PinnedPublished inInfoSec Write-upsBest Browser Extensions for Bug Hunting and Cybersecurity27 Must-Have Browser Extensions for BugHunters & Cybersec professionalFeb 88Feb 88
PinnedPublished inInfoSec Write-upsUnlock the Full Potential of the Wayback Machine for Bug BountyTurn Archives into $Bounties$Jan 2618Jan 2618
PinnedPublished inInfoSec Write-upsS3 Bucket Recon: Finding Exposed AWS Buckets Like a Pro!From Discovery to Exploitation: A Complete Guide to S3 Bucket ReconFeb 267Feb 267
PinnedPublished inMeetCyberUltimate Nuclei Templates: Private Collection for Quick BountiesThese templates are gold for findng bugs easilyJan 3015Jan 3015
PinnedPublished inOSINT TeamFFUF Mastery: The Ultimate Web Fuzzing Guidemaster these web fuzzing methods for Easy Bounties in Bug Bounty programsFeb 38Feb 38
Published inInfoSec Write-upsLostFuzzer: Passive URL Fuzzing & Nuclei DAST for Bug HuntersA Bash script for automated nuclei dast scanning by using passive urlsMar 88Mar 88
Published inInfoSec Write-upsSQL injection in largest Electricity Board of Sri LankaSQL injection bypass by origin ipJan 2416Jan 2416
Published inInfoSec Write-upsPDF.js Arbitrary JavaScript Code Execution (CVE-2024-4367)How to find pdf.js vulnerability in Very detail writup have a lookJan 34Jan 34
Published inInfoSec Write-upsHow to Find Origin IP of any Website Behind a WAFFInd any website origin ip that will help you in WAF BypassDec 30, 20243Dec 30, 20243
Published inOSINT TeamFind XSS Vulnerabilities in Just 2 MinutesBest xss automation everDec 26, 202428Dec 26, 202428