Resources
Latest Post Exploitation Resources
Why no Workstation Needs Inbound SMB
Know the risks and attack vectors associated with allowing inbound SMB port connectivity to workstations with an emphasis on lateral movement tools and techniques. See how Continuous Penetration Testing is highly useful…
Read moreProtect your company with Sprocket
Know your threats when they emerge.
When your environment changes, or new threats affect your attack surface, we perform security testing. There is a lot more value from this modern approach to testing.
Continuous Penetration Testing Subscription
- Pentests
- Web App Testing
- Red Teaming
- Social Engineering
- Adversary Simulations