Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

What It Really Means to Be a Hacker: Lessons from 10 Years in Offensive Security
Apr 29, 2025 Nate Fair

What It Really Means to Be a Hacker: Lessons from 10 Years in Offensive Security

What being a hacker really means—no title required. After a decade in offensive security, Nate Fair shares honest lessons on hacking.
WebQL: Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications
Sep 23, 2024 Nate Fair

WebQL: Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications

Introducing WebQL, an automated JavaScript analysis tool that leverages CodeQL to identify and exploit vulnerabilities in modern web applications like SPAs and PWAs. By automating the extraction, beautification, and analysis of client-side code, WebQL enhances penetration testing by uncovering security issues obscured by modern development practices.
Pwning SPA’s With Semgrep
May 30, 2024 Nate Fair

Pwning SPA’s With Semgrep

Semgrep, or Semantic Grep (For Code) should be a part of your pentesting toolkit. If you think otherwise, read on to see why.
From Twitter to Exploit: The Sprocket Security Lifecycle of Exploitation
May 16, 2024 Nate Fair

From Twitter to Exploit: The Sprocket Security Lifecycle of Exploitation

Our approach to mass exploitation of the latest and greatest vulnerability. On the chopping block, this time around: CVE-2024-3400.
Introduction to the Ticketing SaaS Landscape
Apr 17, 2024 Nate Fair

Introduction to the Ticketing SaaS Landscape

The shift to remote work has led to significant changes in organizational dynamics and technology infrastructure, particularly in ticketing, help desk, and management platforms. Sprocket pentesters focus on evaluating the security risks associated with these evolving systems, especially in external SaaS environments where the impact can be substantial.
cURL For The Pentester: Above & Beyond
Mar 03, 2023 Nate Fair

cURL For The Pentester: Above & Beyond

Did you know you can interact with LDAP using cURL? How about NTLM, proxy tunneling, or domain sockets? A deep dive into some less common and advanced features of cURL, including sending POST requests with a payload file, uploading files to a server, exploiting Spring4Shell, and exploiting SQL injection vulnerabilities using cURL.
1 2 3 4 5 »