InInfoSec Write-upsbycoffinxpUnlock the Full Potential of the Wayback Machine for Bug BountyTurn Archives into $Bounties$Jan 2618Jan 2618
InSystem Weaknessbyhacker_mightMastering Internet Scanning: How to Use ZMap and Censys for Ethical Hacking — Part 1If you’ve ever wanted to scan the entire internet but stopped short because ‘ending up on a watchlist’ wasn’t part of the plan, this guide…Dec 8, 2024Dec 8, 2024
InInfoSec Write-upsbycoffinxpS3 Bucket Recon: Finding Exposed AWS Buckets Like a Pro!From Discovery to Exploitation: A Complete Guide to S3 Bucket Recon6d ago76d ago7
Rishav anandLearn Cloud Pentesting (Roadmap) and earn in $100,000—$150,000Cloud Penetration Testing (or Cloud Pentesting) involves testing the security of cloud environments, infrastructure, applications, and…Oct 25, 20247Oct 25, 20247
InInfoSec Write-upsbyOm ManiyaWhatsApp lets you execute Python, PHP scripts with no warningDisclaimer : The information provided in this article is just for an educational and informational purposes only. The intent behind…Aug 12, 20244Aug 12, 20244
Sugam DangalInformation Disclosure that made me $2000 in under 5 minutesOn May 15 2024 , It was 3 am while i was trying to fall asleep but i couldn’t. A random thought came into my mind that i should try…Jul 19, 202410Jul 19, 202410
InSystem WeaknessbyImad Husanovic3 easiest bugs that you can find right now [guarantied]May 3, 20246May 3, 20246
InInfoSec Write-upsbyOtt3rlyMass Hunting for Leaked Sensitive Documents For Big BountiesDiscover how it is possible to massively hunt for leaked sensitive documents.Dec 11, 20233Dec 11, 20233
ThexssratUnveiling the OWASP Top 10 of 2021: A Comprehensive Guide to Web Application SecurityDive into the latest OWASP Top 10 list and discover how to protect your web applications against the most critical threats.Mar 23, 2023Mar 23, 2023
InStackademicbyVivek GhinaiyaHunting JavaScript File for Bug HuntersHello Everyone,Mar 19, 20246Mar 19, 20246
Foxx C-BHow to get started in Bug Bounty in 2024!A list of all my current favorite educational resources for Bug Bounty!Mar 24, 2024Mar 24, 2024
InInfoSec Write-upsbyOtt3rlyChatGPT for Bug Bounty: Top Prompts for AutomationTop-tier Security Researchers are actively adopting ChatGPT in Cybersecurity. Let’s explore the most common ChatGPT prompts for Bug Bounty.Oct 25, 20232Oct 25, 20232
The WhiteHat PantherMy journey to become “Certified Bug Bounty Hunter” by Hack The BoxHi there! I’m Josue. And I’m more than glad to tell you about my journey on passing this cert in my first attempt.Mar 2, 2023Mar 2, 2023
|Reinhardt|[TOOL GUIDE] Bypass-http a python tool to find 403 & 401 bypassLink to the Github repo : hereFeb 28, 2024Feb 28, 2024
Siva SankarHow I Bypassed the Admin Login on the Government Website?Hello there 👋Sep 17, 20237Sep 17, 20237
heigeDetermine the device model affected by CVE-2019–16920 by ZoomEyeby Heige(a.k.a Superhei) of KnownSec 404 Team 10/09/2019Oct 9, 2019Oct 9, 2019
biero llagasHunt and bruteforce PLC: SIMENS LOGO!Hello everyone, here we are for a new article on the subject of asset research and a hypothetical bruteforce campaign for honeypot…Sep 30, 2023Sep 30, 2023