Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

Web Application pentesting: a guide

In Security, the concept of attack-surface (or attack surface) refers to the set of entry points that an attacker can use to access a system or application and carry out…

Read More


Nuclei: Attack Surface with Faraday

In Security, the concept of attack-surface (or attack surface) refers to the set of entry points that an attacker can use to access a system or application and carry out…

Read More


Automating Security Tasks

In this second part (part one), we will show a step by step of a security analysis having in mind a basic methodology: - Perform a passive recognition of the target - Go…

Read More


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…

Read More


Reverse engineering and game hacking resources

If you are curious about reverse engineering, cybersecurity and game hacking, then this is for you too. Happy hacking and keep on learning!

Read More


A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…

Read More