Source code auditing is an essential tool for identifying vulnerabilities that are often invisible during conventional penetration testing. By combining manual analysis and automated tools, it enables you to assess the intrinsic security of an application, while revealing errors in logic, rights management or implementation.
Our latest articles
Why should you have your source code audited?
By Romain Garcia on 04/02/2025 in the Ethical Hacking category

Install Kali Linux on VirtualBox in 5 minutes
By Romain Garcia on 04/01/2025 in the Tools category

If you're just starting out, or simply want to test Kali Linux in an isolated environment, installing it on a virtual machine is an excellent option. This allows you to manipulate the distribution without touching your main system, in complete safety.
In this article, I'll show you how to install Kali Linux on VirtualBox in just a few minutes, without going through the classic installation process. We'll be using an official preconfigured image provided by the Kali team.
How to secure a WordPress site in 2025 : Complete guide
By Romain Garcia on 03/24/2025 in the Cybersecurity category

WordPress powers more than 43% of the world's websites today, making it the most widely used content management platform (CMS). But this popularity also makes WordPress a prime target for cyber attacks.
Vulnerabilities in extensions, outdated themes, weak configurations... A poorly protected WordPress can easily become an attacker's entry point. Fortunately, there are some simple and effective best practices to reduce the risks.
In this article, we'll take a look at how to secure a WordPress site, with practical advice you can apply today.
FFuF: The essential tool for web pentests
By Romain Garcia on 03/05/2025 in the Tools category

When performing a security audit on a web application, it is essential to identify publicly exposed resources, such as files, folders or API endpoints. Enumerating these elements can uncover potential security flaws and expand the attack surface.
There are several tools available for this task, including FFuF (Fast Fuzzing), which we'll discuss here.
The different approaches to Web pentesting
By Romain Garcia on 03/04/2025 in the Ethical Hacking category

Penetration testing, or pentesting, is an essential step in assessing the security of web applications. It involves simulating attacks in order to identify and correct potential vulnerabilities. Different approaches to pentesting exist, each offering a unique perspective on system security. The main methods are blackbox, greybox and whitebox testing.
Search
Categories
Latest articles
- 5 cybersecurity mistakes that small businesses still make too often
- Understanding and protecting against XSS (Cross-Site Scripting) vulnerabilities
- What is an intrusion test? The essentials in 5 minutes
- Pentest in production or in a test environment: which is better?
- Penetration test: what to expect and how to prepare
A project in mind?
Do you have questions about your system's security, need a pentest, or want to train your teams in best practices?