PinnedPublished inSystem WeaknessThe best way to find private Bug-Hunting programs🤑Recon process to find private programsDec 25, 20246Dec 25, 20246
PinnedPublished inCyber Security Write-upsVPS Subdomain MonitoringMonitor new subdomains easilyMar 13Mar 13
PinnedPublished inMeetCyber1 Dork for Pwning Databases🛢️Mimicking methodology from top researchers + Making dorks for mass huntingFeb 131Feb 131
PinnedPublished inCyber Security Write-upsNASA P3 Google DorkingDorking — The King of ReconDec 9, 20243Dec 9, 20243
PinnedPublished inCyber Security Write-ups$400 Bounty in 10 sec 🤑One custom dork, system pwned!Dec 8, 20248Dec 8, 20248
Published inSystem WeaknessMasking VPS Traffic with VPNLinux VPS Setup guide for VPN on VPS2d ago2d ago
Published inMeetCyberOpenBugBounty Certificate RewardedHow can I start my bug-hunting journey from scratch5d ago45d ago4
Published inMeetCyberHow I got Philips Hall of HonorsPro Google Dork to find untouched assetsMar 102Mar 102