OTP Bypass Bug in Public Bug Bounty ProgramPOC of the report submitted for OTP Bypass bugMar 71Mar 71
Published inInfoSec Write-ups$50-$100 worth Sensitive Leaks via Google Dorks | Part 2Part 2: Learn practical and hidden dorks to target sensitive bounty earning leaks and sensitive files.Mar 51Mar 51
$50-$100 worth Sensitive Leaks via Google Dorks | Part 1Learn practical and hidden dorks to target sensitive bounty earning leaks and sensitive files.Mar 4Mar 4
Published inInfoSec Write-ups$1000–$25k worth API Bug Attack & Chaining StrategiesPractical API bug chaining tips & tricks in Bug BountiesFeb 271Feb 271
Published inInfoSec Write-ups$100-$20k worth Stored XSS Vulnerability | Hidden MethodsHidden Methods to bypass restriction to find Stored XSS in Bug BountiesFeb 264Feb 264
$500-$20k worth GraphQL Vulnerabilities | Advanced Tips & TricksAdvanced Practical Tips & Tricks to find GraphQL Vulnerability in Bug BountiesFeb 26Feb 26
Published inInfoSec Write-ups$100-$20k worth Account Takeover Vulnerability | Hidden Practical StepsHidden methods to find Account Takeover Vulnerability in Bug BountiesFeb 25Feb 25
Published inInfoSec Write-ups$100-$5000 worth LFI Vulnerability | Advanced Tips and TricksPractical & Expert Techniques, Tips and Tricks to find Local File Inclusion (LFI)Feb 241Feb 241
Published inInfoSec Write-ups$100-$5000 worth File Upload Vulnerability | Advanced TechniquesHidden and Advanced Techniques to bypass File Upload RestrictionsFeb 231Feb 231
Published inInfoSec Write-ups$1000-$10k worth Leaks via Github Secret DorksDive into some Expert Techniques to access Sensitive Leaks/tokens/passwords/files/codes in Github RepositoriesFeb 23Feb 23