Penetration testing

Red Teaming: Credential dumping techniques

Explore some popular techniques commonly used by red teaming experts and adversaries during their experiments.

Top 6 bug bounty programs for cybersecurity professionals

The best bug bounty programs for security researchers, including objectives, bugs and the potential bounties you can earn.

Tunneling and port forwarding tools used during red teaming assessments

Learn about popular tools used during red teaming assessments.

Top tools for mobile android assessments

Explore some of the most used tools by security experts during mobile Android assessments.

Top tools for mobile iOS assessments

Find a list of tools used during red teaming assessments to audit and ensure the security of mobile iOS applications.

Red Team: C2 frameworks for pentesting

Find out some of the most used C2 post-exploitation frameworks for pentesting and much more.

Inside 1,602 pentests: Common vulnerabilities, findings and fixes

Learn about the major findings of Cobalt’s The State of Pentesting 2021 report

Red teaming tutorial: Active directory pentesting approach and tools

Organizations widely use Microsoft Active Directory (AD) networks to exchange information and manage their internal and critical infrastructures.

Red Team tutorial: A walkthrough on memory injection techniques

Memory injection is a stealthy technique generally used to bypass defenses and inject additional payloads into a PE file or shellcode memory.

Python for active defense: Monitoring

Data is essential to effective active defense, and using Python is a good way to monitor your data sources to identify anomalies.