Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Prompt Injection, Session Hijacking, and Why AI Isn't Writing the Attack Plans Yet
Application Security: Getting More Out of Your Pen Tests
Fortifying Your Applications: A Guide to Penetration Testing
Sliver Workshop Part 3: Building Better Encoders
Red Teaming: The Essential Tool for Security Leaders
Peeling Back the Plastic: Finding 0-Days in IoT Devices
Product Security Reviews: The Basics Are Still the Breach
The Basics are the Breach: Lessons from Real-World Product Security Reviews
AI & LLM Security Testing Datasheet
Demystifying 5G Security: Understanding the Registration Protocol
Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises
CloudFox: Cloud Enumeration for Penetration Testing
LLM-Assisted Vulnerability Research
Scaling Application Security: Lessons from Salesforce AppExchange
AI War Stories: Silent Failures, Real Consequences
Red Team Activated: Testing a Global Risk Intelligence Platform
Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance
Red Team Readiness Guide
The Human Element of AI Security Solution Brief
Red Team Readiness Assessment
Breaking AI: Inside the Art of LLM Pen Testing
Sliver Workshop Part 2: Staging & Automation
Red Team & Adversarial Emulation Solution Brief
Architecting Cloud Security Testing in the GenAI Era
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.