Browsing the "hunting" Tag

Creating Wordlists for Pentesting & Bug Bounty Hunting Using Seclists, Bigquery, and More!

April 25th, 2020 📆 | 1694 Views ⚑

Live Every Tuesday, Friday, Saturday and Sunday on Twitch: https://twitch.tv/nahamsec Follow Me: https://twitter.com/nahamsec https://instagram.com/nahamsec https://twitch.tv/nahamsec https://hackerone.com/nahamsec https://facebook.com/nahamsec1 Free $100 DigitalOcean

Tagged with:




Mobile Pentesting and Bug Hunting – Bad Permissions – 2

April 25th, 2020 📆 | 1694 Views ⚑

Looking into a mobile application with bad permissions for pentesting and bug bounty hunting purposes. Part 2. __________ Python for

Tagged with:
















Jupyter Notebooks and Pre-recorded Datasets for Threat Hunting – SANS THIR Summit 2019

February 27th, 2020 📆 | 6559 Views ⚑

How many times have you thought about a more efficient, intuitive, or creative way to analyze the security events your

Tagged with:




My “Aha!” Moment – Methods, Tips, & Lessons Learned in Threat Hunting – SANS THIR Summit 2019

February 26th, 2020 📆 | 7224 Views ⚑

This presentation is designed as a personal journey through threat hunting to inspire others to embrace certain methods, tips, and

Tagged with: