Faraday CTF 2022 Write-up: Reverse Engineering and Exploiting an IoT bug
Vulnerability ManagementPentesting
December 30, 2022
In most of the write-ups of CTF, reverse engineering concepts are taken for granted. This is a problem for newcomers unfamiliar with some basic concepts or If don’t have…
Prioritizing: making your Vulnerability Management Manageable
CybersecVulnerability ManagementPentesting
December 19, 2022
We orchestrate many scanners results at Faraday into the same pipeline. This is how the process starts, but then we devote some time to deciding the importance or…
Release v4.3.0
Vulnerability ManagementPentestingLatest Release
December 7, 2022
Great news: We're releasing some awesome cybersecurity new updates to our platform!! We keep delivering improvements that will ease your vulnerability management and…
Integrating Faraday in the software development process – GitLab – Part 4
Vulnerability ManagementPentestingWhitepaper
December 6, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…
Integrating Faraday in the software development process – Jenkins – Part 2
Vulnerability ManagementPentestingWhitepaper
December 5, 2022
We are going to integrate Jenkins into Faraday with pipelines since this is one of the most extended CD/CI tools in the community. DevSecOps
Integrating Faraday in the software development process – Travis – Part 3
Vulnerability ManagementPentesting
November 30, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…