Shubham TiwariAutomating Subdomain Enumeration to Discover Critical VulnerabilitiesHello, I’m Shubham Tiwari, commonly known as Rooter in the cybersecurity space. Today, I’m going to share how I identified a critical…Sep 153
Anish NarayanSimple Tips for Bug Bounty Beginners: Finding API Key Leakage VulnerabilitiesDuring a time when businesses heavily rely on APIs (Application Programming Interfaces) to enhance user experience and functionality, the…Feb 29
Its Aman YadavWhere to start learning Bug Bounty? Your first stepSo, you’ve heard the whispers of exciting bounties and the thrill of the hunt. Bug bounty hunting, the ethical hacking practice of finding…Jun 11Jun 11
Phyo WaThone WininInfoSec Write-upsCapturing Android App Traffic via Wireshark - Android PentestingJun 8Jun 8
MyNextDeveloperinMyNextDeveloperAnalysing the Pros and Cons of Bug Bounty HuntingThe flourishing career of a bug bounty hunter is very promising and highly demanding in today’s ever-evolving world of cyber security.May 23May 23
Shubham TiwariAutomating Subdomain Enumeration to Discover Critical VulnerabilitiesHello, I’m Shubham Tiwari, commonly known as Rooter in the cybersecurity space. Today, I’m going to share how I identified a critical…Sep 153
Anish NarayanSimple Tips for Bug Bounty Beginners: Finding API Key Leakage VulnerabilitiesDuring a time when businesses heavily rely on APIs (Application Programming Interfaces) to enhance user experience and functionality, the…Feb 29
Its Aman YadavWhere to start learning Bug Bounty? Your first stepSo, you’ve heard the whispers of exciting bounties and the thrill of the hunt. Bug bounty hunting, the ethical hacking practice of finding…Jun 11
Phyo WaThone WininInfoSec Write-upsCapturing Android App Traffic via Wireshark - Android PentestingJun 8
MyNextDeveloperinMyNextDeveloperAnalysing the Pros and Cons of Bug Bounty HuntingThe flourishing career of a bug bounty hunter is very promising and highly demanding in today’s ever-evolving world of cyber security.May 23
Anish NarayanSimple Tips for Bug Bounty Beginners: Finding PII VulnerabilitiesPersonally Identifiable Information (PII) refers to any sensitive data that could potentially identify an individual such as usernames…May 17
Anish NarayanSimple Tips for Bug Bounty Beginners: Finding Open Redirect BugsMessage to every bug bounty hunter who is grinding to get their first bounty or to find their first bug:Oct 29, 2023