Ethical hacking & pentesting blog
Come for the PoCs and security research focused on new CVEs and stay for the ethical exploitation guides and how-tos our offensive security specialists create.
Get vulnerability research & write-ups
In your inbox. (No fluff. Actionable stuff only.)


![Read the article titled [New scanners] Detect SMBGhost and Ghostcat vulnerabilities with Pentest-Tools.com](/_vercel/image?url=https://content.pentest-tools.com/assets/content/scanners-detect-smbghost-ghostcat/smbghost-and-ghostcat-scanners-pentest-tools.com_.webp&w=1536&q=50)
![Read the article titled [New enterprise feature] Add sub-users and share your Pentest-Tools.com plan](/_vercel/image?url=https://content.pentest-tools.com/assets/content/enterprise-feature-add-sub-users/add-sub-users-enterprise-feature-pentest-tools.com-2.webp&w=1536&q=50)







.webp&w=1536&q=50)



