Disruptive Labs
Blog
About
Stories
Talks
Training
Talks
Mantis - Asset Discovery at Scale
Breaking iOS Security Testing Barrier
FRida Unleashed - Scratching beneath the surface of bug bounties
An attacker’s guide to AWS Access Keys
Intro to Browser security policies/features
Practical recon techniques for bug hunters & pen testers
Understanding Windows Management Instrumentation(WMI)
Doing recon like it's 2017
Esoteric sub-domain enumeration techniques
DNS for penetration testers
IPv6 for penetration testers
IoT exploitation