Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

Reverse engineering and game hacking resources

If you are curious about reverse engineering, cybersecurity and game hacking, then this is for you too. Happy hacking and keep on learning!

Read More


Our CEO Federico Kirschbaum at Argentina Fintech Forum

“Security is a culture; you set it up, learn from it, and test it. It is always possible to incorporate security. The sooner, the better, and the easier to scale up.”…

Read More


Release v4.2.0

Optimizing your security posture by drastically reducing the time spent on executing, managing, and prioritizing.

Read More


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly two-thirds of the global population will have Internet access by 2023. The number of devices connected to IP networks…

Read More


Bypassing password protection and getting a shell through UART in NEC Aterm WR8165N Wi-Fi router

We started out by trying to connect to the router via UART and found out that it asks for a username and password in order to log in. We made many attempts using…

Read More


Automating Burp Suite with Faraday

Scaling security testing is hard if you are performing manual audits and can create bottlenecks in the development lifecycle. At Faraday, we are always thinking about…

Read More