May 29, 2024
Good practices in Cybersecurity – Part 3
Good security practices go hand in hand with automation,…
March 12, 2024
Good practices in Cybersecurity – Part 2
Nowadays, we can distinguish various branches within a…
December 7, 2023
First steps in cybersecurity: scan your domain
Pentesters use a comprehensive and complete toolkit to…
August 11, 2023
EmploLeaks: Finding Leaked Employees Info for the Win
we developed an internal tool that displayed great…
June 26, 2023
Our open-source tools go to Black Hat!
We're thrilled to announce that our groundbreaking tools,…
April 20, 2023
Web Application pentesting: a guide
In Security, the concept of attack-surface (or attack…
April 6, 2023
Nuclei: Attack Surface with Faraday
In Security, the concept of attack-surface (or attack…