PinnedPublished inGeek CultureMain App Bug Bounty Methodology — V3IntroductionApr 9, 20211Apr 9, 20211
PinnedIDORs: What are they and how do you test for them?In this article i try to completely cover IDORs.Nov 26, 2020Nov 26, 2020
Understanding and Testing for API3:2023 — Broken Object Property Level AuthorizationIntroductionDec 7Dec 7
Bug Bounty Methodology Checklist for Web Applications (B2B Apps)General checklist for bug bountiesDec 4Dec 4
Using ANY.RUNIn today’s cybersecurity landscape, detecting and analyzing malware is more critical than ever. Malicious executables often mask their true…Nov 19Nov 19
Breaking into Bug Bounties: A Guide to Hunting Business Logic and BAC Vulnerabilities in B2B…Bug bounties have become a lucrative and intellectually stimulating career path for cybersecurity enthusiasts. While many guides cover…Nov 18Nov 18
Advanced Techniques for Bypassing Web Filters: A Practical Guide to Identifying and Exploiting XSS…In web application security, Cross-Site Scripting (XSS) vulnerabilities are a common yet powerful threat, enabling attackers to execute…Nov 12Nov 12
Understanding Broken Access Control (BAC): A Comprehensive GuideLearn how to detect, prevent, and mitigate Broken Access Control (BAC) vulnerabilities, from privilege escalation and IDOR to multi-tenancyNov 7Nov 7