Security Blog

Penetration testing insights, vulnerability research and security best practices

🚧 Blog Coming Soon

We're building an extensive library of pentesting tutorials, security research and offensive security techniques.

Join Community for Updates

Planned Content

Web App Testing

  • ✓ OWASP Top 10 exploitation
  • ✓ API security testing
  • ✓ JWT vulnerabilities
  • ✓ GraphQL security

Network Pentesting

  • ✓ Active Directory attacks
  • ✓ Lateral movement techniques
  • ✓ Privilege escalation
  • ✓ Post-exploitation

Security Research

  • ✓ CVE analysis
  • ✓ Zero-day research
  • ✓ Tool development
  • ✓ Exploit development

Contribute Content

Are you a security researcher, penetration tester or red teamer interested in sharing your knowledge? We're looking for guest contributors to write technical articles, tutorials and vulnerability research.

Topics we're interested in: web app exploitation, network pentesting, Active Directory attacks, cloud security, container security, mobile app testing, IoT security, and offensive security tool development.

Get In Touch

Recent Security Tools

While the blog is in development, check out our open-source security tools on GitHub:

  • Coming Soon: Reconnaissance automation tools
  • Coming Soon: Web vulnerability scanners
  • Coming Soon: Exploitation frameworks