On choosing a platform for an Open Source CommunityTL;DR: This blog is on my views around choosing a platform for an Open Source project’s community. Spoiler alert: I like forums that can…Jul 8, 2024Jul 8, 2024
Published inDisruptive LabsLinux CLI on steroidsTools for boosting productivity on the linux command-lineSep 5, 2023Sep 5, 2023
Published inDisruptive LabsNotes on Yubikey setup & automation on Linux/MacOSI have finally managed to move my MFA to hardware security keys using Yubikeys, thanks to the Cloudflare’s “Good for the Internet” offer…Sep 5, 2023Sep 5, 2023
Published inDisruptive LabsStatic Analysis of Client-Side JavaScript for pen testers and bug bounty huntersJavaScript has become one of the most ubiquitous technologies in the modern web browsers. Applications built using client-side JavaScript…Sep 22, 2018A response icon2Sep 22, 2018A response icon2
Published inAppseccoOpen Source Intelligence Gathering 201 (Covering 12 additional techniques)This post is the second in a series of technical posts we are writing about Open Source Intelligence(OSINT) gathering.Sep 6, 2018A response icon1Sep 6, 2018A response icon1
Published inAppsecco“Practical recon techniques for bug hunters & pen testers” at LevelUp 0x02Appsecco will be presenting at LevelUp 0x02, a free virtual conference for hackers by hackers.May 25, 2018May 25, 2018
Published inDisruptive LabsA quick primer on encoding & decoding for security folksThis blog post tries to be a quick and practical primer on encoding and decoding schemes for security testers. This blog will cover…Apr 20, 2018Apr 20, 2018
Published inDisruptive LabsHunting publicly accessible DigitalOcean Spaces for PentestersHow to leverage DigitalOcean Spaces during reconnaissanceNov 27, 2017Nov 27, 2017
Published inDisruptive LabsA penetration tester’s guide to subdomain enumerationAs a penetration tester or a bug bounty hunter, most of the times you are given a single domain or a set of domains when you start a…Oct 11, 2017A response icon14Oct 11, 2017A response icon14