PinnedPublished inCyber Security Write-upsXSS on GeeksforGeeks 😈⚠️Disclaimer: This is only for educational & ethical bug-hunting purposes!Feb 22Feb 22
PinnedPublished inCyber Security Write-upsNASA P3 Google DorkingDorking — The King of ReconDec 9, 20243Dec 9, 20243
PinnedPublished inReaders Club2024 Bug Bounty AchievementsStory of a backlog IT studentDec 31, 20246Dec 31, 20246
PinnedPublished inCyber Security Write-ups$400 Bounty in 10 sec 🤑One custom dork, system pwned!Dec 8, 20249Dec 8, 20249
Published inMeetCyber1 Dork for Pwning Databases🛢️Mimicking methodology from top researchers + Making dorks for mass hunting14h ago214h ago2
Published inMeetCyber😈Dorking Microsoft Sharepoint EndpointsInformation Disclosure + Potential Misconfiguration2d ago12d ago1
Published inCyber Security Write-upsNotify Tutorial for Bug HuntersGet quick alerts on Discord (Automation Guide)3d ago23d ago2
Published inOSINT TeamBypass OAST MitigationsDetection of out-of-band testing and how to bypass5d ago25d ago2