Dradis; as seen in books, press, training, and online courses

Our framework has helped thousands of security professionals streamline their workflow.
As a result, we've been mentioned in a book or two along the way.

Dradis in books

Advanced penetration testing for highly-secured environments
Advanced penetration testing for highly-secured environments

Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide.

Author:
Lee Allen
ISBN:
9781784395810
BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

Real-world examples and step-by-step instructions to provide professional guidelines and recommendations.

Author:
Shakeel Ali & Tedi Heriyanto
ISBN:
9781849517744
CompTIA PenTest+ PT0-001 Cert Guide
CompTIA PenTest+ PT0-001 Cert Guide

Learn, prepare, and practice for CompTIA Pentest+ PT0-001 exam success with this CompTIA Cert Guide.

Author:
Omar Santos & Ron Taylor
ISBN:
9780789760357
Computational Science and Technology
Computational Science and Technology

The Fourth International Conference on Computational Science and Technology.

Author:
Various Authors
ISBN:
9789811082757
Gray Hat Hacking the Ethical Hackers Handbook
Gray Hat Hacking the Ethical Hackers Handbook

The latest hacking methods. Featuring coverage of vulnerability discovery and reverse engineering.

Author:
Various Authors
ISBN:
9780071742566
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
Hacking Exposed Industrial Control Systems

The methods cyber threat actors use to compromise the hardware and software central industrial control systems.

Author:
Various Authors
ISBN:
9781259589713
Hacking of Computer Networks: Full Course on Certified Ethical Hackers
Hacking of Computer Networks: Certified Ethical Hacker

The objective of the book is to summarize to the user with main topics in certified ethical hacker course.

Author:
Dr. Hidaia Mahmood Alassouli
Hands on Hacking
Hands on Hacking

Teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks.

Author:
Various Authors
ISBN:
9781119561453
Kali Linux 2018: Assuring Security by Penetration Testing
Kali Linux 2018: Assuring Security by Penetration Testing

Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!

Author:
Various Authors
ISBN:
9781785888427
Network Vulnerability Assessment: Identify security loopholes in your network’s infrastructure
Network Vulnerability Assessment

Build a network security threat model. For individuals who want to be part of a vulnerability management team.

Author:
Various Authors
ISBN:
9781788627252
Penetration Testing: A Survival Guide
Penetration Testing: A Survival Guide

A complete pentesting guide facilitating smooth backtracking for working hackers.

Author:
Wolf Halton & Bo Weaver
ISBN:
9781787289888
Social Engineering: The Science of Human Hacking
Social Engineering: The Science of Human Hacking

From elicitation, pretexting, influence and manipulation all aspects of social engineering are discussed.

Author:
Christopher Hadnagy
ISBN:
9780470639535
The Social Engineer’s Playbook: A Practical Guide to Pretexting
The Social Engineer’s Playbook: A Practical Guide to Pretexting

Build a network security threat model with this guide. For individuals who want to be part of a vulnerability management team.

Author:
Jeremiah Talamantes
ASIN:
B00OS42RWI

Dradis in the Press

Penetration testing: Concepts, attack methods, and defense strategies
Penetration testing: Concepts, methods, and strategies

Investigate different aspects of pen testing tools, methodologies, and defense strategies.

ISSA Journal 2010
ISSA Journal 2010

Effective Information Sharing for Pentest Teams.

Dradis in training courses

Advanced Ethical Hacking
Advanced Ethical Hacking

In-depth course which covers the tools and techniques for performing penetration testing.

Post Graduate Program In Cyber Security
Post Graduate Program In Cyber Security

Designed to equip you with the skills required to become an expert in Cyber Security.

Dradis in Conferences and Presentations

Black Hat USA 2021
Black Hat Asia 2025

In 2025, managing the information flow during assessments is just as important as finding vulnerabilities.

Black Hat USA 2021
Black Hat USA 2021

Report Writing Is Half the Battle: Finish Your Report in Less Time and Get Back to Hacking.

Black Hat USA 2018
Black Hat USA 2018

Learn How to Cut Your Reporting Time in Half - ARSENAL THEATER DEMO.

Black Hat USA + Europe 2017
Black Hat USA + Europe 2017

10 Years Helping Security Teams Spend More Time Testing and Less Time Reporting.

Black Hat USA + Europe 2016
Black Hat USA + Europe 2016

Dradis is an extensible, cross-platform, open source collaboration framework for InfoSec teams.

B:Sides London 2016
B:Sides London 2016

Dradis 3.1: A Year of Updates. Dradis is a cross-platform, open source collaboration framework for InfoSec teams.

Black Hat USA 2015
Black Hat USA 2015

DRADIS FRAMEWORK 3.0 Three years after our last official release, we've got a new version of the app.

B:Sides London 2015
B:Sides London 2015

Dradis 3.1: A Year of Updates. Dradis is a cross-platform, open source collaboration framework for InfoSec teams.

B:Sides London 2014
B:Sides London 2014

Dradis Framework: API, Excel, and more.

B:Sides London 2013
B:Sides London 2013

Dradis Framework: Creating custom plugins.

DEFCON 17: 2009
DEFCON 17: 2009

Dradis Framework: Creating custom plugins.

Effective information sharing
Dradis: Effective information sharing.

Why teams neeed, and would want to use Dradis Framework

Dradis Plugin Programming
Introduction to Dradis plugin programming.

General client side structure, dispatcher, plugin framework, Nmap plugin.

Dradis Overview
Dradis Overview: 2007

An overview of the first ever Dradis Framework tool.

Seven Strategies To Differentiate Your Cybersecurity Consultancy

You don’t need to reinvent the wheel to stand out from other cybersecurity consultancies. Often, it's about doing the simple things better, and clearly communicating what sets you apart.

  • Tell your story better
  • Improve your testimonials and case studies
  • Build strategic partnerships

Your email is kept private. We don't do the spam thing.