Articles

Hostile subdomain takeover by Detectify
Hijacking of abandoned subdomains by Detectify

Tools

dnsexpire by me
3rdparty-services by me

Bug Bounty Cons

This article is the following of the previous one (obviously...) about [why I love bug bounty](http://10degres.net/why-bugbounty/).Howeve...… Continue reading

« Pentest - Exploitation tools

Published on November 04, 2014