Vulnerability Management: A Guide Using Open-Source Tools

In the dynamic world of IT security, proactive…


Release v5.2.0

Welcome to another great version of Faraday. This time, we…


Good practices in Cybersecurity – Part 2

Nowadays, we can distinguish various branches within a…


Release v5.1.1

For our corporate clients, we've upgraded our notification…


Good practices in Cybersecurity – Part 1

Pentesters use a comprehensive and complete toolkit to…


Release v5.0.0

We understand that security is your top priority, and it is…


Farewell 2023

But the outcome of all that is so rewarding. It only placed…


First steps in cybersecurity: scan your domain

Pentesters use a comprehensive and complete toolkit to…


Visualize findings and understand your security posture

Our risk scoring system goes beyond mere criticality…


Release v4.6.2

We're thrilled to introduce you to a series of enhancements…