danielmiessler.com
Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2025-08-14.
| Date Added | Resource | Excerpt |
|---|---|---|
| 2025-08-14 2025 | A ffuf Primer | Daniel MiesslerBug Bounty | The content seems to be a primer on the tool "ffuf" by Daniel Miessler. It likely introduces readers to the basics of using ffuf, a versatile web fuzzer commonly used for web application security testing. The primer may cover how to install and utilize ffuf effectively for tasks such as discovering hidden files or directories, identifying vulnerabilities, and conducting comprehensive web scans. Daniel Miessler, a well-known cybersecurity expert, is likely the author of this primer, providing valuable insights and guidance on leveraging ffuf for security testing purposes. |
| 2025-08-14 2025 | amass — Automated Attack Surface Mapping | Daniel MiesslerBug Bounty | The content appears to be a brief mention of "amass" by Daniel Miessler, a tool for Automated Attack Surface Mapping. It seems to be a tool or project related to cybersecurity and mapping out potential vulnerabilities in a system or network. The summary lacks specific details or insights about the tool's features or functionality. |
| 2023-05-18 2023 | The AI Attack Surface Map v1.0AI | The AI Attack Surface Map v1.0 https://ift.tt/vF7joPm |
| 2022-01-10 2022 | A @TomNomNom Recon Tools PrimerRecon | A @TomNomNom Recon Tools Primer |
| 2021-02-16 2021 | A ffuf Primer | Daniel MiesslerBug Bounty | ffuf is a web attack tool written in Go, known as "fuzz faster you fool!". It operates through the command line interface (CLI) and is likened to Burp Intruder by experienced web testers. |
| 2019-11-12 2019 | amass — Automated Attack Surface Mapping | Daniel MiesslerBug Bounty | The content discusses amass, an automated attack surface mapping tool, providing a tutorial on its functionality and real-world examples for common OSINT (Open Source Intelligence) scenarios. The tutorial likely covers how to use amass to gather information about potential attack surfaces and demonstrates its practical application in cybersecurity investigations. |