All Resources

Library

Explore our collection of resources, including blog articles, webcasts, and case studies.

All Resources

One Proxy to Rule Them All
Jul 15, 2024

One Proxy to Rule Them All

Bypass WAFs with gigaproxy: an HTTP proxy that rotates IPs using mitmproxy, AWS API Gateway, and Lambda. Read the blog to learn more.
Exploring Modern Password Spraying: Introduction to Entra Smart Lockout
Jun 21, 2024

Exploring Modern Password Spraying: Introduction to Entra Smart Lockout

Delve into the modern techniques and security controls surrounding password spraying. This series will explore the current techniques, tactics, and procedures (TTPs) for password spraying.
Pwning SPA’s With Semgrep
May 30, 2024

Pwning SPA’s With Semgrep

Semgrep, or Semantic Grep (For Code) should be a part of your pentesting toolkit. If you think otherwise, read on to see why.
Farmers Alliance Mutual Insurance Improves Security Posture with Sprocket
May 21, 2024

Farmers Alliance Mutual Insurance Improves Security Posture with Sprocket

Farmers Alliance Mutual Insurance is on a mission to insure and protect futures in rural communities. The insurance industry works with highly sensitive data and customers trust it will be protected. Farmers Alliance Mutual Insurance partners with Sprocket Security to improve their security posture and enhance their penetration testing efforts by using Continuous Penetration Testing.
PCI DSS 4.0 and a Continuous Offensive Security Strategy
May 16, 2024

PCI DSS 4.0 and a Continuous Offensive Security Strategy

In the ever-evolving landscape of cybersecurity, organizations are constantly challenged to protect their sensitive data. The Payment Card Industry Data Security Standard (PCI DSS) version 4.0 is the latest iteration of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment.
From Twitter to Exploit: The Sprocket Security Lifecycle of Exploitation
May 16, 2024

From Twitter to Exploit: The Sprocket Security Lifecycle of Exploitation

Our approach to mass exploitation of the latest and greatest vulnerability. On the chopping block, this time around: CVE-2024-3400.