Hello Austin Go hackers! Tonight (2026-02-11) is our next ATX Golang meetup, located in Station Austin (aka Capital Factory ). We will have pizza, drinks, and various short talks and discussions related to the Go ecosystem. If you're looking for a Go job, this is a great place to meet potential employers and get a sense for what the interview process looks like in a world of AI noise: https://www.meetup.com/atxgolang/events/312781558/?eventOrigin=group_upcoming_events

runZero users get a new feature today (including Community Edition) - recurring internet speed tests for all deployed Explorers! This (very optional) capability lets you identify backhaul/connectivity issues for sites that you can't physically get to, smoothing the path for tool deployment and exposure management processes: https://www.runzero.com/blog/internet-speed-tests/
Thanks to Pete C for the writeup, Jeremy B for the UX, and Iain P for the suggestion!
Handy for tracking ISP issues on your home network as well =D

It's time for our first ATX Gopher meetup of the year! If you are in Austin and write Go code (or would like to start), please join us at 6:30pm at Station Austin (co-located with Capital Factory). Charles and I will be providing pizza and drinks as usual, we have a guest speaker lined up for the main session, and a few smaller talks available as time permit (
I plan to cover two new projects: 1. & 2).https://www.meetup.com/atxgolang/events/312781553/?_xtd=gqFyqDc2Njk0NTQyoXCjYXBp&from=ref
1. https://github.com/runZeroInc/go-rod
2. https://github.com/runZeroInc/conniver/
The CFP for SO-CON 2026 closes in about 12 hours (11:59 2025-11-15)! Have a cool approach to attack path management (or awesome connector for BloodHound OpenGraph)? Submit ASAP:

The clever folks at Grumpy Goose Labs have published even more ways to identify unauthorized IP KVMs across your environment, with some great memes to boot! Be KVM, Do Fraud - https://blog.grumpygoose.io/be-kvm-do-fraud-8ab523d26c9d

Identify insecure TLS services with the enhanced runZero Certificate Inventory: https://www.runzero.com/blog/identify-insecure-tls-services/

Austin Hackers Anonymous (AHA) is TONIGHT (2025-10-30) https://takeonme.org/ - Have some zero-day to share? AHA is an official CNA and will issue CVEs for vulnerabilities disclosed at the meeting. I'm planning to demo more SSHamble.com findings along with BloodHound OpenGraph stuff. See yall soon!

Just like chocolate and peanut butter, runZero and BloodHound are an amazing combination. Today we are introducing runZeroHound - an open source toolkit for bringing runZero Asset Inventory data into BloodHound attack graphs, using the brand new OpenGraph feature in BloodHound v8. Check out the announcement and open source code at: https://www.runzero.com/blog/introducing-runzerohound/

SpecterOps released "DumpGuard" along with a detailed article on how they were able to bypass Windows Credential Guard in both privileged and unprivileged contexts. I learned a ton about Isolated LSA and friends. Its funny to see that DES-cracking of NTLMv1 challenges is still relevant (and that https://ntlmv1.com/ has supplanted https://crack.sh).
Article: https://specterops.io/blog/2025/10/23/catching-credential-guard-off-guard/
DumpGuard: https://github.com/bytewreck/DumpGuard

Today's runZero Hour is up with Rob King, Tod Beardsley, and EOL expert and technology necromancer, captn3m0 (pronounced “nemo”). They will summon and explore runZero’s latest research paper, “Undead by design: Benchmarking end-of-life operating systems”, which digs deep in real customer networks to get a sense of just how prevalent running EOL OSes are – and it's spine-chilling!
Copyright 1998-2026 HD Moore