Join the OffSec Evolution - Introducing Trickest's New Workflow Engine!
Blog
Trickest Latest Insights

Cloud Provider Infrastructure Mapping: How to Collect Your Own Cloud Dataset
Explore the power of cloud provider infrastructure mapping and learn how to build a highly efficient workflow from scratch.

Completely Transparent Attack Surface Management: Introducing Inventory 3.0 Workflow
Discover how the Inventory 3.0 automated workflow is monitoring assets and discovering the attack surface of over 800 companies.

Introducing the New Workflow Execution Engine
Experience the game-changing workflow execution engine for your automated use cases on Trickest, significantly improving performance, scalability, and …

Finding Hundreds of SSRF Vulnerabilities on AWS
Uncover the story of how hundreds of SSRF (Server-Side Request Forgery) vulnerabilities were found while investigating methods to reveal the IP …

Automating Network Security: A Workflow for Discovering Open Ports for ASN
Discover how to automate the process of identifying open ports in your network with our workflow. Sign up for a free trial of Trickest automated …

Access Control and Authorization Testing Workflow for GET HTTP requests
Learn how to create an IDOR testing workflow that will test GET requests with three different types of users and create a report with matching status …

Cloudflare bypass - Discover IP addresses of Web servers in AWS
New Trickest technique to bypass Cloudflare and discover the original IP address of web servers running in AWS but hidden behind platforms such as …

Enumerating Cloud Resources
Learn how to enumerate cloud resources (AWS, Azure, GCP...) just by knowing the name of a company and improving the current Trickest workflow …

Full Subdomain Brute Force Discovery Using Automated Trickest Workflow - Part 2
Learn how to generate subdomain permutations from an initial list of subdomains and brute force them to discover more subdomains.

Insider Threats: The Biggest Risk to Organizational Security
Learn how to defend and prevent insider threats and related risks such us phishing attacks, data leakage, and credential leakage via automated …

Full Subdomain Discovery Using Automated Trickest Workflow - Part 1
Learn what subdomain discovery is, the best techniques to do it, and how to create a Trickest workflow to automate the discovery of subdomains using …

How to Perform Threat Intelligence using Shodan & Trickest
Learn how to automate your threat intelligence work with a Trickest workflow to your advantage and stay one step ahead of the competition.

Easy Automation with Hakluke: Creating Serverless, Nocode Security Workflows
Creating automation for hacking workflows is satisfying, but complex. In this article, hakluke creates basic recon and scanning automation with …

Recon and Vulnerability Scanner via Trickest and GitHub
In just a few steps, create your own recon and vulnerability scanner via Trickest and GitHub and find vulnerabilities and assets easier than ever.

Guide to Picking an Attack Surface Management Solution
Attack Surface Management is now a necessity for organizations large and small. The problem is, how do you pick the right solution? Read this article …

Trickest Is Featured On Cybernews!
Trickest has been name amongst the best penetration testing tools in the world according to Cybernews. Read more to find out why!

Infrastructure Monitoring Best Practices
Monitoring IT Infrastructure is difficult at the best of times, but it also ensures that you will get the most out of it. In this article, we cover 8 …

Automated Container Security Scans of Docker Images
Find out how to protect the containers in your infrastructure like an organism protects the cells within its body.

How to find Log4j Vulnerabilities in Every Possible Way
Log4shell has received a lot of research interest. Here we share our analysis of its many, many attack vectors.
GET STARTED WITH TRICKEST TODAY
Fill out our early access form to put yourself on the waitlist and stay in the loop.