@arnoeagleeyes

Wow, i am learning so much stuff from this series that i can use in my daily work as a programmer. Thank you for that.

@angryyardie1284

Another way this could be done, in particular with repositories with larger numbers of commits is to make use of git bisect. Using git bisect, you can binary search your way to find the commit that you're looking for by setting the start to the first commit and the end as the HEAD. With that, you can create a script that returns say 1 when no secret is found and 0 when it is found and terminate your search the first time your script returns 0

@qwltr

Found this channel recently - extremely good content, keep going.

@bakaryk2435

Thanks for sharing John! especially the first method with bash

@devKazuto

That's why it's a good idea to squash your pull/merge requests. As long as a secret is not merged in a branch the history of adding and removing a secret will be lost.

@MrHasooooni

your channel is just an awesome learning journey by itslef man keep up the good work much love <3

@inx1819

9:40 im curious is there any vulnerability here or is it just a random piece of code

@dustinhxc

That was amazing! I was curious how to do the GIT bug bounties. Obviously won’t find anything, but good to see in action. Thank you!

@rajeshsagar3912

great explanation, thank you

@tbrew5265

🤝 firm handshakes, John. I appreciate your guidance and wisdom.

@antonpetrov145

I am curious what can you do with the pypi password?

@energy-tunes

Please more of this

@declanmcardle

@13:27 grep -Ev 'pattern1|pattern2' instead of grep -v | grep -v | grep -v ...

@debrabest5035

THANK YOU SO MUCH!!!!!!! INTERESTING, AND INFORMATIVE!!!!!!! AGAIN, THANK YOU, AND, BE BLESSED❤️🙏

@Sushantsingh097

loved your all videos

@jpineda79

hi John, make a setup tutorial for Kali Purple please and your thoughts of it.

@bronxandbrenx

Thank you master John

@dom1310df

FYI PyPI is pronounced pie-pee-eye, to avoid confusion with PyPy (the JIT version of Python)

@vipuldawar88

How do fix the git history in such cases? What are steps to prevent such attacks?

@mr.unforgettable

Hey John, very recently I have seen a new method of YouTube scam for cracked software which involves AI. Perhaps you should investigate this whether it is using the same info stealer malware or whether it is some mutated or new type. I was made aware of this by a muthahar which droped today.