Our open-source tools go to Black Hat!

We're thrilled to announce that our groundbreaking tools,…


Bypassing certificate pinning with Gabriel Franco

Many apps implement a security feature called Certificate…


Faraday Red team goes to Chile with Ekoparty training

The primary objective of this training is to equip students…


Faraday Vulnerability management platform: a seamless experience

Vuln management users seek to have a general, orderly and…


Web Application pentesting: a guide

In Security, the concept of attack-surface (or attack…


Nuclei: Attack Surface with Faraday

In Security, the concept of attack-surface (or attack…


Automating Security Tasks

In this second part (part one), we will show a step by step…


Release v4.3.3

We are excited to announce the release of our latest…


Security Orchestration, the key to Vulnerability Management

Whether your IT department or security team needs to…