Dec. 28, 2023, 11:55 p.m. | Grzegorz Piechnik

DEV Community dev.to

When working as a pentester or bug hunter it is normal to want to automate some of our work. This includes scanning network ports, checking the technologies in use, but also running potential exploits and vulnerability scanners. Today we will look at one tool that can help us automate our flow. We are talking about afrog.





Afrog in action


We will skip all the configuration or installation steps because they are too simple to discuss. Instead, let's get straight to …

bounty bug bug bounty explained exploits flow hackathon hacktoberfest hacktoberfest23 hunter hunters network normal pentester ports running scanners scanning talking technologies today tool vulnerability vulnerability scanners webdev work working

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Technical Support Specialist (Cyber Security)

@ Sigma Software | Warsaw, Poland

OT Security Specialist

@ Adani Group | AHMEDABAD, GUJARAT, India

FS-EGRC-Manager-Cloud Security

@ EY | Bengaluru, KA, IN, 560048