#security Articles
Life of a Scan: how Ostorlab's open-source vulnerability scanner works
This article talks about how Ostorlab works under the hood.

Attack Surface Insights - part 2
Attack Surface is not just about open ports and services; this article covers key insights beyond the standard technical ones.

Mapping your Attack Surface - part 1
Attack surface mapping has become the number one headache of CISO's of most large organization, this article goes over techniques and tools used by Ostorlab to enable powerful and accurate attack surface discovery and monitoring.

Ostorlab is Open-Source 🎊
This is a major release open-sourcing Ostorlab and announcing tons of new features and capabilities.

Finding superhuman XSS polyglot payloads with Genetic Algorithms
The following article is a technical deep dive into how genetic algorithms can be leveraged to create superhuman XSS polyglot payloads.

Autonomous Security: Pushing Security Automation to the Next Level
The article introduces the term Autonomous Security in the context of security scanning and defines 5 tiers of maturity.

DOM XSS Fuzzing strategies - Part 1
XSS are still by far the most common tyope of vulnerabilities, this article presents strategies to automate the search for XSSes.

Hardcoded AWS keys in Mobile Applications
This article is about how to manage AWS access keys when using AWS services in your mobile application.
