PinnedPublished inOSINT TeamFind Private Bug Bounty Programs without an inviteYou may not be invited but there is still a way to report for good researchers.Mar 21A response icon5Mar 21A response icon5
PinnedPublished inMeetCyberFOFA Recon for Hidden HackerOne & Bugcrowd ProgramsHunt for hidden programs and not just bugs!Apr 23A response icon3Apr 23A response icon3
PinnedPublished inCyber Security Write-upsNASA P3 Google DorkingDorking — The King of ReconDec 9, 2024A response icon1Dec 9, 2024A response icon1
PinnedPublished inCyber Security Write-ups$400 Bounty in 10 sec 🤑One custom dork, system pwned!Dec 8, 2024A response icon6Dec 8, 2024A response icon6
PinnedPublished inLegionHuntersFOFA Dorking for Bug HuntersHow to use FOFA search engine for OSINT, Recon, Bug Hunting & PentestingMay 6A response icon3May 6A response icon3
Published inSystem WeaknessLLM Prompt Ideas for Red TeamersHow to enhance your existing arsenal with the help of LLMs10h ago10h ago
Published inMeetCyberFOFA Dorking | Part 6Advanced Recon Techniques for Cybersecurity Asset Discovery and Vulnerability Detection11h ago11h ago
AI Endpoint OSINT using FOFAThousands of endpoints are unauthenticated and exposing origin IPs which leads to WAF bypass1d ago1d ago
Published inLegionHuntersPlugin XSS Insecure Code ReviewComplete Guide to Find XSS in WordPress Plugins2d ago2d ago
Published inMeetCyberReversing LFI + RFI in WordPress PluginReproducing vulnerabilities in the Site Import Plugin to learn insecure coding practices2d ago2d ago