
In an alarming trend that underscores the evolving complexity of cyber threats, malicious actors are now turning to pentesting tools within npm, PyPI, and RubyGems ecosystems to orchestrate sophisticated attacks. What were once ethical Open-source Application Security Testing (OAST) utilities, aimed at identifying vulnerabilities and improving security protocols, are now being weaponized to establish command and control (C2) channels and










