Luke Stephens (@hakluke)How to achieve enterprise-grade attack-surface monitoring with open source softwareAttack surface monitoring has become increasingly important and popular in recent years as the internet footprint of organizations has…Jul 21, 2021Jul 21, 2021
Luke Stephens (@hakluke)Introducing Haktrails: A Small CLI Tool Harnessing the Power of SecurityTrailsYes, I made a logo for my tool. It’s a wolf with a moon on it’s head. It has nothing to do with the tool but if you like wolves then you…Mar 17, 2021Mar 17, 2021
Luke Stephens (@hakluke)Hakluke’s Guide to Nmap — Port Scanning is Just The BeginningA while back, I posted a Twitter thread that described the Nmap features that I actually use. It really blew up! Nearly 80,000 people saw…Aug 26, 20203Aug 26, 20203
Luke Stephens (@hakluke)Hakluke’s Guide to Amass — How to Use Amass More Effectively for Bug BountiesAmass has a lot of features. It’s a bit of a weird tool because despite being synonymous with bug bounty recon, and despite being…Aug 23, 20204Aug 23, 20204
Luke Stephens (@hakluke)Introducing Hakrawler: A Fast Web Crawler for HackersHakrawler?Jan 3, 20201Jan 3, 20201
Luke Stephens (@hakluke)The Motivation Secret: How to Maintain Intense Motivation as a HackerI’m an ethical computer hacker, and I follow a lot of others in the same profession on Twitter. In many ways it is a demanding job because…Dec 3, 20193Dec 3, 20193
Luke Stephens (@hakluke)How to Upgrade Your XSS Bug from Medium to CriticalSome ways to effectively leverage XSS vulnerabilities to increase severity, and some canned payloads to hack popular frameworks!May 21, 20195May 21, 20195
Luke Stephens (@hakluke)Interlace: A Productivity Tool For Pentesters and Bug Hunters - Automate and Multithread Your…Before we start, I need to get something off my chest. I’m an efficiency junkie. I’m one of those people who spends 4 hours configuring…Feb 3, 20198Feb 3, 20198
Luke Stephens (@hakluke)I’m A Hacker, Here’s How I Break Into Your Company’s Network | How Phishing Attacks WorkHave you ever received an email from a Nigerian prince or a non-existent distant relative who is offering you an absurd amount of money…Oct 19, 20181Oct 19, 20181
Luke Stephens (@hakluke)How To Setup an Automated Sub-domain Takeover Scanner for All Bug Bounty Programs in 5 MinutesSub-domain takeovers are all the rage in the bug bounty scene at the moment. You’ve probably heard about some bug bounty legends who are…Aug 21, 20183Aug 21, 20183