Jakob PenningtonBBB #2 — Introducing DaneelThis week, I began building my own bug bounty automation tool. This post introduces daneel and talks about how I plan to use daneel to hunt7 min read·Jun 11, 2024----
Jakob PenningtonBBB #1 — Back HackingG’day! I’m Jakob, an Application Security consultant from Australia, welcome to my Bug Bounty Blog (BBB).4 min read·Jun 2, 2024----
Jakob PenningtoninTaptuBuilding hacking tools in Windows using DockerSomething that I have struggled with in the past as a software developer turned penetration tester is the fact that I use two operating…5 min read·Jul 27, 2020--1--1
Jakob PenningtoninTaptuDocker for Penetration TestersCan Docker containers replace VMs for bug bounty hunters and penetration testers?9 min read·Jul 21, 2020----
Jakob PenningtoninTaptuShifting Left: DevSecOps as an Approach to Building Secure ProductsWhy traditional security testing should not be the core of your application security program.5 min read·Jul 18, 2019--2--2
Jakob PenningtoninTaptuThe Eight Phases of a DevOps PipelineLet’s break down the phases of a DevOps pipeline and clarify some common terms.9 min read·Jul 18, 2019--4--4
Jakob PenningtoninTaptuWhat is DevOps?The simplest introduction to DevOps and the benefits it can provide to your organisation.5 min read·Jul 18, 2019--3--3
Jakob PenningtoninTaptuExploiting XSS via MarkdownI recently came across a web application in which I was able to exploit a Cross-Site Scripting (XSS) vulnerability through a markdown…6 min read·Feb 7, 2019--1--1
Jakob PenningtoninTaptuBreaking into Encrypted iPhone BackupsThe day that being a hacker made me feel like a hero.10 min read·Nov 21, 2018--12--12
Jakob PenningtoninTaptuAdd Notifications to your AWS CI/CD PipelineThis post is Part 3 in a 🤷-Part series on CI/CD in AWS. Go check out my other posts to see how we got here: Part 1: Deploy a Single-Page…5 min read·Aug 5, 2018----