Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

Las Vegas 2023 recap

Another Las Vegas season has passed, and it's been a blast!
We met some awesome folks, clients, and pentesters at the Black Hat and DefCon conferences, our team rocked both events, and the Get-together was lots of fun.

Read More


EmploLeaks: Finding Leaked Employees Info for the Win

we developed an internal tool that displayed great potential, leading us to make it open source. Since then, we have continually developed the tool, with the latest version recently pushed to the repository. Our current focus is on ensuring that the application flow is efficient, and we are diligently addressing any bugs that arise as soon as possible. This is an ongoing process, and we are committed to providing a high-quality tool that is reliable and meets the needs of the community. As we proceed with development, we welcome feedback and contributions from users to help us enhance the tool further.

Read More


Tips Nmap Script Engine

Nmap (Network Mapper) is a popular network scanner that allows discovering ports and services, providing relevant information about a network. In addition to basic port scanning, Nmap offers a wide range of options and advanced functionalities. It can perform TCP, UDP, and SCTP scans, operating system detection scans, service version detection, script scans, and much more. It also allows customization of scans and generation of detailed reports.

Read More


Our open-source tools go to Black Hat!

We're thrilled to announce that our groundbreaking tools, Faraday and EmploLeaks, have been selected to be part of this year's prestigious Black Hat Arsenal

Read More


Bypassing certificate pinning with Gabriel Franco

Many apps implement a security feature called Certificate Pinning, creating some problems when trying to intercept the traffic between the application and the server. Today, we’ll cover the basics about that and give some examples of how to bypass it using an Android mobile.

Read More


Faraday Red team goes to Chile with Ekoparty training

The primary objective of this training is to equip students with the ability to identify and analyze potential exposures that a company may face.
Their expertise in identifying exposures, understanding internal protocols, and implementing efficient security measures will make them invaluable assets in today's digital world, where companies must remain constantly vigilant to protect their operations, reputation, and data.

Read More