PinnedPublished inMeetCyberShodan Recon TipsHelpful shodan commands for pentesters and bug huntersSep 7A response icon3Sep 7A response icon3
PinnedPublished inMeetCyberFOFA Recon for Hidden HackerOne & Bugcrowd ProgramsHunt for hidden programs and not just bugs!Apr 23A response icon6Apr 23A response icon6
PinnedPublished inCyber Security Write-upsNASA P3 Google DorkingDorking — The King of ReconDec 9, 2024A response icon1Dec 9, 2024A response icon1
PinnedPublished inCyber Security Write-ups$400 Bounty in 10 sec 🤑One custom dork, system pwned!Dec 8, 2024A response icon6Dec 8, 2024A response icon6
Published inLegionHuntersURLScan Python Automated ReconA mini demo of URLScan dorking automation using PythonOct 23Oct 23
Published inMeetCyberCode Review : Arbitrary Options UpdateWordPress Plugin Secure Code Review Techniques to find 0 daysOct 19A response icon1Oct 19A response icon1
2 Best Self-Hosted Bounty ProgramsListed based on my own personal opinion and observations. For others priority might vary from person to person :)Oct 16Oct 16
Published inMeetCyberCode Review : admin_init & init HookZero day techniques to find vulnerabilities in the codebaseOct 13Oct 13
Published inOSINT Team3rd party PII Leak OSINTAdvanced Google Dorks to find exposed sensitive informationOct 10Oct 10
Published inOSINT TeamTelegram Posts OSINT via Dorking⚠️ This article is only meant for ethical cyber forensics and OSINT investigation purposes. Only you are responsible for your actions!Oct 8Oct 8