Luke Stephens (@hakluke)How to achieve enterprise-grade attack-surface monitoring with open source softwareAttack surface monitoring has become increasingly important and popular in recent years as the internet footprint of organizations has…·9 min read·Jul 21, 2021----
Luke Stephens (@hakluke)Introducing Haktrails: A Small CLI Tool Harnessing the Power of SecurityTrailsYes, I made a logo for my tool. It’s a wolf with a moon on it’s head. It has nothing to do with the tool but if you like wolves then you…·5 min read·Mar 17, 2021----
Luke Stephens (@hakluke)Hakluke’s Guide to Nmap — Port Scanning is Just The BeginningA while back, I posted a Twitter thread that described the Nmap features that I actually use. It really blew up! Nearly 80,000 people saw…·5 min read·Aug 26, 2020--3--3
Luke Stephens (@hakluke)Hakluke’s Guide to Amass — How to Use Amass More Effectively for Bug BountiesAmass has a lot of features. It’s a bit of a weird tool because despite being synonymous with bug bounty recon, and despite being…·7 min read·Aug 23, 2020--4--4
Luke Stephens (@hakluke)Introducing Hakrawler: A Fast Web Crawler for HackersHakrawler?3 min read·Jan 3, 2020--1--1
Luke Stephens (@hakluke)The Motivation Secret: How to Maintain Intense Motivation as a HackerI’m an ethical computer hacker, and I follow a lot of others in the same profession on Twitter. In many ways it is a demanding job because…·4 min read·Dec 3, 2019--4--4
Luke Stephens (@hakluke)How to Upgrade Your XSS Bug from Medium to CriticalSome ways to effectively leverage XSS vulnerabilities to increase severity, and some canned payloads to hack popular frameworks!·5 min read·May 21, 2019--6--6
Luke Stephens (@hakluke)Interlace: A Productivity Tool For Pentesters and Bug Hunters - Automate and Multithread Your…Before we start, I need to get something off my chest. I’m an efficiency junkie. I’m one of those people who spends 4 hours configuring…·5 min read·Feb 3, 2019--8--8
Luke Stephens (@hakluke)I’m A Hacker, Here’s How I Break Into Your Company’s Network | How Phishing Attacks WorkHave you ever received an email from a Nigerian prince or a non-existent distant relative who is offering you an absurd amount of money…·5 min read·Oct 19, 2018--1--1
Luke Stephens (@hakluke)How To Setup an Automated Sub-domain Takeover Scanner for All Bug Bounty Programs in 5 MinutesSub-domain takeovers are all the rage in the bug bounty scene at the moment. You’ve probably heard about some bug bounty legends who are…·4 min read·Aug 21, 2018--3--3