PinnedThexssratinGeek CultureMain App Bug Bounty Methodology — V3IntroductionApr 9, 20211Apr 9, 20211
PinnedThexssratIDORs: What are they and how do you test for them?In this article i try to completely cover IDORs.Nov 26, 2020Nov 26, 2020
ThexssratHunting for IDOR and BAC Vulnerabilities in B2B Applications with Burp Suite’s Authorize ExtensionIn today’s fast-paced world of agile development and B2B (business-to-business) applications, security professionals and bug bounty hunters…6d ago6d ago
ThexssratDefend Your Network: Join the CYBER CRUSADE Webinar on DoS and DDoS AttacksIn today’s interconnected world, understanding and mitigating cyber threats is crucial. One of the most devastating forms of attacks on…Oct 5Oct 5
ThexssratHacking The butler — Jenkins hacking 101let’s hack the most popular CI/CD tool out there …Sep 23Sep 23
ThexssratA Very Basic Beginner Bug Bounty MethodologyCross-Site Scripting (XSS)Dec 21, 2023Dec 21, 2023
ThexssratA list of 50 tools every hacker should knowWireshark: Network protocol analyzer.Dec 21, 20231Dec 21, 20231
ThexssratHow to look for SQLi with a practical SQLmap guide.SQLMap is a powerful open-source penetration testing tool that automates the process of detecting and exploiting SQL injection…Dec 20, 2023Dec 20, 2023
ThexssratHere is why you are doing automation wrong in ethical hackingIntroductionJul 4, 2023Jul 4, 2023