Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
DigiNinja
digi.ninja
DNS reconnaissance against wildcard domains
digi.ninja
·
49w
Abusing a DDNS service to find IP cameras around the world.
digi.ninja
·
49w
A companion tool to Pipal which can spot keyboard patterns in password lists.
digi.ninja
·
49w
How I'm going to spend my share of the 25,000 euro BruCON 5x5 cash.
digi.ninja
·
49w
Enumerating shares on the SpiderOak network.
digi.ninja
·
49w
A simple script to create files containing binary data.
digi.ninja
·
49w
Using Google Analytics tracking codes to find relationships between domains.
digi.ninja
·
49w
An idea for a report writing competition
digi.ninja
·
49w
A proof of concept application which takes observed key presses and generates a list of potential passwords.
digi.ninja
·
49w
A WebSocket based application which goes along side the blog post on ZAP and WebSockets.
digi.ninja
·
49w
Version 5.0 of CeWL adds proxy and basic/digest authentication support along with a few small bug fixes.
digi.ninja
·
49w
I recently decided it was time to learn how to test WebSockets and so decided to take the opportunity to learn a bit about how ZAP works. This two part blog pos...
digi.ninja
·
49w
Integrating GNS3 and VirtualBox - This is the first part of a series integrating GNS3 and VirtualBox to build a lab to play with layer 2 attacks
digi.ninja
·
49w
Sitemap2Proxy takes the sitemap published by a web app and requests each page through your specified proxy. This release adds response code stats to the output.
digi.ninja
·
49w
Building a lab with ModSecurity and DVWA.
digi.ninja
·
49w
The second part of my introduction to using ZAP to test WebSockets, this part focuses on fuzzing.
digi.ninja
·
49w
Pipal now has a modular structure allowing you to write your own Checkers and Splitters, this is a brief introduction to how they both work.
digi.ninja
·
49w
Extract meta data from videos taken on iPhones.
digi.ninja
·
49w
Adding VLANs to the GNS3/VirtualBox Lab
digi.ninja
·
49w
Do you include steps to reproduce vulnerabilities in your security reports? In this post I think about how to do this.
digi.ninja
·
49w
« Page 3
·
Page 5 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help