Published inInfoSec Write-upsExtract — Load — Upload | A $20000 File Read Bug POC MethodologyVisual & Practical Breakdown of one of the highest paid arbitrary file read vulnerability POCSep 13A response icon6Sep 13A response icon6
Published inInfoSec Write-upsExtract — Grep — Curl | A $50000 Bug POC MethodologyMethodology from one of the highest earned bountiesJul 22A response icon9Jul 22A response icon9
Published inInfoSec Write-upsFuzzing Techniques for Maximum Bug Bounty Impact — ffufai ToolEarn small bounties $$ using advanced chaining tricks with ffufai toolJul 12Jul 12
$$ Mass Hunting with FOFA DorkingFew crucial dorks to discover potential leaks to earn $$Jun 16A response icon2Jun 16A response icon2
Published inInfoSec Write-upsShodan Dorks to Find PII Data & LeaksShodan dorks to find publicly exposed PII data of your targetJun 4Jun 4
Published inInfoSec Write-upsTop File Read Bug POCs that made $20000Learning & Methodology to find File Read from top 5 POCs by Elite hackersJun 3A response icon3Jun 3A response icon3
Published inInfoSec Write-upsTop XSS POCs that made $50000Learning & Methodology to find XSS from top 5 POCs by Elite hackersJun 2A response icon5Jun 2A response icon5
Published inInfoSec Write-upsFrom Zero to $1000/Month | Bug Bounty Automation BlueprintProven Tactics, Tools, and Code to Automate Your Way to Consistent BountiesMay 22A response icon6May 22A response icon6
Published inInfoSec Write-upsTop Tools That Helped Me Earn $500 in 30 DaysHow I used these tools & commands to find bugs fastMay 15May 15
Published inInfoSec Write-ups7 Recon Tricks Made Me Earn $$$ BountyFind your first bug by performing recon by common but in an unusual waysMay 9A response icon3May 9A response icon3