Release v4.3.2

We started 2023 with fresh and new fixes. One of the most…


2022 Recap: our most read article

A new year means new opportunities but also new…


Reverse Engineering and Exploiting an IoT bug

In most of the write-ups of CTF, reverse engineering…


Prioritizing: making your Vulnerability Management Manageable

We orchestrate many scanners results at Faraday into the…


Release v4.3.0

Great news: We're releasing some awesome cybersecurity new…


Faraday in the software development process – GitLab – Part 4

Pentesters use a comprehensive and complete toolkit to…


Faraday in the software development process – Jenkins – Part 2

We are going to integrate Jenkins into Faraday with…


Faraday in the software development process – Travis – Part 3

Pentesters use a comprehensive and complete toolkit to…


Faraday in the software development process – GitHub – Part 1

Pentesters use a comprehensive and complete toolkit to…


Exploring the Hidden Attack Surface of OEM IoT devices talk

The security of a company’s network also depends on the…