Use cases:
Attack Surface Monitoring (ASM)
Automated Penetration Testing
Continuous Automated Red Teaming (CART)
Automated Vulnerability Scanning
Automated Threat Intelligence
OSINT Automation
Trickest for:
For Security Managment
For Enterprise Security
Resources
Blog
Stay up to date about new workflows and the offsec industry
Reports
See our research which you can exploit
Trickest CLI
Running workflows via terminal
X (Twitter) bot
Hack by posting on X
Comunity
Join our Discord group
Latest Blog
Company
About Us
Our story and approach
Careers
Join Trickest
Contact Us
Get in touch with our Sales or Support team
Legal
Legal information about Trickest
News
Trickest latest insights
Join our team
Write your own script using custom-script node.