<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/254325d2e9ab463c87626efe48cb1621&quot; frameborder=&quot;0&quot; width=&quot;1138&quot; height=&quot;853&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>853</height><width>1138</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>853</thumbnail_height><thumbnail_width>1138</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/254325d2e9ab463c87626efe48cb1621-a2340b3c590ba817.gif</thumbnail_url><duration>261.6066</duration><title>AI-Augmented Security: Using Kindo + WhiteRabbitNeo for Offsec Operations</title><description>In this demo we use Kindo and WhiteRabbitNeo to help augment Red Team (i.e.: Bug Bounties, Pentesting) and Blue Team workflows. In this demo we use the Dev Copilot to automate tedious aspects of attacking a target, by automating:

- Research of vulnerable services running on the target from recon scans (i.e.: Nmap scans of the target).
- Creation of a Proof of Concept (POC) attack in C#
- Fine tuning of that code POC using up to date data from MITRE&apos;s National Vulnerability Database (NVD).
- Summarizing our findings in another model that otherwise cannot preform security analysis due to its inherent restrictions - in this example, Claude Sonnet.</description></oembed>