Published inInfoSec Write-upsTop Tools That Helped Me Earn $500 in 30 DaysHow I used these tools & commands to find bugs fast19h ago19h ago
Published inInfoSec Write-ups7 Recon Tricks Made Me Earn $$$ BountyFind your first bug by performing recon by common but in an unusual ways6d ago26d ago2
Published inInfoSec Write-ups$1000+ Passive Recon Strategy You’re Not Using (Yet)Still using subfinder & sublist3r tools for finding assets while recon??May 1May 1
Published inInfoSec Write-ups$10,000 worth GitHub Access Tokens | Secret Search OperatorsSecret but basic GitHub dorks & search operators that can lead to $10k bounty worth Acess Tokens.Apr 13Apr 13
Published inInfoSec Write-ups$500-$10k worth Path Traversal | Advanced MethodologyAdvanced Path Traversal methodology for intermediate & advanced level bug huntersApr 101Apr 101
Published inInfoSec Write-ups$100-$1000 Worth Subdomain Takeover | Easy Bounty MethodologyPractical & Step-by-Step guide to find Subdomain Takeover VulnerabilityApr 92Apr 92
Published inInfoSec Write-upsHow AI Helped Me to Bypass 403 — ForbiddenGuide on how you can use AI to move a step ahead in bug bounty raceApr 72Apr 72
Published inInfoSec Write-upsDevelopers Mistake Leads to Bountiesss$$$…How the simple mistakes of developer can lead to multiple vulnerabilities and bountiesApr 3Apr 3
Published inInfoSec Write-upsOTP Bypass Bug in Public Bug Bounty ProgramPOC of the report submitted for OTP Bypass bugMar 72Mar 72
Published inInfoSec Write-ups$50-$100 worth Sensitive Leaks via Google Dorks | Part 2Part 2: Learn practical and hidden dorks to target sensitive bounty earning leaks and sensitive files.Mar 51Mar 51