Gianni joined SecurityTrails in 2020 and brings over 20 years of infosec experience to his work as a technical writer and security researcher. He’s always ready to share his learnings as a purple team member and insights from having helped various Fortune 500 companies' cybersecurity teams. His comprehensive understanding of IT systems, (from integration and administration, to software development and automation) gives him a refreshing perspective that is always valued.
His commitment to cybersecurity is also evident as an adjunct instructor at the University of Central Florida. His courses on cryptography and Linux security show future security professionals how their studies are applicable in the real world.
nmapAutomator: Automating your Nmap Enumeration and Reconnaissance
Learn about nmapAutomator, what it is, how it works, and why it’s essential for your Nmap automation during enumeration and recon research.
JA3 Fingerprinting: Functionality, Pitfalls, and Future Outlook
Learn about JA3 fingerprinting, functionality, pitfalls, and future outlook.
Kerberoasting Attacks Explained: Definition, How They Work and Mitigation Techniques
Learn what are Kerberoasting Attacks, the concept, how these attacks work, and how preventive measures.
Internet Scanning: Definition, Benefits, Brief History and Tools
Learn about what is Internet Scanning, benefits and implications of these scans, as well as popular internet scanning tools.
How to Boost Your Bug Bounty Hunting with SQL Explorer
Learn how to use SQL explorer to boost your bug bounty hunting tasks.
How to Find Associated Domains and IP Neighbors with the SecurityTrails API™
Learn how to find associated domains and IP neighbors for bug bounty hunting with the SecurityTrails API™
Host Discovery Tips for Bug Bounty Hunters with the SecurityTrails API
Learn how to perform a fast host discovery with the SecurityTrails API for intel reconnaissance and bug bounty hunting purposes.
Axiom: A Distributed Hacking Framework for Pentesters and Red Teamers
Explore Axiom, a single, dynamic cloud infrastructure framework designed for red teamers and bug hunters alike.
Residential Proxies: Types, Usage and Dangers in Cybersecurity
Learn what is a residential proxy, common usage, dangers, and types of residential proxies.