Pentera Logo Pentera Logo White
resources
Feb 2026
LOLBins Against the Machine: Reverse Engineering at Machine Speed
Purpose Attackers can utilize Living Off the Land Binaries (LOLBins) to execute commands, evade detection,...
Read now
“Pentera helps us prioritize what truly matters and gives us confidence we are covering our global environment continuously.”
“Seeing a domain admin account cracked in production changed how we view internal exposure.”
“Pentera helped us advance our red team and continuously improve penetration testing.”
“Pentera makes it easier to focus on what is truly exploitable instead of chasing long vulnerability lists.”
“In a complex, large-scale environment, Pentera delivers the speed and visibility security teams need.”
“Pentera amplified our team’s performance and delivered measurable value to upper management.”
"Pentera allows us to tailor testing to each service, reduce time and costs, and shift our focus from simply finding vulnerabilities to actively helping our teams fix them.”

Rubén Alonso | Head of Secure
Development Unit, Telefonica

“I don’t think we’d be able to advance our red team without Pentera. If you’re looking to improve penetration testing, I would definitely recommend it.”

Owen Fuller | Cybersecurity Engineering
Manager, Casey’s

Pentera Labs
Pentera Labs’ daily mission is to keep security teams one step ahead of attackers. We wake up every day analyzing threat intelligence, emerging attack techniques, and real-world breaches to understand how modern attacks evolve across enterprise environments. We apply that knowledge directly into Pentera’s attack engine to ensure that your security testing reflects the techniques adversaries are using today and those they will use tomorrow.
Cybersecurity Research

The latest cyber research from Pentera Labs

Threat Research
Living off the Land
LOLBins Against the Machine: Reverse Engineering at Machine Speed
Read more
Active Directory
You’ll Never SID’em Coming: DoS in Active Directory
Read more
Detection Evasion
Reflective Loading with Remote Memory Interactions
Read more
Attack Deep Dive
WebLogic
WebLogic – A Road to Post Exploitation
Read more
DNS
Bypassing “Air-Gapped” Networks via DNS
Read more
WebLogic
Not Another WebLogic Exploitation: The Road to Post Exploitation
Read more
Vulnerability Research
Kubernetes
Beyond IngressNightmare: Uncovering New Injection Vectors in Kubernetes Ingress-NGINX
Read more
Fortinet VPN
Piping Hot Fortinet Vulnerabilities – Zero-Days in FortiClient VPN
Read more
MSSQL
The Gateway to Control: Initiating Attacks on MSSQL Databases
Read more
Cloud Risks
AWS
Blurring Boundaries: Risks of AWS SSM in Hybrid Landscapes
Read more
In The Wild
When the Lab Door Stays Open: Exposed Training Apps Exploited for Fortune 500 Cloud Breaches
Read more
Security Research Areas

Areas of activity

Ransomware & Cryptominers

Web
Applications

Threat
Intelligence

Enterprise Environments

Post
Exploitations

Cloud

Password
Cracking

Development Processes

EDR
Evasion

Phishing

Kubernetes

Containers

Virtualization

Network
Protocols

Vulnerability Exploitation

Windows / Linux / MacOS TTPs

LLM

API

Network
Gear

Attack
Enablement

Research & Product Innovation

Research-driven exposure validation

The research we conduct directly powers the validation engine you rely on. Our focus goes beyond tracking CVEs, examining the techniques attackers use to bypass security controls, exploit misconfigurations, chain exposures, live off the land, and more. Every discovery feeds into Pentera’s testing capabilities, ensuring they reflect how adversaries actually operate. As attack methods change, Pentera’s testing changes with them through a continuous cycle of research, development, testing, deployment, and refinement.
Pentera Labs Researchers

Offensive expertise, built in

Pentera Labs brings together over 50 world-class adversarial researchers, red teamers, and offensive security specialists as the engine behind the Pentera Platform. The team analyzes how attackers exploit, escalate, and move across enterprise environments, continuously translating their findings into built-in product capabilities.
Research Recognition

Research cited across cybersecurity media

Misconfigured demo environments
are turning into cloud backdoors to
the enterprise
Fortinet VPN design flaw hides
successful brute-force attacks
The Kubernetes Annotation Pitfall:
The One Word That Puts Your AWS
Load Balancers at Risk
Love to hack? Put it to work with the good guys at Pentera Labs.