-
This post on the release of OST by @Daniel_Infosec well worth a read. I was searching for more material on this topic, but I’ve found very little. I find this surprising as I got the impression that this is quite controversial in the infosec community? catscrdl.io/blog/opensourceredteamtooling/
-
@Daniel_Infosec As in, there seems to be lots of “discussion” on Twitter but I can’t find much of a proper debate. Maybe there is I just can’t find it? I’ve found the original from @anthomsec , Daniel’s, a comment from @DanielMiessler danielmiessler.com/blog/comparing-offensive-security-tooling-and-gun-control/ and this one lockboxx.blogspot.com/2019/12/misconceptions-regarding-offensive.html
-
@Daniel_Infosec @anthomsec @DanielMiessler Adding to this list, one I somehow missed early this year from @taosecurity taosecurity.blogspot.com/2021/02/digital-offense-capabilities-are.html
-
And this one @grayhatter/1439609314486853639
-
And of course this from @1njection lockboxx.blogspot.com/2019/12/misconceptions-regarding-offensive.html
-
Also @kaitlyn_devalk et. al. has done some great research on this security-information-workers.org/downloads/Industry%20perspectives.pdf
-
Thanks to the👆paper I found a few more. @chrissanders88 's call to research is the best written problem statement I've seen👏 chrissanders.org/2020/07/research-ost-release/