Hostile subdomain takeover by Detectify
Hijacking of abandoned subdomains by Detectify


dnsexpire by me
3rdparty-services by me

Colorize your hunt

As a full time bug bounty hunter, it's important to use the tools you are confortable with, sometimes a small improvement can change your...… Continue reading

« Pentest - Exploitation tools

Published on November 04, 2014