Securing Your IIS Server: A Comprehensive Guide

Securing Your IIS Server: A Comprehensive Guide

Explore key strategies to strengthen the security of your IIS server and protect your web applications. Learn about firewall configurations, automation, authentication, and more.

September 25, 2023
9 mins read
Discovering Adobe Experience Manager (AEM) Vulnerabilities at Scale

Discovering Adobe Experience Manager (AEM) Vulnerabilities at Scale

Learn how to uncover Adobe Experience Manager (AEM) vulnerabilities at scale using advanced scanning techniques.

September 17, 2023
7 mins read

Gavin Kramer

DNS Takeover Explained: Protect Your Online Domain

DNS Takeover Explained: Protect Your Online Domain

Ever wondered about the complexities of a DNS takeover? Join us as we dive deep into this threat, the potential damage it can cause, and how you can …

August 06, 2023
11 mins read

Satyam Gothi

Bypassing 403 endpoints using automated Trickest workflows

Bypassing 403 endpoints using automated Trickest workflows

Join us in exploring effective 403 bypass methods and automating these techniques using Trickest workflows. These proven methods, found and fine-tuned …

July 26, 2023
5 mins read

Mehedi Hasan Remon

CVE-2023-3519: Citrix ADC and NetScaler Gateway Detection Workflow At Scale

CVE-2023-3519: Citrix ADC and NetScaler Gateway Detection Workflow At Scale

Detect critical Citrix ADC/NetScaler Gateway vulnerability CVE-2023-351 via Trickest workflow

July 21, 2023
2 mins read

Nenad Zaric

Parsing more than 10TB of GitHub Logs with Trickest and Extracting Public Details of all GitHub Users & Repositories

Parsing more than 10TB of GitHub Logs with Trickest and Extracting Public Details of all GitHub Users & Repositories

Learn how you can use Trickest workflow methodology to parse around 15TB of GitHub logs and extract public details from all discovered users and …

June 14, 2023
7 mins read

Carlos Polop

OpenAI and Trickest: The AI-Powered Duo Breaking Language Barriers

OpenAI and Trickest: The AI-Powered Duo Breaking Language Barriers

Explore how OpenAI and Trickest synergize to translate HackTricks content into multiple languages, pioneering AI-powered multilingual expansion.

June 11, 2023
4 mins read

Carlos Polop

Cloud Provider Infrastructure Mapping: How to Collect Your Own Cloud Dataset

Cloud Provider Infrastructure Mapping: How to Collect Your Own Cloud Dataset

Explore the power of cloud provider infrastructure mapping and learn how to build a highly efficient workflow from scratch.

May 29, 2023
12 mins read

Mohammed Diaa

Completely Transparent Attack Surface Management: Introducing Inventory 3.0 Workflow

Completely Transparent Attack Surface Management: Introducing Inventory 3.0 Workflow

Discover how the Inventory 3.0 automated workflow is monitoring assets and discovering the attack surface of over 800 companies.

May 24, 2023
5 mins read

Nenad Zaric

Introducing the New Workflow Execution Engine

Introducing the New Workflow Execution Engine

Experience the game-changing workflow execution engine for your automated use cases on Trickest, significantly improving performance, scalability, and …

April 24, 2023
5 mins read

Nenad Zaric

Finding Hundreds of SSRF Vulnerabilities on AWS

Finding Hundreds of SSRF Vulnerabilities on AWS

Uncover the story of how hundreds of SSRF (Server-Side Request Forgery) vulnerabilities were found while investigating methods to reveal the IP …

March 14, 2023
6 mins read

Carlos Polop

Automating Network Security: A Workflow for Discovering Open Ports for ASN

Automating Network Security: A Workflow for Discovering Open Ports for ASN

Discover how to automate the process of identifying open ports in your network with our workflow. Sign up for a free trial of Trickest automated …

February 22, 2023
4 mins read

Nenad Zaric

Access Control and Authorization Testing Workflow for GET HTTP requests

Access Control and Authorization Testing Workflow for GET HTTP requests

Learn how to create an IDOR testing workflow that will test GET requests with three different types of users and create a report with matching status …

February 08, 2023
6 mins read

Nenad Zaric

Cloudflare bypass - Discover IP addresses of Web servers in AWS

Cloudflare bypass - Discover IP addresses of Web servers in AWS

New Trickest technique to bypass Cloudflare and discover the original IP address of web servers running in AWS but hidden behind platforms such as …

January 30, 2023
7 mins read

Carlos Polop

Enumerating Cloud Resources

Enumerating Cloud Resources

Learn how to enumerate cloud resources (AWS, Azure, GCP...) just by knowing the name of a company and improving the current Trickest workflow …

December 19, 2022
6 mins read

Carlos Polop

Full Subdomain Brute Force Discovery Using Automated Trickest Workflow - Part 2

Full Subdomain Brute Force Discovery Using Automated Trickest Workflow - Part 2

Learn how to generate subdomain permutations from an initial list of subdomains and brute force them to discover more subdomains.

November 02, 2022
3 mins read

Carlos Polop

Insider Threats: The Biggest Risk to Organizational Security

Insider Threats: The Biggest Risk to Organizational Security

Learn how to defend and prevent insider threats and related risks such us phishing attacks, data leakage, and credential leakage via automated …

October 27, 2022
10 mins read

Devansh Bordia

Full Subdomain Discovery Using Automated Trickest Workflow - Part 1

Full Subdomain Discovery Using Automated Trickest Workflow - Part 1

Learn what subdomain discovery is, the best techniques to do it, and how to create a Trickest workflow to automate the discovery of subdomains using …

October 24, 2022
5 mins read

Carlos Polop

How to Perform Threat Intelligence using Shodan & Trickest

How to Perform Threat Intelligence using Shodan & Trickest

Learn how to automate your threat intelligence work with a Trickest workflow to your advantage and stay one step ahead of the competition.

October 17, 2022
8 mins read

Keshav Malik

Easy Automation with Hakluke: Creating Serverless, Nocode Security Workflows

Easy Automation with Hakluke: Creating Serverless, Nocode Security Workflows

Creating automation for hacking workflows is satisfying, but complex. In this article, hakluke creates basic recon and scanning automation with …

September 06, 2022
6 mins read

Luke Stephens

Recon and Vulnerability Scanner via Trickest and GitHub

Recon and Vulnerability Scanner via Trickest and GitHub

In just a few steps, create your own recon and vulnerability scanner via Trickest and GitHub and find vulnerabilities and assets easier than ever.

August 19, 2022
4 mins read

Mohammed Diaa

Guide to Picking an Attack Surface Management Solution

Guide to Picking an Attack Surface Management Solution

Attack Surface Management is now a necessity for organizations large and small. The problem is, how do you pick the right solution? Read this article …

July 18, 2022
5 mins read

Luke Stephens

Trickest Is Featured On Cybernews!

Trickest Is Featured On Cybernews!

Trickest has been name amongst the best penetration testing tools in the world according to Cybernews. Read more to find out why!

July 17, 2022
1 min read

Andrija Suberic

Infrastructure Monitoring Best Practices

Infrastructure Monitoring Best Practices

Monitoring IT Infrastructure is difficult at the best of times, but it also ensures that you will get the most out of it. In this article, we cover 8 …

July 04, 2022
8 mins read

Keshav Malik

Automated Container Security Scans of Docker Images

Automated Container Security Scans of Docker Images

Find out how to protect the containers in your infrastructure like an organism protects the cells within its body.

June 06, 2022
6 mins read

Nenad Zaric

How to find Log4j Vulnerabilities in Every Possible Way

How to find Log4j Vulnerabilities in Every Possible Way

Log4shell has received a lot of research interest. Here we share our analysis of its many, many attack vectors.

May 17, 2022
6 mins read

Mohammed Diaa

GET STARTED WITH TRICKEST TODAY

Fill out our early access form to put yourself on the waitlist and stay in the loop.