Blog posts
Deep dives into vulnerabilities we discover, offensive security techniques we develop, and insights from the front lines of enterprise security research.

Web Application Penetration Testing Services: How to Evaluate a Provider
What to look for in a web application penetration testing provider - and how to tell if you're getting a real test or a cleaned-up scanner report.
Buyer's Guide
Paweł Woyke
February 28, 2026
15
min read
•
Feb 28, 2026

Caido vs Burp Suite: A Penetration Tester's Comparison
Is Caido a serious alternative to Burp Suite Professional? We put both tools to the test so you don't have to.
Web
Vulnerability research
Rafał Wójcicki
February 28, 2026
12
min read
•
Feb 27, 2026

Content Spoofing & SSRF in F5 BIG-IP Security Assessment
Detailed technical analysis of content spoofing (CVE-2026-20732) and SSRF-style reconnaissance security exposure discovered in F5 BIG-IP version 17.1.2.2. This assessment demonstrates how authenticated attackers can exploit administrative interfaces for UI manipulation and network reconnaissance.
Infrastructure
Vulnerability research
Web
Marcin Wyczechowski
February 13, 2026
8
min read
•
Feb 4, 2026

SAP Test Automation Using Windows API in Python
This article explores advanced techniques for automating SAP GUI interactions using Python and Windows API. It demonstrates how to manage window focus, navigate dynamic fields, and simulate keystrokes at the OS level - offering a robust alternative to SAP scripting in restricted environments. Through practical examples and a detailed analysis of script execution, readers will learn how to streamline SAP login processes, improve reliability, and integrate SAP GUI automation into broader workflows.
SAP
Michał Majchrowicz
February 24, 2026
13
min read
•
Feb 13, 2026

Java RMI for pentesters part two - reconnaissance & attack against non-JMX registries
In the second part of this series, we delve into automated reconnaissance and attacks within the Java RMI framework. Leveraging the RMI interface/server introduced in Part One, we explore practical techniques for penetration testing. This installment aims to equip pentesters with essential skills for efficient RMI exploitation.
Infrastructure
Web
AFINE
February 27, 2026
14
min read
•
Oct 8, 2020

Testing and exploiting Java Deserialization
This article is a comprehensive guide to testing and exploiting Java deserialization in 2021. It provides valuable insights and practical tips based on the author’s experience in Java application penetration testing. As Java environments evolve, the article addresses the question of whether Java deserialization remains a threat or if patches have mitigated its risks.
Infrastructure
Web
AFINE
February 12, 2026
19
min read
•
Feb 8, 2021

Practical strategies for exploiting FILE READ vulnerabilities
This guide explores practical strategies for exploiting FILE READ vulnerabilities. It delves into what File Read vulnerabilities entail, their potential risks, and the underlying vulnerabilities that can lead to them. The content also offers insights into confirming the presence of these vulnerabilities and provides useful tips for addressing them. Additionally, it examines the possible advantages and drawbacks of exploiting these vulnerabilities, along with offering general prevention and detection strategies for web applications.
Web
AFINE
February 12, 2026
12
min read
•
Oct 5, 2021

Red Team Trickery
This article will guide you in gaining initial access to a target during a Red Team assessment. It is divided into two parts for easy comprehension. The first part details the use of OSINT for Malware delivery, primarily for spear phishing. The second part covers creating malware and making use of evasion techniques. We hope you find this article both informative and enjoyable!
OSINT
Red teaming
Social engineering
Karol Mazurek
February 12, 2026
41
min read
•
Jul 18, 2023

OWASP Top 10 for LLM Applications
Understand the risks associated with the use of large language models based on the OWASP Top 10 for LLMs list. The article aims to illustrate and explain through examples the vulnerabilities in applications that use LLMs.
AI
LLM
Mateusz Wojciechowski
February 12, 2026
15
min read
•
Nov 22, 2023

IBM i Access Client Solutions vulnerabilities
Read about multiple vulnerabilities in IBM i Access Client Solutions software related to connecting AS400 servers. Chaining those vulnerabilities could allow remote attackers to access client and server machines.
Infrastructure
Vulnerability research
Zbigniew Piotrak
February 12, 2026
4
min read
•
Feb 12, 2024
Next
1 / 5
Sort by Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Monthly Security Report
Subscribe to our Enterprise Security Report. Every month, we share what we're discovering in enterprise software, what vulnerabilities you should watch for, and the security trends we're seeing from our offensive security work.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
