@angryyardie1284

Another way this could be done, in particular with repositories with larger numbers of commits is to make use of git bisect. Using git bisect, you can binary search your way to find the commit that you're looking for by setting the start to the first commit and the end as the HEAD. With that, you can create a script that returns say 1 when no secret is found and 0 when it is found and terminate your search the first time your script returns 0

@arnoeagleeyes

Wow, i am learning so much stuff from this series that i can use in my daily work as a programmer. Thank you for that.

@qwltr

Found this channel recently - extremely good content, keep going.

@devKazuto

That's why it's a good idea to squash your pull/merge requests. As long as a secret is not merged in a branch the history of adding and removing a secret will be lost.

@bakaryk2435

Thanks for sharing John! especially the first method with bash

@MrHasooooni

your channel is just an awesome learning journey by itslef man keep up the good work much love <3

@dustinhxc

That was amazing! I was curious how to do the GIT bug bounties. Obviously won’t find anything, but good to see in action. Thank you!

@tbrew5265

🤝 firm handshakes, John. I appreciate your guidance and wisdom.

@inx1819

9:40 im curious is there any vulnerability here or is it just a random piece of code

@dom1310df

FYI PyPI is pronounced pie-pee-eye, to avoid confusion with PyPy (the JIT version of Python)

@rajeshsagar3912

great explanation, thank you

@antonpetrov145

I am curious what can you do with the pypi password?

@Sushantsingh097

loved your all videos

@jpineda79

hi John, make a setup tutorial for Kali Purple please and your thoughts of it.

@debrabest5035

THANK YOU SO MUCH!!!!!!! INTERESTING, AND INFORMATIVE!!!!!!! AGAIN, THANK YOU, AND, BE BLESSED❤️🙏

@energy-tunes

Please more of this

@ejonesss

couldnt you just download all the commits as separate text files and do a search for the string on all the files?

@declanmcardle

@13:27 grep -Ev 'pattern1|pattern2' instead of grep -v | grep -v | grep -v ...

@mr.unforgettable

Hey John, very recently I have seen a new method of YouTube scam for cracked software which involves AI. Perhaps you should investigate this whether it is using the same info stealer malware or whether it is some mutated or new type. I was made aware of this by a muthahar which droped today.

@bronxandbrenx

Thank you master John