Open in app

Sign in

Write

Sign in

It4chis3c
It4chis3c

1.2K followers

Home

Lists

About

InfoSec Write-ups

Published in

InfoSec Write-ups

Top Tools That Helped Me Earn $500 in 30 Days

How I used these tools & commands to find bugs fast

19h ago
Top Tools That Helped Me Earn $500 in 30 Days
Top Tools That Helped Me Earn $500 in 30 Days
19h ago
InfoSec Write-ups

Published in

InfoSec Write-ups

7 Recon Tricks Made Me Earn $$$ Bounty

Find your first bug by performing recon by common but in an unusual ways

6d ago
2
7 Recon Tricks Made Me Earn $$$ Bounty
7 Recon Tricks Made Me Earn $$$ Bounty
6d ago
2
InfoSec Write-ups

Published in

InfoSec Write-ups

$1000+ Passive Recon Strategy You’re Not Using (Yet)

Still using subfinder & sublist3r tools for finding assets while recon??

May 1
$1000+ Passive Recon Strategy You’re Not Using (Yet)
$1000+ Passive Recon Strategy You’re Not Using (Yet)
May 1
InfoSec Write-ups

Published in

InfoSec Write-ups

$10,000 worth GitHub Access Tokens | Secret Search Operators

Secret but basic GitHub dorks & search operators that can lead to $10k bounty worth Acess Tokens.

Apr 13
$10,000 worth GitHub Access Tokens | Secret Search Operators
$10,000 worth GitHub Access Tokens | Secret Search Operators
Apr 13
InfoSec Write-ups

Published in

InfoSec Write-ups

$500-$10k worth Path Traversal | Advanced Methodology

Advanced Path Traversal methodology for intermediate & advanced level bug hunters

Apr 10
1
$500-$10k worth Path Traversal | Advanced Methodology
$500-$10k worth Path Traversal | Advanced Methodology
Apr 10
1
InfoSec Write-ups

Published in

InfoSec Write-ups

$100-$1000 Worth Subdomain Takeover | Easy Bounty Methodology

Practical & Step-by-Step guide to find Subdomain Takeover Vulnerability

Apr 9
2
$100-$1000 Worth Subdomain Takeover | Easy Bounty Methodology
$100-$1000 Worth Subdomain Takeover | Easy Bounty Methodology
Apr 9
2
InfoSec Write-ups

Published in

InfoSec Write-ups

How AI Helped Me to Bypass 403 — Forbidden

Guide on how you can use AI to move a step ahead in bug bounty race

Apr 7
2
How AI Helped Me to Bypass 403 — Forbidden
How AI Helped Me to Bypass 403 — Forbidden
Apr 7
2
InfoSec Write-ups

Published in

InfoSec Write-ups

Developers Mistake Leads to Bountiesss$$$…

How the simple mistakes of developer can lead to multiple vulnerabilities and bounties

Apr 3
Developers Mistake Leads to Bountiesss$$$…
Developers Mistake Leads to Bountiesss$$$…
Apr 3
InfoSec Write-ups

Published in

InfoSec Write-ups

OTP Bypass Bug in Public Bug Bounty Program

POC of the report submitted for OTP Bypass bug

Mar 7
2
OTP Bypass Bug in Public Bug Bounty Program
OTP Bypass Bug in Public Bug Bounty Program
Mar 7
2
InfoSec Write-ups

Published in

InfoSec Write-ups

$50-$100 worth Sensitive Leaks via Google Dorks | Part 2

Part 2: Learn practical and hidden dorks to target sensitive bounty earning leaks and sensitive files.

Mar 5
1
$50-$100 worth Sensitive Leaks via Google Dorks | Part 2
$50-$100 worth Sensitive Leaks via Google Dorks | Part 2
Mar 5
1
It4chis3c

It4chis3c

1.2K followers

Security Researcher | Bug Bounties | Tips & Tricks

Following
  • The Startup

    The Startup

  • Iski

    Iski

  • Abhijeet Kumawat

    Abhijeet Kumawat

  • AbhirupKonwar

    AbhirupKonwar

  • Aman Sharma

    Aman Sharma

See all (21)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech