Technical Resources

Technical

Latest Technical Resources

How to Conduct a Security Risk Assessment in 6 Steps
Nov 22, 2024 Sprocket Security

How to Conduct a Security Risk Assessment in 6 Steps

Security risk assessment is a systematic process to evaluate potential threats and vulnerabilities affecting an organization’s critical resources.
Top 8 Penetration Testing Types, Techniques, and Best Practices
Nov 21, 2024 Sprocket Security

Top 8 Penetration Testing Types, Techniques, and Best Practices

Penetration testing is a simulated cyber-attack against a computer system, network, or application to evaluate its security posture.
7-Stage Vulnerability Management Process and How to Make It Great
Nov 21, 2024 Sprocket Security

7-Stage Vulnerability Management Process and How to Make It Great

Penetration testing is a simulated cyber-attack against a computer system, network, or application to evaluate its security posture.
WebQL: Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications
Sep 23, 2024 Nate Fair

WebQL: Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications

Introducing WebQL, an automated JavaScript analysis tool that leverages CodeQL to identify and exploit vulnerabilities in modern web applications like SPAs and PWAs. By automating the extraction, beautification, and analysis of client-side code, WebQL enhances penetration testing by uncovering security issues obscured by modern development practices.
I’m sick of 1000-line Python scripts.
Sep 20, 2024 Nicholas Anastasi

I’m sick of 1000-line Python scripts.

This blog introduces snickerdoodle, a customized Cookiecutter template designed to help penetration testers quickly create and share complex CLI tools. By automating project setup with features like pre-configured CLI interfaces, Rich logging, and integrated dependency management using Poetry, Snickerdoodle allows security professionals to focus on coding rather than boilerplate setup.
Forbidden! Are 403 bypasses worth looking for?
Aug 28, 2024 Nicholas Anastasi

Forbidden! Are 403 bypasses worth looking for?

403 status code bypasses might seem niche and impractical at first glance, but they can be surprisingly valuable for uncovering vulnerabilities at scale. This blog delves into the nuances of 403 bypass techniques, exploring how tools like Nuclei and Burpsuite can be leveraged to identify hidden admin panels and other restricted areas, even when traditional methods fall short.
« 1 2 3 4 5 »