Content-Security Policy (CSP) y cómo (no) confiar ciegamente en ella
Offensive SecurityRed teamPentesting
September 11, 2025
El Content-Security Policy (CSP) es una de las defensas más efectivas contra vulnerabilidades del tipo Cross-Site Scripting (XSS) y ataques relacionados con la carga de recursos maliciosos. Se implementa a través de la cabecera HTTP \\\'Content-Security-Policy\\\', y permite al navegador aplicar restricciones sobre qué scripts, estilos, imágenes u otros recursos pueden cargarse y ejecutarse en una aplicación web.
Good practices in Cybersecurity – Part 3
Offensive SecurityRed teamCybersec
May 29, 2024
Good security practices go hand in hand with automation, integration, and collaboration. As dynamic as the threat landscape is, so must our strategy be. With over 26 thousand vulnerabilities reported last year, it’s now more important than ever to shift security from left to right, and then everywhere.
Good practices in Cybersecurity – Part 2
Offensive SecurityRed teamCybersec
March 12, 2024
Nowadays, we can distinguish various branches within a security team Red Teams, Blue Teams, Purple Teams & Bug Hunters.
But what does each team do?
This difference in colors, adding a new category related to bug bounty, makes us think about common tasks that all these approaches can have within a company; and the truth is, they have a lot. First, let's talk about the definition of each one.
First steps in cybersecurity: scan your domain
Red teamPentestingVulnerability Management
December 7, 2023
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit vulnerabilities and are experts at reporting failures, data leakage, or other vulnerabilities.
In this post, we present these tools and the several ways they can be applied.
Las Vegas 2023 recap
August 23, 2023
Another Las Vegas season has passed, and it's been a blast!
We met some awesome folks, clients, and pentesters at the Black Hat and DefCon conferences, our team rocked both events, and the Get-together was lots of fun.
EmploLeaks: Finding Leaked Employees Info for the Win
August 11, 2023
we developed an internal tool that displayed great potential, leading us to make it open source. Since then, we have continually developed the tool, with the latest version recently pushed to the repository. Our current focus is on ensuring that the application flow is efficient, and we are diligently addressing any bugs that arise as soon as possible. This is an ongoing process, and we are committed to providing a high-quality tool that is reliable and meets the needs of the community. As we proceed with development, we welcome feedback and contributions from users to help us enhance the tool further.