Our team’s vulnerabilities disclosures 2022

Pentesters use a comprehensive and complete toolkit to…


A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Pentesters use a comprehensive and complete toolkit to…


AWS Common Issues – Part 2

Pentesters use a comprehensive and complete toolkit to…


New research findings from Faraday goes to DEF CON

Pentesters use a comprehensive and complete toolkit to…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Password strength

Passwords are the first aspect of computer security we…


Reverse engineering and game hacking resources

Hi there! You are probably here because you listened to our…


Securing open source software (Part 2)

Open-source software increases its presence in data…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…