In this episode, Casey addresses the questions you should ask before choosing an offensive security platform.
Resources
Blog
Blog
Keep up to date with the latest offensive security news, knowledge, and resources.
Featured
Multifunction printers silently store domain credentials, expose unauthenticated management interfaces, and sit on flat networks. Learn how attackers exploit MFPs to achieve domain admin in minutes.
Discover how Sprocket Security’s Auto Add Websites feature is automatically detecting and testing new assets.
Phillip Wylie, Penetration Tester & Podcast Host of The Phillip Wylie Show, shares why annual penetration testing creates dangerous gaps that threat actors are increasingly exploiting through non-traditional attack vectors like IoT devices.
Discover how strategic pentesting goes beyond traditional assessments to give you actionable insights, reduce uncertainty, and accelerate security decisions. Stop waiting—start securing.
Explore common pitfalls in Java and C# reflection practices—understand how insecure use of reflection can expose applications to vulnerabilities like code injection, unauthorized access, and bypassed security controls, and learn key strategies to harden your code.
In this episode, Casey addresses the tools needed for an offensive security stack.