Jump Over Firewall Finding Origin IP
Web application firewalls are the most annoying when you know that there is vulnerability out there! Usually, it’s old, not
Amazing Cyber Security
Web application firewalls are the most annoying when you know that there is vulnerability out there! Usually, it’s old, not
Won’t you love to find the website or asset that nobody else has found, test it, and find some serious
Are you using the same port scanning techniques as everybody else and not getting desirable results? It’s time to change
Are you interested in getting a lot of subdomains of big targets? Using tools like amass or subfinder is not
Vulnerabilities that take place behind the scenes of an application’s operation are known as Out-Of-Bound (OOB) issues. It is a
In this article, I will reveal the techniques for detecting Blind Cross-Site Scripting at scale. We will dive into the
The Blind Cross-Site Scripting is a pretty serious client-side vulnerability with serious consequences. This type of vulnerability enables attackers to
In this article, I would like to cover how it is possible to efficiently check thousands of endpoints for potential
In this publication, I would like to cover how it is possible to efficiently check millions of misconfigured S3 buckets
In order to be successful in bug bounty, you have to be a little different from the crowd — use