![](../assets/images/base/portal.png)
ARTICLES
We are pleased to share with all of you these amazing articles written by our team of experts.
![](../media/articles-images/ProxiesAndPortRedirectionsForWebApplications.png )
PROXIES AND PORT REDIRECTION FOR WEB APPLICATION PENTESTING (EN)
![](../media/articles-images/ProxiesAndPortRedirectionsForWebApplications(ES).png )
PROXIES Y REENVÍO DE PUERTOS PARA PENTEST DE APLICACIONES WEB (ES)
![](../media/articles-images/TheSuccessOfAnEthicalHackingPentest.png )
THE SUCCESS OF AN ETHICAL HACKING_PENTESTING SERVICE (EN)
![](../media/articles-images/TheSuccessOfAnEthicalHackingPentest(ES).png )
EL ÉXITO DE UN SERVICIO DE ETHICAL HACKING_PENTEST (ES)
![](../media/articles-images/ObfuscationTechniques.png )
OBFUSCATION TECHNIQUES (EN)
![](../media/articles-images/ObfuscationTechniques(ES).png )
TÉCNICAS DE OFUSCACIÓN (ES)
![](../media/articles-images/PentestVSBugBounty.png)
PENTEST VS BUG BOUNTY (EN)
![](../media/articles-images/PentestVSBugBounty(ES).png)
PENTEST VS BUG BOUNTY (ES)
![](../media/articles-images/SQLMapParaNovatos.png )
SQLMAP PARA NOVATOS (ES)
![](../media/articles-images/PowerShellBasico.png )
POWERSHELL BÁSICO EN PENTEST” (ES)
![](../media/articles-images/UsoDelResponder.png)
USO DEL “RESPONDER” EN UN PENTEST A UNA EMPRESA (LLMNR POISONING) (ES)
![](../media/articles-images/IWantToBeAPentester.png)
I WANT TO BE A PENTESTER, NOW WHAT? (EN)
![](../media/articles-images/IWantToBeAPentester(ES).png)
QUIERO SER UN PENTESTER, ¿Y AHORA QUÉ? (ES)
![](../media/articles-images/EmpezandoConElPentestEnAWS.png)
EMPEZANDO CON EL PENTEST EN AWS (ES)