JAWPHT Blog | Security

Learn how to use Google Dorking, also known as Google Hacking, to retrieve sensitive information from Google and other popular search engines.

| Ethan Leitner - Partner, Security Specialist

Google Dorking: Advanced Search Techniques for Security Researchers

Learn how to use Google Dorking, also known as Google Hacking, to retrieve sensitive information from Google and other popular sea

A look into how charging more for single sign on makes products less secure and hurts users.

| Curtis Ward - Partner, Development Specialist

The SSO Tax

A look into how charging more for single sign on makes products less secure and hurts users.

A primer on custom templates, rate limiting and more with the Nuclei vulnerability scanner

| Ethan Leitner - Partner, Security Specialist

Getting Started with Nuclei

A primer on custom templates, rate limiting and more with the Nuclei vulnerability scanner

An overview of the Nmap port scanning utility

| Ethan Leitner - Partner, Security Specialist

A Practical Guide to Nmap

An overview of the Nmap port scanning utility

© JAWPHT LLC 2025 All Rights Reserved. Made with in Philadelphia