Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…

Read More


Exploring the Hidden Attack Surface of OEM IoT devices live talk – English & Spanish

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…

Read More


Reverse engineering and game hacking resources

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…

Read More


Latest Post

Our CEO Federico Kirschbaum at Argentina Fintech Forum

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…


Release v4.2.0

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…


On the security of IoT devices

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…


Bypassing password protection and getting a shell through UART in NEC Aterm WR8165N Wi-Fi router

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…


Automating Burp Suite with Faraday

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…


We updated Faraday Burp extender

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…


Our team’s vulnerabilities disclosures 2022

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…


Our team’s vulnerability disclosures 2021

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…


v4.1 Released

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…


A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT…