Blog
OWASP Amass 5 First Look
First looks at OWASP Amass v5
Why Over Complicating Threat Modeling Does More Harm Than Good
Is your threat modeling program too complicated?
The Dawn of a Halcyon Age in Security Testing
Or some may call it “The Consequences of Unfettered Vibe Coding”.
Your Biggest Security Flaw Isn't in Your Code - It's on Your Whiteboard
What if you could find flaws before attackers do?
The Importance of Client JavaScript Recon
Why collecting and inspecting Client Side JavaScript is important.
An Introduction to OWASP Amass 4 - Part 9 - Visualizing with oam_viz
An Introduction to OWASP Amass 4 - Part 8 - Reviewing Results
An Introduction to OWASP Amass 4 - Part 7 - In Depth Subdomain Enumeration and Network Mapping
An Introduction to OWASP Amass 4 - Part 6 - The Mysterious case of the Datasource list
An Introduction to OWASP Amass 4 - Part 5 - Configuration
An Introduction to OWASP Amass 4 - Part 4 - The CLI
An Introduction to OWASP Amass 4 - Part 3 - The Database
An Introduction to OWASP Amass 4 - Part 2 - The Data