Technical

Technical Resources

Technical

Latest Technical Resources

Top 8 Penetration Testing Types, Techniques, and Best Practices
Nov 21, 2024 Sprocket Security

Top 8 Penetration Testing Types, Techniques, and Best Practices

Penetration testing is a simulated cyber-attack against a computer system, network, or application to evaluate its security posture.
7-Stage Vulnerability Management Process and How to Make It Great
Nov 21, 2024 Sprocket Security

7-Stage Vulnerability Management Process and How to Make It Great

Penetration testing is a simulated cyber-attack against a computer system, network, or application to evaluate its security posture.
WebQL: Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications
Sep 23, 2024 Nate Fair

WebQL: Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications

Introducing WebQL, an automated JavaScript analysis tool that leverages CodeQL to identify and exploit vulnerabilities in modern web applications like SPAs and PWAs. By automating the extraction, beautification, and analysis of client-side code, WebQL enhances penetration testing by uncovering security issues obscured by modern development practices.
I’m sick of 1000-line Python scripts.
Sep 20, 2024 Nicholas Anastasi

I’m sick of 1000-line Python scripts.

This blog introduces snickerdoodle, a customized Cookiecutter template designed to help penetration testers quickly create and share complex CLI tools. By automating project setup with features like pre-configured CLI interfaces, Rich logging, and integrated dependency management using Poetry, Snickerdoodle allows security professionals to focus on coding rather than boilerplate setup.
Forbidden! Are 403 bypasses worth looking for?
Aug 28, 2024 Nicholas Anastasi

Forbidden! Are 403 bypasses worth looking for?

403 status code bypasses might seem niche and impractical at first glance, but they can be surprisingly valuable for uncovering vulnerabilities at scale. This blog delves into the nuances of 403 bypass techniques, exploring how tools like Nuclei and Burpsuite can be leveraged to identify hidden admin panels and other restricted areas, even when traditional methods fall short.
Recent InfoSec Talks, Defcon 32 - SSHamble: Unexpected Exposures in the Secure Shell
Aug 26, 2024 Will Vandevanter

Recent InfoSec Talks, Defcon 32 - SSHamble: Unexpected Exposures in the Secure Shell

Will Vandevanter discusses a talk he saw at Defcon 2024 that was jam-packed with knowledge, hunting an international criminal, 0 days, and a new open-source tool. Will also talks about some takeaways he got from the talk.
« 1 2 3 4 5 »