PinnedPublished inMeetCyberGoogle Cloud Shell for Bug HuntersFound RXSS using Google Cloud Shell and XssVibes12h ago112h ago1
PinnedPublished inCyber Security Write-upsVPS Subdomain MonitoringMonitor new subdomains easilyMar 15Mar 15
PinnedPublished inCyber Security Write-upsNASA P3 Google DorkingDorking — The King of ReconDec 9, 20241Dec 9, 20241
PinnedPublished inCyber Security Write-ups$400 Bounty in 10 sec 🤑One custom dork, system pwned!Dec 8, 20246Dec 8, 20246
Published inOSINT TeamHack Misconfigured Endpoints Easily | Part 4Craft customized Google, Shodan, and Fofa dorks1d ago1d ago
Published inMeetCyberFOFA Recon for Hidden HackerOne & Bugcrowd ProgramsHunt for hidden programs and not just bugs!3d ago13d ago1
Published inReaders ClubHow I got Substack Hall of FameA journey of persistence, responsible disclosure, and recognition3d ago43d ago4
Published inOSINT TeamRansomware GUI Development POCBuilding a GUI POC for Ethical Hacking LabsApr 182Apr 182
Published inDevelopersGlobalOAuth Attack Surface Mapping via UrlScan DorkingManual but highly effective deep OAuth endpoint discovery using custom advanced dedicated dorksApr 162Apr 162
Published inSystem WeaknessLegion Hunter Hidden EndpointsUrlscan, fofa, google, shodan and virustotal😈Apr 111Apr 111