A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers
September 8, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…
AWS Common Issues – Part 2
Vulnerability ManagementPentesting
September 6, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…
Faraday latest release – Open Source Penetration Testing and Vulnerability Management Platform
August 5, 2022
A complete tool for pentesters, security experts, devsecops. To integrate there day to day scans and tasks. Avoid manual tasks. Expose different platforms and evaluate…
Continuous testing, continuous security
CybersecVulnerability ManagementPentestingRed teamOffensive Security
July 29, 2022
Cybersecurity as a constant race, in which attackers and defenders are always trying to innovate and adapt to new situations. When systems change, attackers find new…
Securing open source software (Part 2)
CybersecPentestingOpen SourceWhitepaper
July 19, 2022
Open-source software increases its presence in data centers, consumer devices, and applications; also, its community continues to grow. Despite the code being available,…
Pentesting toolkit: all you need to know
Vulnerability ManagementPentestingOffensive Security
July 17, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…