!h9sM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg 848w, https://substackcdn.com/image/fetch/$s_!h9sM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!h9sM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e67367-64da-4807-94a5-ed96f7beda07_1024x559.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>XSStrike offers improved testing by analyzing responses, understanding inj&#8230;</p>
      <p>
          <a href="https://www.hackerspot.net/p/xsstrike-a-smarter-scanner-for-pentesters">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Secretive: Protecting SSH Keys on macOS]]></title><description><![CDATA[If you use SSH keys on a Mac, there&#8217;s a great tool that helps protect them better.]]></description><link>https://www.hackerspot.net/p/secretive-protecting-ssh-keys-on</link><guid isPermaLink="false">https://www.hackerspot.net/p/secretive-protecting-ssh-keys-on</guid><dc:creator><![CDATA[Chady]]></dc:creator><pubDate>Fri, 28 Nov 2025 20:22:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zgPs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1942f0fb-c75a-431c-89a1-76108c96807f_703x372.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you use SSH keys on a Mac, there&#8217;s a great tool that helps protect them better. The tool is called <strong><a href="https://github.com/maxgoedjen/secretive">Secretive</a></strong>. It is free and open source. It uses the <strong>Secure Enclave</strong>, which is a special security chip built into most modern Macs. With Secretive, your SSH private keys stay inside this chip. They never appear on your hard drive. This means malware or hac&#8230;</p>
      <p>
          <a href="https://www.hackerspot.net/p/secretive-protecting-ssh-keys-on">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SeCoRA: Your AI-Powered Secure Code Review Agent]]></title><description><![CDATA[While exploring GitHub for security tools, I discovered that SeCoRA is an agent that conducts secure code reviews.]]></description><link>https://www.hackerspot.net/p/secora-your-ai-powered-secure-code</link><guid isPermaLink="false">https://www.hackerspot.net/p/secora-your-ai-powered-secure-code</guid><dc:creator><![CDATA[Chady]]></dc:creator><pubDate>Mon, 17 Feb 2025 18:06:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jJRL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7583947-0952-48d6-943d-c9c48d2878af_1024x707.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>While exploring GitHub for security tools, I discovered that SeCoRA is an agent that conducts secure code reviews. It utilizes advanced AI models to perform static analysis, identify vulnerabilities, and provide actionable security recommendations. In this blog post, we'll examine what SeCoRA is, its features, and how you can use it to enhance the secur&#8230;</p>
      <p>
          <a href="https://www.hackerspot.net/p/secora-your-ai-powered-secure-code">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>