Welcome. Here is a free text!

logo
  • Solutions
    • Continuous Security
    • Open Source Security
    • Vulnerability Management
    • Penetration Testing Reporting
    • Application Security Teams / DevSecOps
  • Pricing
  • Resources
    • Blog
    • Cybersecurity Events
    • How to get started
    • Documentation
    • Support
    • Quick Tour
  • Partner
  • Services
  • Contact Sales
  • Client Portal >
  • Free Trial

bugbounty

March 23, 2023

Yara rule and some python scripts for detection and sanitization of Acropalypse (CVE-2023-21036) affected PNG images

We have just released a YARA to detect vulnerable images of…


by faradaysec

Ekoparty

GitHub

Medium

Blog


Solutions

➜ Vulnerability Management
➜ Penetration Testing Reporting
➜ Application Security Teams / DevSecOps

Explore

➜ Pricing
➜ Services
➜ Support
➜ Contact Us

Headquarters

3310 Mary St Suite 501
Miami, FL 33133, USA

+1 904 715 4284

Research Lab & Dev

Bolivar 238 2° Floor
Buenos Aires, C1066AAF
Argentina

+54 11 4331 0469


Explore

➜ Pricing
➜ Services
➜ Support
➜ Contact Us

Solutions

➜ Vulnerability Management
➜ Penetration Testing Reporting
➜ Application Security Teams / DevSecOps

Headquarters

3310 Mary St Suite 501
Miami, FL 33133, USA

+1 904 715 4284

Research Lab & Dev

Bolivar 238 2° Floor
Buenos Aires, C1066AAF
Argentina

+54 11 4331 0469

© 2024 Faraday Security. All rights reserved.

Privacy Preference Center

Privacy Preferences

Cookies Settings
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage cookies
{title} {title} {title}

Notification

Instant Alerts: Stay informed with real-time notifications.

Planners

Setup your own actions strategy, assign tasks to users for each phase and easily follow them up You can create your own custom Methodologies, add Tasks, tag them and keep track of your whole project directly from Faraday. Faraday comes with Methodologies loaded by default that allow you to get to work quickly without having to create your own.

Vulnerability Priorization

Process of determining the order in which security vulnerabilities should be addressed based on their severity and potential impact on an organization.

Faraday Continuous Scanning

Faraday Cloud provides the most extensive continuous scanning and real-time insights for the security integrity of your systems Faraday Cloud gives you a multi-engine scanning platform that supports an ever-growing list of industry security tools.

User Authentication

Faraday supports 2nd Factor Authentication. We support any apps, e.g: Google Authenticator (Android) Google Authenticator (iOS) Authy (Android) Authy (iOS) OTP Authenticator (Android, Open Source)

Users

Provide access to the platform through all its channels. Identified by username and profile, it allows to moderate accesses and keep under control data governance.

Workspaces

A workspace is a project presentation that allows you to summarize information from different sources, work with them as a unit, and generate information.

Assets

An asset is any device, resource or other component of the environment that supports information-related activities. For example, IP Addresses and FQDN in the scope of an assessment.

Duplicate Vulns Management

Facilitate the search for possible duplicates and provides the user with a friendly mechanism to associate a set of vulnerabilities that could refer to the same problem/vuln, with the option of leaving only one of these vulnerabilities visible and hiding the rest.

Reporting

The Executive Report feature lets you create (as the name implies) reports using the results obtained in each workspace. When an Executive Report is created, all the data from the Status Report is automatically processed and placed in a PDF/Word compatible document that can then be downloaded.

Pipelines & Jobs

Allows the user to automate tasks after an agent terminates and new vulnerabilities bulk into a workspace. Also when a user manually uploads a tool report to a workspace.

Profiles

Bringing access to different data visualization to Manager, Pentesters, Clients and Assets Owner.

Faraday Cli

Use Faraday directly from your favourite terminal. faraday-cli is the official client that make automating your security workflows, easier.

Process Scheduler

Automate repetitive Agents’ actions and check results on your Dashboard

Ticketing Integration

This is a feature that allows you to send data from Faraday to Jira/ServiceNow as tickets inside the system. In order to do it, go into our Status Report, select the desired vulnerabilities, click on the Tools button and then click on the ServiceNow/Jira option.

Data Analysis

As Faraday allows you to keep all of your pentests in one place, we thought it would be interesting to add the possibility to see your assessments come to life. These charts allow you to find new relations between your data and clarify the state of an assessment. We will also add new charts in the future, and the possibility to customize them as well!

Tasks

Setup your own actions strategy, assign tasks to users for each phase and easily follow them up. You can create your own custom Methodologies, add Tasks, tag them and keep track of your whole project directly from Faraday. Faraday comes with Methodologies loaded by default that allow you to get to work quickly without having to create your own.

Tags

Tags allow you to organize your vulnerabilities. by letting you make and edit categories: environment, technology, state, language, projects, whatever. The team can then see the tagged vulnerabilities and organize the security evaluation.

Agent Technology

Define and execute your own actions from different sources and automatically import outputs into your repository.

Custom Fields

Custom Fields allow you to extend the Vulnerability’s model with more fields. Custom fields type can be int, str, list, and choice.

Evidence

You can use inline images with Faraday Evidence in the fields above by adding an Evidence file to your vulns and adding markdown like this:

Deployments

No infrastructure changes needed: implement Faraday On-prem, Cloud or Hybrid without network changes.

Web Shell

The idea of the Web Shell is to allow you to work directly from the web using ZSH as a console. You would be connected to your own shell (listening in loopback interface).

Workspace Comparison

This feature lets you easily see and assess the differences between two of your Workspaces.

Vulnerability Templates (KB)

Find yourself writing the same descriptions over and over again? Tired of typos coming up in your reports? Faraday provides a simple solution: unify criteria for naming vulnerabilities and save time and effort to yourself and your team.

Plugins

There are three kinds of plugins available for Faraday; console, report and API also called online. However, these are not mutually exclusive, meaning that some tools have more than one Plugin to process their output. For example, Nmap has a Console plugin which allows you to run it directly from ZSH, but it also has a Report one, in order to import scans that were run outside of Faraday.