How to achieve enterprise-grade attack-surface monitoring with open source softwareAttack surface monitoring has become increasingly important and popular in recent years as the internet footprint of organizations has…Jul 21, 2021Jul 21, 2021
Introducing Haktrails: A Small CLI Tool Harnessing the Power of SecurityTrailsYes, I made a logo for my tool. It’s a wolf with a moon on it’s head. It has nothing to do with the tool but if you like wolves then you…Mar 17, 2021Mar 17, 2021
Hakluke’s Guide to Nmap — Port Scanning is Just The BeginningA while back, I posted a Twitter thread that described the Nmap features that I actually use. It really blew up! Nearly 80,000 people saw…Aug 26, 2020A response icon3Aug 26, 2020A response icon3
Hakluke’s Guide to Amass — How to Use Amass More Effectively for Bug BountiesAmass has a lot of features. It’s a bit of a weird tool because despite being synonymous with bug bounty recon, and despite being…Aug 23, 2020A response icon4Aug 23, 2020A response icon4
Introducing Hakrawler: A Fast Web Crawler for HackersHakrawler?Jan 3, 2020A response icon1Jan 3, 2020A response icon1
The Motivation Secret: How to Maintain Intense Motivation as a HackerI’m an ethical computer hacker, and I follow a lot of others in the same profession on Twitter. In many ways it is a demanding job because…Dec 3, 2019A response icon3Dec 3, 2019A response icon3
How to Upgrade Your XSS Bug from Medium to CriticalSome ways to effectively leverage XSS vulnerabilities to increase severity, and some canned payloads to hack popular frameworks!May 21, 2019A response icon5May 21, 2019A response icon5
Interlace: A Productivity Tool For Pentesters and Bug Hunters - Automate and Multithread Your…Before we start, I need to get something off my chest. I’m an efficiency junkie. I’m one of those people who spends 4 hours configuring…Feb 3, 2019A response icon8Feb 3, 2019A response icon8
I’m A Hacker, Here’s How I Break Into Your Company’s Network | How Phishing Attacks WorkHave you ever received an email from a Nigerian prince or a non-existent distant relative who is offering you an absurd amount of money…Oct 19, 2018A response icon2Oct 19, 2018A response icon2
How To Setup an Automated Sub-domain Takeover Scanner for All Bug Bounty Programs in 5 MinutesSub-domain takeovers are all the rage in the bug bounty scene at the moment. You’ve probably heard about some bug bounty legends who are…Aug 21, 2018A response icon3Aug 21, 2018A response icon3