Prioritizing: making your Vulnerability Management Manageable

We orchestrate many scanners results at Faraday into the…


Release v4.3.0

Great news: We're releasing some awesome cybersecurity new…


Faraday in the software development process – GitLab – Part 4

Pentesters use a comprehensive and complete toolkit to…


Faraday in the software development process – Jenkins – Part 2

We are going to integrate Jenkins into Faraday with…


Faraday in the software development process – Travis – Part 3

Pentesters use a comprehensive and complete toolkit to…


Faraday in the software development process – GitHub – Part 1

Pentesters use a comprehensive and complete toolkit to…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…


Exploring the Hidden Attack Surface of OEM IoT devices talk

The security of a company’s network also depends on the…


Reverse engineering and game hacking resources

If you are curious about reverse engineering, cybersecurity…


Release v4.2.0

Optimizing your security posture by drastically reducing…