all InfoSec news
Afrog explained for bug bounty hunters
DEV Community dev.to
When working as a pentester or bug hunter it is normal to want to automate some of our work. This includes scanning network ports, checking the technologies in use, but also running potential exploits and vulnerability scanners. Today we will look at one tool that can help us automate our flow. We are talking about afrog.
Afrog in action
We will skip all the configuration or installation steps because they are too simple to discuss. Instead, let's get straight to …
bounty bug bug bounty explained exploits flow hackathon hacktoberfest hacktoberfest23 hunter hunters network normal pentester ports running scanners scanning talking technologies today tool vulnerability vulnerability scanners webdev work working