Release v4.3.0

Great news: We're releasing some awesome cybersecurity new…


Faraday in the software development process – GitLab – Part 4

Pentesters use a comprehensive and complete toolkit to…


Faraday in the software development process – Jenkins – Part 2

We are going to integrate Jenkins into Faraday with…


Faraday in the software development process – Travis – Part 3

Pentesters use a comprehensive and complete toolkit to…


Faraday in the software development process – GitHub – Part 1

Pentesters use a comprehensive and complete toolkit to…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…


Exploring the Hidden Attack Surface of OEM IoT devices talk

The security of a company’s network also depends on the…


Release v4.2.0

Optimizing your security posture by drastically reducing…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Bypassing passwords and getting a shell through UART in a Wi-Fi router

We started out by trying to connect to the router via UART…