PinnedPublished inInfoSec Write-upsAI Jailbreaks via Obfuscation: How They WorkHow to Bypass LLM Protections Using Obfuscation for AI Red TeamingJan 27Jan 27
Published inInfoSec Write-upsTop Google Dorks Explained 🔍Top Google Dorks for bug bounty hunting, pentesting, appsec, recon, and SEO. Discover hidden endpoints and test for vulnerabilities such as…Jul 30, 2024Jul 30, 2024
Published inInfoSec Write-upsJS Link Finder Burp Suite Extension GuideImprove your bug bounty hunting, pentesting, and appsec skills with the JS Link Finder Burp Suite Extension. Discover hidden endpoints and…Jul 29, 2024Jul 29, 2024
Published inInfoSec Write-ups10 Google Dorks for Sensitive DataDiscover Exposed Documents on Cloud Platforms with Google Dorks for CybersecurityApr 20, 20234Apr 20, 20234
Published inInfoSec Write-ups6 Burp Suite Tips & TricksTurbocharge your web application security testing, bug bounty hunting, and pentesting with these essential Burp Suite configuration hacksApr 3, 20233Apr 3, 20233
Published inInfoSec Write-upsThe Ultimate XSS PoC with ChatGPT-4 🎯XSS to Demonstrate Stealing Cookies, Local Storage, and Page Content Generated with ChatGPT-4 🤖Mar 26, 2023Mar 26, 2023
Published inInfoSec Write-upsXXE with ChatGPTGenerate Custom XXE Payloads with AIMar 13, 2023Mar 13, 2023
Published inInfoSec Write-ups5 ChatGPT Prompts for Bug BountyJS, XSS, CSRF, and Decoding Made Easy with ChatGPTMar 7, 2023Mar 7, 2023
Published inInfoSec Write-upsCreate Your Own XSS Lab with ChatGPTGet up and running quickly with this easy-to-follow tutorial on creating and running your own custom XSS lab with ChatGPT.Mar 3, 2023Mar 3, 2023
Published inInfoSec Write-upsChatGPT for Bug Bounty: Faster Hunting and ReportingSave Time, Learn Technical Skills, and Write Effective Reports with AI-Powered ChatGPTFeb 27, 20236Feb 27, 20236
Published inInfoSec Write-upsReveal the Cloud with Google DorksFind sensitive data in Amazon AWS, Google Cloud, and moreFeb 7, 20231Feb 7, 20231
Published inInfoSec Write-upsGet Into Cybersecurity in 2023: A Step-by-Step GuideUnlocking the Secrets to a Successful Cybersecurity Career: A Step-by-Step Guide for BeginnersFeb 3, 2023Feb 3, 2023
Published inInfoSec Write-upsTips for BAC and IDOR VulnerabilitiesStep-by-step guide for uncovering Broken Access Control and Indirect Object Reference vulnerabilities for bug bounty hunters and…Jan 16, 2023Jan 16, 2023
Published inThe Gray AreaXSS Bypass for Rich Text EditorsTips for bypassing XSS filters in rich text editors like TinyMCEJan 8, 20231Jan 8, 20231
Published inThe Gray Area5 Google Dorks Every Hacker Should KnowUncover hidden endpoints and sensitive data using these Google dorksJan 6, 20237Jan 6, 20237
How to start a Bug Bounty ProgramHow do you start a bug bounty at your organization? People are always asking me, so I thought I’d share what went into creating Stanford’s…Oct 23, 20191Oct 23, 20191
Breaking into Bug BountyHow do you break into bug bounty? People are always asking, so I decided to outline my personal tips to help you get started.Feb 22, 2018Feb 22, 2018