2022 Recap: our most read article

A new year means new opportunities but also new…


Faraday CTF 2022 Write-up: Reverse Engineering and Exploiting an IoT bug

In most of the write-ups of CTF, reverse engineering…


Prioritizing: making your Vulnerability Management Manageable

We orchestrate many scanners results at Faraday into the…


Release v4.3.0

Great news: We're releasing some awesome cybersecurity new…


Integrating Faraday in the software development process – GitLab – Part 4

Pentesters use a comprehensive and complete toolkit to…


Integrating Faraday in the software development process – Jenkins – Part 2

We are going to integrate Jenkins into Faraday with…


Integrating Faraday in the software development process – Travis – Part 3

Pentesters use a comprehensive and complete toolkit to…


Integrating Faraday in the software development process – GitHub – Part 1

Pentesters use a comprehensive and complete toolkit to…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…


Exploring the Hidden Attack Surface of OEM IoT devices live talk – English & Spanish

The security of a company’s network also depends on the…