Jump Over Firewall Finding Origin IP
Web application firewalls are the most annoying when you know that there is vulnerability out there! Usually, it’s old, not
Amazing Cyber Security
Your blog category
Web application firewalls are the most annoying when you know that there is vulnerability out there! Usually, it’s old, not
Won’t you love to find the website or asset that nobody else has found, test it, and find some serious
Are you using the same port scanning techniques as everybody else and not getting desirable results? It’s time to change
Let’s explore the depths of Shodan Dorking to level up your security testing. While Google can find many websites, Shodan
Are you interested in getting a lot of subdomains of big targets? Using tools like amass or subfinder is not
Ever wonder how past web data could lead to huge bounties? We will learn how to turn a Wayback machine,
Imagine finding critical security issues just by using Google Search. Yes, it is possible! You’re about to enter into the
Struggling to find vulnerabilities that pay good bounties? You might be missing the key ingredient in your toolkit. Discover the
Vulnerabilities that take place behind the scenes of an application’s operation are known as Out-Of-Bound (OOB) issues. It is a
In this article, I will reveal the techniques for detecting Blind Cross-Site Scripting at scale. We will dive into the