$1000–$25k worth API Bug Attack & Chaining StrategiesPractical API bug chaining tips & tricks in Bug Bounties4h ago4h ago
Published inInfoSec Write-ups$100-$20k worth Stored XSS Vulnerability | Hidden MethodsHidden Methods to bypass restriction to find Stored XSS in Bug Bounties19h ago19h ago
Published inInfoSec Write-ups$500-$20k worth GraphQL Vulnerabilities | Advanced Tips & TricksAdvanced Practical Tips & Tricks to find GraphQL Vulnerability in Bug Bounties1d ago1d ago
Published inInfoSec Write-ups$100-$20k worth Account Takeover Vulnerability | Hidden Practical StepsHidden methods to find Account Takeover Vulnerability in Bug Bounties2d ago2d ago
Published inInfoSec Write-ups$100-$5000 worth LFI Vulnerability | Advanced Tips and TricksPractical & Expert Techniques, Tips and Tricks to find Local File Inclusion (LFI)2d ago2d ago
Published inInfoSec Write-ups$100-$5000 worth File Upload Vulnerability | Advanced TechniquesHidden and Advanced Techniques to bypass File Upload Restrictions3d ago3d ago
Published inInfoSec Write-ups$1000-$10k worth Leaks via Github Secret DorksDive into some Expert Techniques to access Sensitive Leaks/tokens/passwords/files/codes in Github Repositories3d ago3d ago
Published inInfoSec Write-ups$100-$200 worth 403 Bypass TechniquesPractical, Advanced and Real-world based Techniques to Bypass 403 Forbidden4d ago14d ago1
$100 worth Rate Limit Bypass Bug |Advanced Tricks & TipsHidden/Secret Tips and Tricks to Bypass Rate Limiting5d ago5d ago
$50-$500 worth Information Disclosure Bug AutomationUncover Hidden/Secret methods to find Sensitive Information Disclosures5d ago5d ago
Published inInfoSec Write-ups$100 worth Open Redirect AutomationFrom Hall of Fame to $$$ Bounty Automation Techniques for Open Redirect Bug6d ago6d ago
Published inCyber Security Write-ups$50-$100 P5 & P4 Bug Automation with NucleiPractical Tips to Automate P5/P4 Bugs using NucleiFeb 19Feb 19
Published inInfoSec Write-upsEver Found a Valid Bug/Leaks in JavaScript Files in Bug Bounties?Common Mistakes and Practical Techniques to Tackle them to Find Valid Bugs/Leaks in JS FilesFeb 18Feb 18
Published inSystem WeaknessEver Found a Valid Bug/Leaks in JavaScript Files? Part 1Practical Techniques to Increase your Chances of Finding Valid Bug/Leaks in Javascript FilesFeb 18Feb 18
Published inInfoSec Write-ups$50–$200 Low Hanging Bugs/Fruit Automation | Bug Automation Part 1Practical Techniques, Tips and Tricks to Find Low Hanging BugsFeb 17Feb 17
Steal Secrets From The Web: Master Parameter Fuzzing | Recon Part 9Methods to parse hidden/secret parameters from the targetFeb 17Feb 17
Published inInfoSec Write-upsURL Discovery: Hunt Where Others Aren’t Hunting | Recon Part 8Maximize your attack surface in Bug Bounties via Link/URL Discovery | Filtering | PrioritizationFeb 16Feb 16
Published inCyber Security Write-upsDiscover Secret/Hidden Directories & Content | Recon Part 7Content/API/Parameters Discovery | Path Fuzzing | Directory Brute ForcingFeb 12Feb 12
Published inInfoSec Write-upsHow to Uncover Hidden Attack Surfaces? Recon part 6Probing | IP Resolution | Port ScanningFeb 9Feb 9
Published inOSINT TeamDo You Struggle Finding Internal/Hidden Subdomains? Recon part 5Recon for internal & secret subdomainsFeb 7Feb 7