Jakob PenningtonBBB #2 — Introducing DaneelThis week, I began building my own bug bounty automation tool. This post introduces daneel and talks about how I plan to use daneel to huntJun 11Jun 11
Jakob PenningtonBBB #1 — Back HackingG’day! I’m Jakob, an Application Security consultant from Australia, welcome to my Bug Bounty Blog (BBB).Jun 2Jun 2
Jakob PenningtoninTaptuBuilding hacking tools in Windows using DockerSomething that I have struggled with in the past as a software developer turned penetration tester is the fact that I use two operating…Jul 27, 20201Jul 27, 20201
Jakob PenningtoninTaptuDocker for Penetration TestersCan Docker containers replace VMs for bug bounty hunters and penetration testers?Jul 21, 2020Jul 21, 2020
Jakob PenningtoninTaptuShifting Left: DevSecOps as an Approach to Building Secure ProductsWhy traditional security testing should not be the core of your application security program.Jul 18, 20192Jul 18, 20192
Jakob PenningtoninTaptuThe Eight Phases of a DevOps PipelineLet’s break down the phases of a DevOps pipeline and clarify some common terms.Jul 18, 20194Jul 18, 20194
Jakob PenningtoninTaptuWhat is DevOps?The simplest introduction to DevOps and the benefits it can provide to your organisation.Jul 18, 20193Jul 18, 20193
Jakob PenningtoninTaptuExploiting XSS via MarkdownI recently came across a web application in which I was able to exploit a Cross-Site Scripting (XSS) vulnerability through a markdown…Feb 7, 20191Feb 7, 20191
Jakob PenningtoninTaptuBreaking into Encrypted iPhone BackupsThe day that being a hacker made me feel like a hero.Nov 21, 201812Nov 21, 201812
Jakob PenningtoninTaptuAdd Notifications to your AWS CI/CD PipelineThis post is Part 3 in a 🤷-Part series on CI/CD in AWS. Go check out my other posts to see how we got here: Part 1: Deploy a Single-Page…Aug 5, 2018Aug 5, 2018