Published inInfoSec Write-ups$$ Mass Hunting with FOFA DorkingFew crucial dorks to discover potential leaks to earn $$4d agoA response icon24d agoA response icon2
Published inInfoSec Write-upsShodan Dorks to Find PII Data & LeaksShodan dorks to find publicly exposed PII data of your targetJun 4A response icon2Jun 4A response icon2
Published inInfoSec Write-upsTop File Read Bug POCs that made $20000Learning & Methodology to find File Read from top 5 POCs by Elite hackersJun 3A response icon2Jun 3A response icon2
Published inInfoSec Write-upsTop XSS POCs that made $50000Learning & Methodology to find XSS from top 5 POCs by Elite hackersJun 2A response icon3Jun 2A response icon3
Published inInfoSec Write-upsFrom Zero to $1000/Month | Bug Bounty Automation BlueprintProven Tactics, Tools, and Code to Automate Your Way to Consistent BountiesMay 22A response icon5May 22A response icon5
Published inInfoSec Write-upsTop Tools That Helped Me Earn $500 in 30 DaysHow I used these tools & commands to find bugs fastMay 15May 15
Published inInfoSec Write-ups7 Recon Tricks Made Me Earn $$$ BountyFind your first bug by performing recon by common but in an unusual waysMay 9A response icon3May 9A response icon3
Published inInfoSec Write-ups$1000+ Passive Recon Strategy You’re Not Using (Yet)Still using subfinder & sublist3r tools for finding assets while recon??May 1May 1
Published inInfoSec Write-ups$10,000 worth GitHub Access Tokens | Secret Search OperatorsSecret but basic GitHub dorks & search operators that can lead to $10k bounty worth Acess Tokens.Apr 13Apr 13
Published inInfoSec Write-ups$500-$10k worth Path Traversal | Advanced MethodologyAdvanced Path Traversal methodology for intermediate & advanced level bug huntersApr 10A response icon1Apr 10A response icon1