Published inInfoSec Write-ups7 Recon Tricks Made Me Earn $$$ BountyFind your first bug by performing recon by common but in an unusual ways2d ago22d ago2
Published inInfoSec Write-ups$1000+ Passive Recon Strategy You’re Not Using (Yet)Still using subfinder & sublist3r tools for finding assets while recon??May 1May 1
Published inInfoSec Write-ups$10,000 worth GitHub Access Tokens | Secret Search OperatorsSecret but basic GitHub dorks & search operators that can lead to $10k bounty worth Acess Tokens.Apr 13Apr 13
Published inInfoSec Write-ups$500-$10k worth Path Traversal | Advanced MethodologyAdvanced Path Traversal methodology for intermediate & advanced level bug huntersApr 101Apr 101
Published inInfoSec Write-ups$100-$1000 Worth Subdomain Takeover | Easy Bounty MethodologyPractical & Step-by-Step guide to find Subdomain Takeover VulnerabilityApr 92Apr 92
How AI Helped Me to Bypass 403 — ForbiddenGuide on how you can use AI to move a step ahead in bug bounty raceApr 72Apr 72
Developers Mistake Leads to Bountiesss$$$…How the simple mistakes of developer can lead to multiple vulnerabilities and bountiesApr 3Apr 3
OTP Bypass Bug in Public Bug Bounty ProgramPOC of the report submitted for OTP Bypass bugMar 72Mar 72
$50-$100 worth Sensitive Leaks via Google Dorks | Part 2Part 2: Learn practical and hidden dorks to target sensitive bounty earning leaks and sensitive files.Mar 51Mar 51
$50-$100 worth Sensitive Leaks via Google Dorks | Part 1Learn practical and hidden dorks to target sensitive bounty earning leaks and sensitive files.Mar 4Mar 4