Sublime
An inspiration engine for ideas
Antimetal
antimetal.com
Censys and LeakIX are a couple options, both providing search capabilities without registering and a bit more functionality upon free registration:
Censys.io example: https://search.censys.io – ‘ip: [10.1.0.129 to 10.1.0.140]’ or ‘ip: 10.1.0.128/25’
Example IP Range Search on Censys
LeakIX.net example: https://leakix.net “Service” – ip:”10.1.0.128
... See moreBHIS • OSINT for Incident Response
The group known as Volt Typhoon was exploiting the zero-day flaw — meaning the software maker was unaware of it before having time to patch — in Versa Director, a piece of software made by Versa Networks, according to researchers at Black Lotus Lab, which is part of cybersecurity firm Lumen.
Lorenzo Franceschi-Bicchierai • Chinese government hackers targeted U.S. internet providers with zero-day exploit, researchers say | TechCrunch

Asset Vulnerability : Identifying vulnerabilities within these assets is the next step. Vulnerabilities can be technical (e.g., unpatched software) or human-related (e.g., suboptimal configuration). Individual vulnerabilities will also have different outcomes and widely varying likelihoods of real-world exploitation. Does successful exploitation o
... See moreRik Ferguson • The Cybersecurity Resilience Quotient Measuring Security Effectiveness
Secure & reliable LLMs | promptfoo
promptfoo.dev