PinnedAshishBug bounties, the glamour.Hello to the readers, it’s been a while since i wrote on medium and today this morning i feel like writing something out after analysing…May 15, 2022May 15, 2022
AshishGet Exclusive Cybersecurity Content in Your Inbox!Want to get exclusive cybersecurity content in your inbox?May 2, 2023May 2, 2023
AshishinSystem WeaknessPodcast: Cybersecurity Unlocked — OSINT Factor Chapter 1It is said that it is always worth learning from the experience of other people, we present our new series of podcasts where we will share…Apr 27, 2023Apr 27, 2023
AshishinSystem WeaknessRoot detection analysis and bypass — Rootbeer Library |Beginner | Part 1For those who don’t know, I am Ashish (co-founder of Bluefire redteam), We engage with many real-world cybersecurity challenges, and this…Nov 21, 2022Nov 21, 2022
AshishinInfoSec Write-upsJavascript Files ReconIn this video i am gonna show you how you can make use of existing javascript recon tools and mix them , Automated for your recon.Nov 17, 2020Nov 17, 2020
AshishinInfoSec Write-ups3 Minutes & XSS!Hello wonderfull readers, Myself Ashish Jha back with another of my write-up, Yes you heard it right it was a “3 minutes and xss”, Now as…Aug 17, 20181Aug 17, 20181