It4chis3c$100-$200 worth 403 Bypass TechniquesPractical, Advanced and Real-world based Techniques to Bypass 403 Forbidden18h ago18h ago
It4chis3c$100 worth Rate Limit Bypass Bug |Advanced Tricks & TipsHidden/Secret Tips and Tricks to Bypass Rate Limiting1d ago1d ago
It4chis3c$50-$500 worth Information Disclosure Bug AutomationUncover Hidden/Secret methods to find Sensitive Information Disclosures2d ago2d ago
InInfoSec Write-upsbyIt4chis3c$100 worth Open Redirect AutomationFrom Hall of Fame to $$$ Bounty Automation Techniques for Open Redirect Bug2d ago2d ago
InSystem WeaknessbyIt4chis3cBug Bounty Unlocked: Secrets, Strategies, and Mindset Hacks for SuccessHey geeks, it4chis3c (Twitter) comes up with another write-up in my Bug Bounty Hunting Series:Jan 16Jan 16
InCyber Security Write-upsbyIt4chis3c$50-$100 P5 & P4 Bug Automation with NucleiPractical Tips to Automate P5/P4 Bugs using Nuclei3d ago3d ago
InInfoSec Write-upsbyIt4chis3cEver Found a Valid Bug/Leaks in JavaScript Files in Bug Bounties?Common Mistakes and Practical Techniques to Tackle them to Find Valid Bugs/Leaks in JS Files4d ago4d ago
InSystem WeaknessbyIt4chis3cEver Found a Valid Bug/Leaks in JavaScript Files? Part 1Practical Techniques to Increase your Chances of Finding Valid Bug/Leaks in Javascript Files5d ago5d ago
InInfoSec Write-upsbyIt4chis3c$50–$200 Low Hanging Bugs/Fruit Automation | Bug Automation Part 1Practical Techniques, Tips and Tricks to Find Low Hanging Bugs5d ago5d ago
It4chis3cSteal Secrets From The Web: Master Parameter Fuzzing | Recon Part 9Methods to parse hidden/secret parameters from the target6d ago6d ago
It4chis3cURL Discovery: Hunt Where Others Aren’t Hunting | Recon Part 8Maximize your attack surface in Bug Bounties via Link/URL Discovery | Filtering | Prioritization6d ago6d ago
InCyber Security Write-upsbyIt4chis3cDiscover Secret/Hidden Directories & Content | Recon Part 7Content/API/Parameters Discovery | Path Fuzzing | Directory Brute ForcingFeb 12Feb 12
InInfoSec Write-upsbyIt4chis3cHow to Uncover Hidden Attack Surfaces? Recon part 6Probing | IP Resolution | Port ScanningFeb 9Feb 9
InOSINT TeambyIt4chis3cDo You Struggle Finding Internal/Hidden Subdomains? Recon part 5Recon for internal & secret subdomainsFeb 7Feb 7
InSystem WeaknessbyIt4chis3cHow to Create Advanced Custom Wordlist? Dive into Recon Part 4Hi geeks, it4chis3c (Twitter) came-up with another bounty earning write-up in the Bug Bounty Hunting Series:Feb 1Feb 1
InSystem WeaknessbyIt4chis3cHow to Find More Subdomains for Bug Bounties? Dive into Recon part 3Hi geeks, it4chis3c (Twitter) came-up with another bounty earning write-up in the Bug Bounty Hunting Series:Jan 29Jan 29
InOSINT TeambyIt4chis3cDon’t know how to find Bounty Earning Assets? Let’s Dive Deep into Recon part 2Hi geeks, it4chis3c (Twitter) came-up with another bounty earning write-up in the Bug Bounty Hunting Series:Jan 28Jan 28
InOSINT TeambyIt4chis3cReconnaissance — Finding Apex/Root DomainsHi geeks, it4chis3c (Twitter) back again with another write-up in my Bug Bounty Hunting series.Jan 201Jan 201
InOSINT TeambyIt4chis3cChoosing Your First Program in Bug Bounties: A Beginner’s GuideHey geeks, it4chis3c (Twitter) comes up with another write-up in my Bug Bounty Hunting Series:Jan 19Jan 19
It4chis3cCrack the Code — Part 2Hi geeks, it4chis3c (Twitter) back again with another write-up in the BBH Series:Jan 13Jan 13