Browsing the "hunting" Tag

Creating Wordlists for Pentesting & Bug Bounty Hunting Using Seclists, Bigquery, and More!

April 25th, 2020 📆 | 2202 Views ⚑

Live Every Tuesday, Friday, Saturday and Sunday on Twitch: https://twitch.tv/nahamsec Follow Me: https://twitter.com/nahamsec https://instagram.com/nahamsec https://twitch.tv/nahamsec https://hackerone.com/nahamsec https://facebook.com/nahamsec1 Free $100 DigitalOcean

Tagged with:




Mobile Pentesting and Bug Hunting – Bad Permissions – 2

April 25th, 2020 📆 | 7546 Views ⚑

Looking into a mobile application with bad permissions for pentesting and bug bounty hunting purposes. Part 2. __________ Python for

Tagged with:
















Jupyter Notebooks and Pre-recorded Datasets for Threat Hunting – SANS THIR Summit 2019

February 27th, 2020 📆 | 2324 Views ⚑

How many times have you thought about a more efficient, intuitive, or creative way to analyze the security events your

Tagged with:




My “Aha!” Moment – Methods, Tips, & Lessons Learned in Threat Hunting – SANS THIR Summit 2019

February 26th, 2020 📆 | 6994 Views ⚑

This presentation is designed as a personal journey through threat hunting to inspire others to embrace certain methods, tips, and

Tagged with:




Books to Read for Penetration Testing and Bug Bounty Hunting

February 7th, 2020 📆 | 6757 Views ⚑

In this video Heath @thecybermentor and I discuss notable books for penetration testing and bug bounty hunting. Full video: https://www.youtube.com/watch?v=i576YkwhIUE

Tagged with: