PinnedPublished inCyber Security Write-upsDeep Recon Methodology for Bug Bounty Hunters | Part-1Hello, everyone! 👋Mar 84Mar 84
PinnedPublished inCyber Security Write-upsPart-2 | Deep Recon Methodology for Bug Bounty HuntersHello, Everyone! 👋Mar 92Mar 92
Published inInfoSec Write-ups🌱0 to First Bug: What I’d Do Differently If I Started Bug Bounty TodayFree Article Link1d ago11d ago1
Published inInfoSec Write-upsPart-2🕵️♂️Bug Bounty Secrets They Don’t Tell You: Tricks From 100+ Reported Bugs✨Free Article Link2d ago2d ago
Published inInfoSec Write-ups☕Best Tool for Analyzing Java Files (90% of Hackers Don’t Know This)Free Article Link3d ago13d ago1
Published inInfoSec Write-ups🔐 JWT Exploitation: How I Forged Tokens and Took Over Accounts🔐Free Article Link4d ago4d ago
Published inInfoSec Write-ups💰The $1,000 Recon Trick: One Command That Changed My Hunting Game“You’re one recon command away from your first $1,000 bug — you just don’t know it yet.”5d ago55d ago5
Published inInfoSec Write-ups🧬SSRF via PDF Generator? Yes, and It Led to EC2 Metadata Access👨💻Free Article Link5d ago45d ago4