PinnedPublished inGeek CultureMain App Bug Bounty Methodology — V3IntroductionApr 9, 20211Apr 9, 20211
PinnedIDORs: What are they and how do you test for them?In this article i try to completely cover IDORs.Nov 26, 2020Nov 26, 2020
The Ultimate Checklist for Detecting IDOR and Broken Access Control VulnerabilitiesWhen testing web applications for security vulnerabilities, Insecure Direct Object References (IDOR) and Broken Access Control (BAC) are…Dec 25, 2024Dec 25, 2024
Very Basic Beginner Bug Bounty Methodology: Practical Tips and Techniques for Web AppsBeginner Bug Bounty Methodology: Practical Tips and Techniques for Web AppsDec 23, 2024Dec 23, 2024
100 CLI Flags and Tricks Every Bug Bounty Hunter Should KnowBug bounty hunting is an exciting yet challenging field that requires the mastery of numerous tools and techniques. While graphical…Dec 23, 2024Dec 23, 2024
Understanding and Testing for API3:2023 — Broken Object Property Level AuthorizationIntroductionDec 7, 2024Dec 7, 2024
Bug Bounty Methodology Checklist for Web Applications (B2B Apps)General checklist for bug bountiesDec 4, 2024Dec 4, 2024
Using ANY.RUNIn today’s cybersecurity landscape, detecting and analyzing malware is more critical than ever. Malicious executables often mask their true…Nov 19, 2024Nov 19, 2024