Security Blog
Penetration testing insights, vulnerability research and security best practices
🚧 Blog Coming Soon
We're building an extensive library of pentesting tutorials, security research and offensive security techniques.
Join Community for UpdatesPlanned Content
Web App Testing
- ✓ OWASP Top 10 exploitation
- ✓ API security testing
- ✓ JWT vulnerabilities
- ✓ GraphQL security
Network Pentesting
- ✓ Active Directory attacks
- ✓ Lateral movement techniques
- ✓ Privilege escalation
- ✓ Post-exploitation
Security Research
- ✓ CVE analysis
- ✓ Zero-day research
- ✓ Tool development
- ✓ Exploit development
Contribute Content
Are you a security researcher, penetration tester or red teamer interested in sharing your knowledge? We're looking for guest contributors to write technical articles, tutorials and vulnerability research.
Topics we're interested in: web app exploitation, network pentesting, Active Directory attacks, cloud security, container security, mobile app testing, IoT security, and offensive security tool development.
Get In TouchRecent Security Tools
While the blog is in development, check out our open-source security tools on GitHub:
- Coming Soon: Reconnaissance automation tools
- Coming Soon: Web vulnerability scanners
- Coming Soon: Exploitation frameworks