Hunting Blind XSS on the Large Scale — Initial Setup
The Blind Cross-Site Scripting is a pretty serious client-side vulnerability with serious consequences. This type of vulnerability enables attackers to
Amazing Cyber Security
Your blog category
The Blind Cross-Site Scripting is a pretty serious client-side vulnerability with serious consequences. This type of vulnerability enables attackers to
Significant portion of crucial data and documents is now stored online as the paper documents are becoming less popular. There
Many things have changed over the years, and the Google search engine is not the same anymore. It does not
In this article, I would like to cover how it is possible to efficiently check thousands of endpoints for potential
Various fields of society are increasingly embracing the famous AI tool, and information security is no exception. Top-tier security researchers
The best bug bounty hunters are not only hard-working people, but they also exhibit immense dedication, persistence, and patience. More
In this publication, I would like to cover how it is possible to efficiently check millions of misconfigured S3 buckets
In order to be successful in bug bounty, you have to be a little different from the crowd — use
As you probably learned from the previous part, it is usually a nice thing to have custom wordlists and tools
This is the second part of the Axiom Bug Bounty series. In this post, I will discuss the main features