Published inInfoSec Write-upsHow Hackers Abuse XML-RPC to Launch Bruteforce and DDoS AttacksFrom Recon to full Exploitation: The XML-RPC Attack PathMar 265Mar 265
Published inInfoSec Write-upsHow to Route Traffic from WSL to Burp Suite on Windows: A Step-by-Step GuideEasily Capture and Analyze WSL Network Traffic Through Burp SuiteMar 217Mar 217
Published inInfoSec Write-upsFrom Zero to Hero: Hunting High-Paying Open Redirect Bugs in Web AppsStep-by-Step Guide to Master Open Redirect Bugs and Earn High-Paying BountiesMar 209Mar 209
Published inInfoSec Write-upsLostFuzzer: Passive URL Fuzzing & Nuclei DAST for Bug HuntersA Bash script for automated nuclei dast scanning by using passive urlsMar 88Mar 88
Published inInfoSec Write-upsS3 Bucket Recon: Finding Exposed AWS Buckets Like a Pro!From Discovery to Exploitation: A Complete Guide to S3 Bucket ReconFeb 268Feb 268
Published inInfoSec Write-upsBest Browser Extensions for Bug Hunting and Cybersecurity27 Must-Have Browser Extensions for BugHunters & Cybersec professionalFeb 811Feb 811
Published inOSINT TeamFFUF Mastery: The Ultimate Web Fuzzing Guidemaster these web fuzzing methods for Easy Bounties in Bug Bounty programsFeb 38Feb 38
Published inMeetCyberUltimate Nuclei Templates: Private Collection for Quick BountiesThese templates are gold for findng bugs easilyJan 3015Jan 3015
Published inInfoSec Write-upsUnlock the Full Potential of the Wayback Machine for Bug BountyTurn Archives into $Bounties$Jan 2618Jan 2618
Published inInfoSec Write-upsSQL injection in largest Electricity Board of Sri LankaSQL injection bypass by origin ipJan 2416Jan 2416