Good practices in Cybersecurity – Part 2

Nowadays, we can distinguish various branches within a…


Tips Nmap Script Engine

Nmap (Network Mapper) is a popular network scanner that…


Release v4.3.5

We are happy to share the latest updates of our…


Web Application pentesting: a guide

In Security, the concept of attack-surface (or attack…


Nuclei: Attack Surface with Faraday

In Security, the concept of attack-surface (or attack…


Automating Security Tasks

In this second part (part one), we will show a step by step…


2022 Recap: our most read article

A new year means new opportunities but also new…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…


Reverse engineering and game hacking resources

If you are curious about reverse engineering, cybersecurity…