Skip content

Search

Type in a key word or phrase and we'll do the rest.

Contact us

201 210 1627 results

  • Prowl

    Prowl is an open source data harvesting tool written in Python to help alleviate some of the more...

    Read more
  • PoshC2 documentation

    We maintain PoshC2 documentation over at https://poshc2.readthedocs.io/en/latest/. For your convenience, we have also embedded it below.

    Read more
  • Penetration Testing

    We are looking for passionate and skilled penetration testers with professional experience. There are multiple roles available...

    Read more
  • Accelerator Program

    Do you want a job in cyber security but don’t know how to break into the industry? Tired...

    Read more
  • Rocktastic

    Bigger, better (faster, stronger…) Bigger isn’t always better, but sometimes it is. If you need a huge word...

    Read more
  • Advanced Threat Actor Simulation - Red Team Training

    This course will train your already inquisitive mind how to emulate real world threat actors. It’s fast paced...

    Read more
  • CVE-2018-13442: SolarWinds NPM SQL Injection

    A SQL injection vulnerability has been discovered in SolarWinds’ Network Performance Monitor (NPM).  This vulnerability has been designated...

    Read more
  • LRQA named as finalist for Global Sustainability & ESG...

    LRQA’s Advisory team has been shortlisted for the Sustainability Consultancy Award at The Global Sustainability & ESG Awards...

    Read more
  • ESG risks in Latin America and the Caribbean's seafood...

    Companies sourcing fish in Latin America & the Caribbean (LAC) urgently need to tackle environmental, social, and human...

    Read more
  • LRQA experts selected for PCI Security Standards Council

    The PCI Security Standards Council (PCI SSC) announced LRQA as one of the organisations selected for the 2024-2026...

    Read more

Error

Error

No results found

No results found that match your query

Loading results