Secure AI-Assisted Development: 15 Guardrails for Shipping AI-Generated Code
Red Team Vendor Evaluation Worksheet
Fortifying Your Applications: A Guide to Penetration Testing
LLM-Assisted Vulnerability Research
Red Team Readiness Guide
Red Team Readiness Assessment
FAQ Guide: Acquiring DORA Threat-Led Penetration Testing
The Offensive Security Blueprint for Financial Services
Outpacing Adversaries in the Cloud: An Offensive Security Guide
Getting Red Teaming Right: A How-to Guide
OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing
Cybersecurity Style Guide v2.0
SANS Institute: Inside the Minds & Methods of Modern Adversaries
The Offensive Security Guide to Ransomware Readiness
Shifting Left: A DevSecOps Field Guide
Looking Toward the Cosmos: Making the Case for Continuous Offensive Security
Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools
asminject.py: Compromise Trusted Linux Processes and Containers
Evaluating Offensive Security Solutions: Top 50 Questions to Ask
SW Labs Product Review: Cosmos Attack Surface Management Platform
SW Labs Category Overview: Attack Surface Management (ASM) Solutions
The Wolf in Sheep’s Clothing
Penetration Testing Resource Guide
Breaking & Entering: A Pocket Guide for Friendly Remote Admins
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.