Find Your First 5 Bug Bounties in Easy Ways [Guaranteed Method!!]Bug bounty hunting is a fun way to earn money by finding security issues in websites and apps. If you’re just starting, don’t worry! In…Sep 7, 2024191Sep 7, 2024191
Published inInfoSec Write-upsHow to Get Started in Bug Bounty Hunting: A Comprehensive Beginner’s GuideIntroductionAug 31, 20241841Aug 31, 20241841
OWASP Top 10 Vulnerabilities CheatsheetIn today’s digital world, software and web applications are everywhere. But with convenience comes risks. Cyber attackers are always…Aug 3, 202354Aug 3, 202354
Linux Top 50 Most Used Commands!In this article, I’m going to share linux most used commands based on my experience. I’m going too list down the most used commands in unix…Jul 28, 202349Jul 28, 202349
Essential Tools For Bug Bounty Hunting, Web App Hacking, Penetration Testing | Shubham DhunganaHello, Shubham Dhungana, this side. This article will be showcasing the essential tools required for bug bounty hunting, web application…Jun 2, 20231221Jun 2, 20231221
How I Do Web Application Hacking, Bug Hunting and Perform VAPT | My Detailed VAPT MethodologyWeb application security testing, also known as VAPT (Vulnerability Assessment and Penetration Testing), plays a crucial role in ensuring…May 17, 20231632May 17, 20231632
How I Built My 4th Level Deeper Subdomain Enumeration VAPT Automation Script Tool | Offensive…In this article, I share my journey of developing DeepSubh, a powerful subdomain enumeration automation script that does subdomain…May 17, 20231373May 17, 20231373
Scripting My Custom Script Automation Tool For Web Application Hacking & ReconnaissanceBuilt my automation recon script tool for web application hacking & reconnaissance tasks which I am going to share. I found these codes and…Nov 8, 2022711Nov 8, 2022711
Linux Commands Cheat sheet for Web Application HackingBelow cheat sheet commands are useful for finding bugs in web application. These are especially used by bug bounty hunters for finding…Aug 7, 2022982Aug 7, 2022982
Web Application Reconnaissance Guide, Cybersec | Shubham DhunganaIn this article, I’m going to document about the process to perform web application reconnaissance. Before reading this article, we must…Aug 6, 2022161Aug 6, 2022161
Gold Bug Bounty Resources in 2022 | Web Application, Android & iOS SecurityTake your time and start learning from these Resources.Mar 4, 202279Mar 4, 202279
Top 3 Underrated Unrecommended Gem Book List To Read | Shubham DhunganaThe list of books today I’m going to describe would not be recommended by most people. But, I must say those books are gem of a thing to…Oct 20, 202162Oct 20, 202162
Top 5 Books To Read This Month | Shubham DhunganaHere’s the list of some of good books to read this month. These all books listed below are amazing to read. Take your time. Read these…Oct 19, 20212Oct 19, 20212
Published inInfoSec Write-upsHow I hacked Nepal’s ecommerce site and bought huge packs of kitkats for free lol :) | By Shubham…How I hacked Nepal’s ecommerce site and bought huge packs of kitkats for free:) | By Shubham DhunganaOct 18, 20211423Oct 18, 20211423
Getting Started With Bug Bounty Hunting in 2022 | ShubhamIf you were just wondering by seeing the bug bounty stories and posts of facebook friends and always wanted to get started with this bug…Oct 17, 2021133Oct 17, 2021133
Bug Bounty And Penetration Testing Guide If You Are Starting TodayStep 0: Take care of your mental health. For that read amazing probably the greatest spiritual book of all time “Be as you are” by Ramana…Jul 24, 2021672Jul 24, 2021672
You Will Uninstall Your Alarm App After ThisStill need alarm app to wake up early! Does it work? Now you don’t need itJan 12, 202111Jan 12, 202111