How to achieve enterprise-grade attack-surface monitoring with open source softwareAttack surface monitoring has become increasingly important and popular in recent years as the internet footprint of organizations has…Jul 21, 2021Jul 21, 2021
Introducing Haktrails: A Small CLI Tool Harnessing the Power of SecurityTrailsYes, I made a logo for my tool. It’s a wolf with a moon on it’s head. It has nothing to do with the tool but if you like wolves then you…Mar 17, 2021Mar 17, 2021
Hakluke’s Guide to Nmap — Port Scanning is Just The BeginningA while back, I posted a Twitter thread that described the Nmap features that I actually use. It really blew up! Nearly 80,000 people saw…Aug 26, 20203Aug 26, 20203
Hakluke’s Guide to Amass — How to Use Amass More Effectively for Bug BountiesAmass has a lot of features. It’s a bit of a weird tool because despite being synonymous with bug bounty recon, and despite being…Aug 23, 20204Aug 23, 20204
The Motivation Secret: How to Maintain Intense Motivation as a HackerI’m an ethical computer hacker, and I follow a lot of others in the same profession on Twitter. In many ways it is a demanding job because…Dec 3, 20193Dec 3, 20193
How to Upgrade Your XSS Bug from Medium to CriticalSome ways to effectively leverage XSS vulnerabilities to increase severity, and some canned payloads to hack popular frameworks!May 21, 20195May 21, 20195
Interlace: A Productivity Tool For Pentesters and Bug Hunters - Automate and Multithread Your…Before we start, I need to get something off my chest. I’m an efficiency junkie. I’m one of those people who spends 4 hours configuring…Feb 3, 20198Feb 3, 20198
I’m A Hacker, Here’s How I Break Into Your Company’s Network | How Phishing Attacks WorkHave you ever received an email from a Nigerian prince or a non-existent distant relative who is offering you an absurd amount of money…Oct 19, 20181Oct 19, 20181
How To Setup an Automated Sub-domain Takeover Scanner for All Bug Bounty Programs in 5 MinutesSub-domain takeovers are all the rage in the bug bounty scene at the moment. You’ve probably heard about some bug bounty legends who are…Aug 21, 20183Aug 21, 20183