Using Faraday API for Vulnerability Management

Within our team, we prefer to focus on specific tasks…


SADProtocol goes to Hollywood

This research project started when Javier’s wife, our ex…


First steps in cybersecurity: scan your domain

Pentesters use a comprehensive and complete toolkit to…


Visualize findings and understand your security posture

Our risk scoring system goes beyond mere criticality…


Use Slash Command in Slack to interact with Faraday

In this blog, we are going to create a Slack app to allow…


A three-hour session about hacking by our CEO, Federico Kirschbaum

It's true that cybersecurity is primarily something…


Optimize reporting by integrating Faraday into Zoho.

Integrating Zoho CRM, Zoho Projects, and Faraday into your…


Las Vegas 2023 recap

Another Las Vegas season has passed, and it's been a……


EmploLeaks: Finding Leaked Employees Info for the Win

we developed an internal tool that displayed great…


Tips Nmap Script Engine

Nmap (Network Mapper) is a popular network scanner that…