Published inSystem WeaknessEver Found a Valid Bug/Leaks in JavaScript Files? Part 1Practical Techniques to Increase your Chances of Finding Valid Bug/Leaks in Javascript Files4h ago4h ago
$50–$200 Low Hanging Bugs/Fruit Automation | Bug Automation Part 1Practical Techniques, Tips and Tricks to Find Low Hanging Bugs17h ago17h ago
Steal Secrets From The Web: Master Parameter Fuzzing | Recon Part 9Methods to parse hidden/secret parameters from the target1d ago1d ago
Published inInfoSec Write-upsURL Discovery: Hunt Where Others Aren’t Hunting | Recon Part 8Maximize your attack surface in Bug Bounties via Link/URL Discovery | Filtering | Prioritization1d ago1d ago
Published inCyber Security Write-upsDiscover Secret/Hidden Directories & Content | Recon Part 7Content/API/Parameters Discovery | Path Fuzzing | Directory Brute Forcing5d ago5d ago
Published inOSINT TeamDo You Struggle Finding Internal/Hidden Subdomains? Recon part 5Recon for internal & secret subdomainsFeb 7Feb 7
Published inSystem Weakness💰 $200 Easy Bounty: Improper Rate Limiting ExploitHi geeks, it4chis3c (Twitter) came-up with the write-up on Improper Rate Limiting Vulnerability found on one of the target’s internal login…Feb 62Feb 62
Published inSystem Weakness⚡Critical XSS in DeepSeek AIHey guys! 👋 In today’s brief write-up, I’ll walk you through a critical reflected XSS vulnerability discovered in the newly launched…Feb 31Feb 31
Published inSystem WeaknessHow to Create Advanced Custom Wordlist? Dive into Recon Part 4Hi geeks, it4chis3c (Twitter) came-up with another bounty earning write-up in the Bug Bounty Hunting Series:Feb 1Feb 1