Technical
Resources Blog

Technical

Keep up to date with the latest offensive security news, knowledge, and resources.
Hunting Secrets in JavaScript at Scale: How a Vite Misconfiguration Lead to Full CI/CD Compromise
Feb 16, 2026

Hunting Secrets in JavaScript at Scale: How a Vite Misconfiguration Lead to Full CI/CD Compromise

Sometimes when conducting a Penetration Testing exercise or Red Team engagement, you might be interested in extracting password hashes or credentials of your target Windows user, without the use of Mimikatz to avoid detection. This is where you would resort to using an NTLM downgrade attack. In this article we shall discuss how you can be able to perform this...
Gear Up with Sprocket: AWS Scanner
Jan 22, 2026

Gear Up with Sprocket: AWS Scanner

Discover how Sprocket Security’s AWS Scanner continuously maps public cloud assets to keep penetration testing and attack surface management current.
Emerging WatchGuard Vulnerability: What We Know About CVE-2025-14733
Dec 23, 2025

Emerging WatchGuard Vulnerability: What We Know About CVE-2025-14733

Explore what we know about the emerging WatchGuard CVE-2025-14733 vulnerability — unauthenticated RCE risk, active attacks, affected versions, and response steps.
Emerging React & Next.js Vulnerabilities: What We Know About CVE-2025-55182 and CVE-2025-66478
Dec 05, 2025

Emerging React & Next.js Vulnerabilities: What We Know About CVE-2025-55182 and CVE-2025-66478

Emerging React and Next.js vulnerabilities (CVE-2025-55182, CVE-2025-66478): what Sprocket Security is seeing, current detection coverage, and guidance for teams.
Closing the Gap Between Finding and Fix: Introducing AI Remediation Assistance
Nov 13, 2025

Closing the Gap Between Finding and Fix: Introducing AI Remediation Assistance

Learn how Sprocket’s AI Remediation Assistance turns vague vulnerability findings into clear, actionable fixes.
What’s New in OWASP 2025: Configuration Drift, Supply Chain Risk, and Continuous Testing
Nov 13, 2025

What’s New in OWASP 2025: Configuration Drift, Supply Chain Risk, and Continuous Testing

OWASP’s 2025 Top 10 shows how security misconfigurations and software supply chain issues dominate. Here’s how continuous pentesting closes the gap.
1 2 3 4 5