PinnedThexssratinGeek CultureMain App Bug Bounty Methodology — V3IntroductionApr 9, 20211Apr 9, 20211
PinnedThexssratIDORs: What are they and how do you test for them?In this article i try to completely cover IDORs.Nov 26, 2020Nov 26, 2020
ThexssratUsing ANY.RUNIn today’s cybersecurity landscape, detecting and analyzing malware is more critical than ever. Malicious executables often mask their true…1d ago1d ago
ThexssratBreaking into Bug Bounties: A Guide to Hunting Business Logic and BAC Vulnerabilities in B2B…Bug bounties have become a lucrative and intellectually stimulating career path for cybersecurity enthusiasts. While many guides cover…2d ago2d ago
ThexssratAdvanced Techniques for Bypassing Web Filters: A Practical Guide to Identifying and Exploiting XSS…In web application security, Cross-Site Scripting (XSS) vulnerabilities are a common yet powerful threat, enabling attackers to execute…Nov 12Nov 12
ThexssratUnderstanding Broken Access Control (BAC): A Comprehensive GuideLearn how to detect, prevent, and mitigate Broken Access Control (BAC) vulnerabilities, from privilege escalation and IDOR to multi-tenancyNov 7Nov 7
ThexssratHow To Automate Your Broad Scope ReconObjective: To provide a comprehensive, automated reconnaissance methodology for web application hacking that combines Python and Bash…Nov 7Nov 7
ThexssratHunting for IDOR and BAC Vulnerabilities in B2B Applications with Burp Suite’s Authorize ExtensionIn today’s fast-paced world of agile development and B2B (business-to-business) applications, security professionals and bug bounty hunters…Oct 31Oct 31
ThexssratDefend Your Network: Join the CYBER CRUSADE Webinar on DoS and DDoS AttacksIn today’s interconnected world, understanding and mitigating cyber threats is crucial. One of the most devastating forms of attacks on…Oct 5Oct 5
ThexssratHacking The butler — Jenkins hacking 101let’s hack the most popular CI/CD tool out there …Sep 23Sep 23