Our open-source tools go to Black Hat!
Red teamOpen SourcePressPentesting
June 26, 2023
We're thrilled to announce that our groundbreaking tools, Faraday and EmploLeaks, have been selected to be part of this year's prestigious Black Hat Arsenal
Web Application pentesting: a guide
Offensive SecurityRed teamPentestingVulnerability Management
April 20, 2023
In Security, the concept of attack-surface (or attack surface) refers to the set of entry points that an attacker can use to access a system or application and carry out an attack. In other words, it is the complete map in which a system or application can be violated. They may include software vulnerabilities, insecure configurations, unauthorized access, open ports, application programming interfaces (APIs), among others. The larger the attack surface of a system or application, the greater the risk that an attacker could exploit a vulnerability and compromise the security of the system.
Nuclei: Attack Surface with Faraday
Offensive SecurityRed teamPentestingVulnerability Management
April 6, 2023
In Security, the concept of attack-surface (or attack surface) refers to the set of entry points that an attacker can use to access a system or application and carry out an attack. In other words, it is the complete map in which a system or application can be violated. They may include software vulnerabilities, insecure configurations, unauthorized access, open ports, application programming interfaces (APIs), among others. The larger the attack surface of a system or application, the greater the risk that an attacker could exploit a vulnerability and compromise the security of the system.
Automating Security Tasks
Offensive SecurityRed teamPentestingVulnerability Management
March 16, 2023
In this second part (part one), we will show a step by step of a security analysis having in mind a basic methodology:
- Perform a passive recognition of the target
- Go through an active recognition
- Identify vulnerabilities coming from an automatic scanning
- Exploit these vulnerabilities
- Wrap up with an executive report
Pentesting toolkit: all you need to know
Offensive SecurityRed teamPentesting
November 24, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit vulnerabilities and are experts at reporting failures, data leakage, or other vulnerabilities.
In this post, we present these tools and the several ways they can be applied.
Reverse engineering and game hacking resources
Offensive SecurityRed teamPentestingCybersec
November 9, 2022
If you are curious about reverse engineering, cybersecurity and game hacking, then this is for you too. Happy hacking and keep on learning!