You, with your new subdomain scanner, literally punching clean through a laptop because youâre so awesome.Sub-domain takeovers are all the rage in the bug bounty scene at the moment. Youâve probably heard about some bug bounty legends who are raking in the dough because theyâve managed to set up an automated sub-domain takeover scanner, if you havenât, Google âFrans Rosénâ. Iâm going to let you in
å¿ããããã®ã§ã¿ã¼ããã«ã®åºæ¬æ å ±ãã¾ã¨ãããã¨æãã¾ãã æ®éã«Macã使ç¨ãã¦ããããã¾ã使ãæ©ä¼ã¯ãªãããããã¾ããããã¿ã¼ããã«ã§ã®ã¿åºæ¥ãæ©è½ãããã¾ãã®ã§è¦ãã¦ããã¨ãããã¨æãã¾ããç°å¢ã¯bashã«ãªãã¾ãã ã¿ã¼ããã«ã¨ã¯ CUI(Character User Interface)ã... 使ãæ¹ã¯ããã£ã¦ç°¡åã§ããã¿ã¼ããã«ãèµ·åãã¦ä»¥ä¸ã®ã³ãã³ããå ¥åãã¾ãã caffeinate ã¿ã¼ããã«ã§ãcaffeinateããå®è¡ããã ãã§ãã¹ãªã¼ããæå¶ããã¾ãã ç°¡åããã¦å¤§ãã説æã«ãªã£ã¦ããªãã®ã§ä»¥ä¸ã«ãã®ä»ãªãã·ã§ã³ã®èª¬æããã¾ãã caffeinateã³ãã³ããªãã·ã§ã³ caffeinatateã³ãã³ãã«ã¯ããã¤ããªãã·ã§ã³ãç¨æããã¦ãã¦ãã¹ãªã¼ãããç®æãå¤æ´ããããæéãæå®ãããã¨ãã£ããã詳細ãªå 容ã§ã¹ãªã¼ãæå¶ã³ãã³ããå®è¡ã§ãã¾ãã -d ãã£ã¹ãã¬
recon-my-way â This repository created for personal use and added tools from my latest blog post. yes, I did !! ð Recently, some new members of the InfoSec community asked me to share my recon process. Hence, I decided to begin writing this blog and tried to include such tools and services which helps me a lot while testing and will help the readers too, for sure. SummaryIntroductionA tool I modi
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}