Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…


Exploring the Hidden Attack Surface of OEM IoT devices talk

The security of a company’s network also depends on the…


Reverse engineering and game hacking resources

If you are curious about reverse engineering, cybersecurity…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Bypassing passwords and getting a shell through UART in a Wi-Fi router

We started out by trying to connect to the router via UART…


Automating Burp Suite with Faraday

Scaling security testing is hard if you are performing…


We updated Faraday Burp extender

We updated the Faraday Burp extender. Connect Burp to…


Our team’s vulnerabilities disclosures 2022

We devote time to reporting vulnerabilities in open-source…


Our team’s vulnerability disclosures 2021

Pentesters use a comprehensive and complete toolkit to…


v4.1 Released

Since our last version came out, we have dedicated…