2021-08-03 |
How to achieve enterprise-grade attack-surface monitoring with open source software |
Luke Stephens (@hakluke) |
|
2021-06-25 |
I’m A Hacker, Here’s How I Break Into Your Company’s Network | How Phishing Attacks Work |
phishing ‧ Luke Stephens (@hakluke) |
|
2021-06-25 |
How To Setup an Automated Sub-domain Takeover Scanner for All Bug Bounty Programs in 5 Minutes |
subdomain-takover ‧ Luke Stephens (@hakluke) |
|
2021-06-25 |
A Guide to Hacking Without Metasploit |
hacking ‧ Luke Stephens (@hakluke) |
|
2021-03-21 |
Introducing Haktrails: A Small CLI Tool Harnessing the Power of SecurityTrails |
recon ‧ Luke Stephens (@hakluke) |
|
2021-03-21 |
Hakluke’s Guide to Nmap — Port Scanning is Just The Beginning |
cybersecurity ‧ Luke Stephens (@hakluke) |
|
2021-03-21 |
Hakluke’s Guide to Amass — How to Use Amass More Effectively for Bug Bounties |
hacking ‧ Luke Stephens (@hakluke) |
|
2021-03-21 |
Introducing Hakrawler: A Fast Web Crawler for Hackers |
crawler ‧ Luke Stephens (@hakluke) |
|
2021-03-21 |
The Motivation Secret: How to Maintain Intense Motivation as a Hacker |
motivation ‧ Luke Stephens (@hakluke) |
|
2021-03-21 |
How to Upgrade Your XSS Bug from Medium to Critical |
pentesting ‧ Luke Stephens (@hakluke) |
|
2021-03-21 |
Interlace: A Productivity Tool For Pentesters and Bug Hunters - Automate and Multithread Your… |
bug-bounty ‧ Luke Stephens (@hakluke) |
|