I let automation hack for me: Here is what I learned

Introduction

In my short time in the infosec space, I have had the pleasure to work with several exploit/vulnerability scanners which attempt to automate the scanning for but also exploitation of vulnerabilities and exploits. In this article, I will go over the main takeaways I’ve had while working with these tools. I’ll give every one of them a number that represents how useful I found them in bug bounties and in pen-testing. I know this is entirely subjective but I hope it will at least give you an indication in combination with…

--

--

--

No b*llshit Hacking tutorials with extreme value in short bursts

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Resources to train an amazing hacker — Part 3: Tools

Getting started with cryptography for internet apps

{UPDATE} Unicorn Cake Hack Free Resources Generator

using Mimikatz to get cleartext password from offline memory dump

{UPDATE} Alabama Bones Hack Free Resources Generator

Mines of Dalarnia x CryptoJ AMA Recap (12/04/2022) Chinese & English Versions

Seoul launched a digital wallet storing digital credentials

Best Hacking Tools Of 2017 For Windows, Linux, And Mac OS X

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Thexssrat

Thexssrat

No b*llshit Hacking tutorials with extreme value in short bursts

More from Medium

Pentesting: The Relevance, Top 10 Tools, And More

How “Docker” can help you become a better hacker

How to hunt for bug bounties

Multiple ways to find sql and cheatsheet