Research
/r/netsec's branch in the fediverse.
A community-curated aggregator of technical research. Our mission is to extract signal from the noise.
Only post technical content here. New tools (and major releases of existing ones), novel techniques, deep dives and post mortems are the ideal content. CTF and bug bounty writeups could be acceptable if they showcase lesser known approaches or techniques.
Non-technical content (both beginner and CISO level) will be considered spam.
I played around with WebSockets and wrote a new tool: https://github.com/doyensec/wsrepl
It's an interactive REPL interface like websocat, but it's meant specifically for pentesting, not debugging, and it's easily extensible in Python (while still retaining REPL interface). In future releases I'd like to expand the extensibility by adding declarative style configuration (the ultimate feature would be something like what Burp's Autorize plugin does, but for websockets).
I would like to go deeper on malware development and move to mobile devices. I would like to also study a new language like nim or zig. But the fact that nim has tab-driven codeblocks and zig is not memory safe doesn't convince me much.