Chimp Blog

SECURITY
RESEARCH &
UPDATES.

Tutorials, product updates, threat research, and practical security guides from the Chimp team at Cloudnate.

Understanding C2 Frameworks: Havoc vs. Mythic in Modern Red Team Operations

A deep dive into two of the most capable open-source C2 frameworks — how they handle listener management, payload generation, and OPSEC, and when to choose one over the other.

DVWA From Zero: A Structured Walkthrough Using Chimp's Lab Environment

Set up DVWA inside Chimp's Lab Environment, work through SQL injection, XSS, and command injection modules, and let Chimp auto-inject the lab IP into every tool command.

What's New in v1.5.0: Tools DB Live Updates, Dynamic Model Selection, and Content Packs

Phase 18 ships a runtime tools updater, a live model dropdown pulled directly from the Anthropic and OpenAI APIs, and a full content pack export/import/install system — all without reinstalling the app.

Threat Modelling Automotive Systems Under ISO 21434: A Practical TARA Guide

Walk through a Threat Analysis and Risk Assessment for a connected vehicle using Chimp's Automotive Security template, covering attack feasibility, impact ratings, and risk treatment decisions.

Integrating Chimp's CLI Into Your GitHub Actions Security Pipeline

How to configure chimp threat-model and chimp report in a GitHub Actions workflow to generate a security assessment on every pull request to main.

Red vs. Blue: How Chimp's Team Mode Toggle Changes Your Workflow

A look at how the Red/Blue sidebar filter, team-tagged topics, and cheat sheet overlay work together to give offensive and defensive practitioners a faster, more focused experience.

© 2026 Cloudnate · Chimp Security Workbench · Back to Home