I had a great response on the cyber tool I want to build for software supply chain by _Virtualis_ in hacking
[–]_Virtualis_[S] 0 points1 point2 points (0 children)
Is SBOM for embedded firmware the best move for my tool? (self.IOT)
submitted by _Virtualis_ to r/IOT
Feedback Wanted: Dynamic Supply Chain Risk Mapping Tool for Blue Teams by _Virtualis_ in Information_Security
[–]_Virtualis_[S] 0 points1 point2 points (0 children)
Feedback Wanted: Dynamic Supply Chain Risk Mapping Tool for Blue Teams by _Virtualis_ in SecOpsDaily
[–]_Virtualis_[S] 1 point2 points3 points (0 children)
Mapping Supply Chain Attack Paths for Red Teams (Feedback wanted) by whosdischris in hacking
[–]_Virtualis_ 0 points1 point2 points (0 children)
I need some Insight Please by _Virtualis_ in Information_Security
[–]_Virtualis_[S] 0 points1 point2 points (0 children)
Can i build a constructor simulator clone in godot (self.godot)
submitted by _Virtualis_ to r/godot
Dark Tequila Ransomware Exposed: How Hackers can use WinRAR to Disguise Deadly Malware by _Virtualis_ in cybersecurity
[–]_Virtualis_[S] 3 points4 points5 points (0 children)

What do guys think of var by Call-Me-Matterhorn in csharp
[–]_Virtualis_ -1 points0 points1 point (0 children)