Ethical hacking & pentesting blog Come for the PoCs and security research focused on new CVEs and stay for the ethical exploitation guides and how-tos our offensive security specialists create. Inside Nmap, the world’s most famous port scannerThis article is a deep dive into how Nmap works, to understand its internal structure, and to master its functionality.Author(s)Satyam SinghPublished at08 Jan 2019Updated at17 Jul 2023Pentest report writing in 5 minutes (Defcamp 2018 talk)Tired of writing pentest reports? Let’s automate this process and let you get back to hacking! Slides included.Author(s)Adrian FurtunaPublished at12 Nov 2018Updated at10 Jul 2022Essential HTTP Headers for securing your web serverIn this article, we discuss the most important HTTP headers that you should configure on your web server in order to improve its security.Author(s)Satyam SinghPublished at22 Oct 2018Updated at18 Jul 2023Get vulnerability research & write-upsIn your inbox. (No fluff. Actionable stuff only.)Sign me up12345678910
Inside Nmap, the world’s most famous port scannerThis article is a deep dive into how Nmap works, to understand its internal structure, and to master its functionality.Author(s)Satyam SinghPublished at08 Jan 2019Updated at17 Jul 2023
Pentest report writing in 5 minutes (Defcamp 2018 talk)Tired of writing pentest reports? Let’s automate this process and let you get back to hacking! Slides included.Author(s)Adrian FurtunaPublished at12 Nov 2018Updated at10 Jul 2022
Essential HTTP Headers for securing your web serverIn this article, we discuss the most important HTTP headers that you should configure on your web server in order to improve its security.Author(s)Satyam SinghPublished at22 Oct 2018Updated at18 Jul 2023