Skip to main content
Technical articles, methodology notes, and working papers from NOMADITECH.
NOMADITECH
Archive covering methodology, offensive security analysis, exposure intelligence, assurance workflows, and technical writing. Curated archive
Research Articles Method Notes Exposure Intelligence Working Papers
Featured articles

Featured articles surface flagship methodology pieces, technical writing, and archive entries that best represent the NOMADITECH approach across testing, assurance, and exposure intelligence.

Archive

Technical articles, method notes, and indexed archive entries

Live archive structure Topic indexed Structured metadata
Methodology

What makes a penetration test report technically credible

A practical article on evidence quality, reproducibility, risk framing, technical accuracy, and how reporting structure affects buyer confidence and remediation value.

Article IDNM-R-004
Read time11 min
TypeResearch Article
StatusPublished
API Security

Testing object-level authorisation in modern APIs

A focused article on user-context variance, identity separation, object reference handling, and how to validate API access control meaningfully rather than superficially.

Article IDNM-R-005
Read time10 min
TypeResearch Article
StatusPublished
Working Paper

Continuous penetration testing and the economics of exposure windows

A working paper exploring cadence, exploitability-oriented validation, operational triggers, and where continuous testing creates genuine value rather than continuous noise.

Article IDNM-WP-002
Read time18 min
TypeWorking Paper
StatusWorking Draft
Web Application Security

Why workflow context matters in web application testing

An article on route classes, transaction flow, stateful behaviours, and why testing isolated inputs often misses the weaknesses that matter most in real applications.

Article IDNM-R-006
Read time9 min
TypeResearch Article
StatusPublished
Technical Assurance

How retest validation should be documented

A structured note on fix validation, residual exposure, evidence expectations, and how to show clearly whether remediation has reduced the original risk.

Article IDNM-R-007
Read time7 min
TypeMethod Note
StatusPublished
Methodology

Evidence-led testing versus scan-led assurance

A comparative piece on the difference between superficial issue identification and technical validation that supports decision-making, remediation, and credible reporting.

Article IDNM-R-008
Read time8 min
TypeResearch Article
StatusPublished
Exposure Intelligence

What dark web exposure intelligence should actually help security teams do

A practical article on turning underground exposure signals into triageable security output rather than noisy monitoring that fails to support decision-making.

Article IDNM-R-009
Read time9 min
TypeResearch Article
StatusPublished
Exposure Intelligence

Credential exposure monitoring: signal, noise, and response priority

A technical note on how to interpret leaked credential signals, avoid false urgency, and prioritise action based on context, relevance, and downstream risk.

Article IDNM-R-010
Read time8 min
TypeMethod Note
StatusPublished
Exposure Intelligence

How VulpineMind turns underground exposure into triageable security output

A platform-oriented article on how exposure signals, leaked credentials, impersonation indicators, and underground references can be translated into actionable security context.

Article IDNM-R-011
Read time10 min
TypeResearch Article
StatusReviewed Draft
Exposure Intelligence

Brand impersonation and underground signals in practical exposure intelligence

A focused article on domain misuse, executive impersonation, fraud-adjacent signals, and where exposure intelligence becomes operationally useful outside traditional breach response.

Article IDNM-WP-003
Read time13 min
TypeWorking Paper
StatusWorking Draft
Apply this thinking in practice

Need this level of analysis applied to your environment?

NOMADITECH provides web application testing, API security assessment, technical assurance, and VulpineMind-powered exposure intelligence for organisations that want credible analysis and actionable outcomes.