Release v4.3.0
PentestingVulnerability ManagementLatest Release
December 7, 2022
Great news: We're releasing some awesome cybersecurity new updates to our platform!! We keep delivering improvements that will ease your vulnerability management and pentesting procedures.
Faraday in the software development process – GitLab – Part 4
PentestingVulnerability ManagementWhitepaper
December 6, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit vulnerabilities and are experts at reporting failures, data leakage, or other vulnerabilities.
Faraday in the software development process – Jenkins – Part 2
PentestingVulnerability ManagementWhitepaper
December 5, 2022
We are going to integrate Jenkins into Faraday with pipelines since this is one of the most extended CD/CI tools in the community. DevSecOps
Faraday in the software development process – Travis – Part 3
PentestingVulnerability Management
November 30, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit vulnerabilities and are experts at reporting failures, data leakage, or other vulnerabilities.
In this post, we present these tools and the several ways they can be applied.
Faraday in the software development process – GitHub – Part 1
PentestingVulnerability ManagementWhitepaper
November 29, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit vulnerabilities and are experts at reporting failures, data leakage, or other vulnerabilities.
In this post, we present these tools and the several ways they can be applied.
Pentesting toolkit: all you need to know
Offensive SecurityRed teamPentesting
November 24, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit vulnerabilities and are experts at reporting failures, data leakage, or other vulnerabilities.
In this post, we present these tools and the several ways they can be applied.