appsec.fyi · Sources

danielmiessler.com

6 curated AppSec resources from danielmiessler.com across 3 topics on appsec.fyi.

danielmiessler.com

Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2025-08-14.

Date Added Resource Excerpt
2025-08-14 2025A ffuf Primer | Daniel MiesslerBug BountyThe content seems to be a primer on the tool "ffuf" by Daniel Miessler. It likely introduces readers to the basics of using ffuf, a versatile web fuzzer commonly used for web application security testing. The primer may cover how to install and utilize ffuf effectively for tasks such as discovering hidden files or directories, identifying vulnerabilities, and conducting comprehensive web scans. Daniel Miessler, a well-known cybersecurity expert, is likely the author of this primer, providing valuable insights and guidance on leveraging ffuf for security testing purposes.
2025-08-14 2025amass — Automated Attack Surface Mapping | Daniel MiesslerBug BountyThe content appears to be a brief mention of "amass" by Daniel Miessler, a tool for Automated Attack Surface Mapping. It seems to be a tool or project related to cybersecurity and mapping out potential vulnerabilities in a system or network. The summary lacks specific details or insights about the tool's features or functionality.
2023-05-18 2023The AI Attack Surface Map v1.0AIThe AI Attack Surface Map v1.0 https://ift.tt/vF7joPm
2022-01-10 2022A @TomNomNom Recon Tools PrimerReconA @TomNomNom Recon Tools Primer
2021-02-16 2021A ffuf Primer | Daniel MiesslerBug Bountyffuf is a web attack tool written in Go, known as "fuzz faster you fool!". It operates through the command line interface (CLI) and is likened to Burp Intruder by experienced web testers.
2019-11-12 2019amass — Automated Attack Surface Mapping | Daniel MiesslerBug BountyThe content discusses amass, an automated attack surface mapping tool, providing a tutorial on its functionality and real-world examples for common OSINT (Open Source Intelligence) scenarios. The tutorial likely covers how to use amass to gather information about potential attack surfaces and demonstrates its practical application in cybersecurity investigations.