SCYTHE’s Ethical Hacking Maturity Model

Overview SCYTHE’s Ethical Hacking Maturity Model enables leading organizations...

Read More

Announcing UniCon

UniCon, our very own Unicorn Conference, is a free conference for security...

Read More

Splunk Integration

Enterprise-grade platforms have to integrate with other enterprise solutions...

Read More

Breaching Terms of Service Doesn’t Breach the CFAA: Protect Independent Security Research

Advances in securing medical devices, vehicle systems, and any of the other...

Read More

Under the Hood: SCYTHE Architectural Overview (Part 1)

Read More

SCYTHE 3.0 is here!

The SCYTHE team has been busy working on version 3.0, our latest release....

Read More

Software Development Kit

As the leading platform for Purple Teaming, SCYTHE is proud to release...

Read More

Cuddling the Cozy Bear, Emulating APT29 by Jorge Orchilles - Cyber Junegle

Adversary Emulation is a type of ethical hacking engagement where the...

Read More

SCYTHE & PlexTrac Present: Dealin' With The Data

Join Security Weekly's Tyler Robinson, SCYTHE's Adam Mashinchi, and...

Read More