PinnedThexssratinGeek CultureMain App Bug Bounty Methodology — V3IntroductionApr 9, 20211Apr 9, 20211
PinnedThexssratIDORs: What are they and how do you test for them?In this article i try to completely cover IDORs.Nov 26, 2020Nov 26, 2020
ThexssratA Very Basic Beginner Bug Bounty MethodologyCross-Site Scripting (XSS)Dec 21, 2023Dec 21, 2023
ThexssratA list of 50 tools every hacker should knowWireshark: Network protocol analyzer.Dec 21, 20231Dec 21, 20231
ThexssratHow to look for SQLi with a practical SQLmap guide.SQLMap is a powerful open-source penetration testing tool that automates the process of detecting and exploiting SQL injection…Dec 20, 2023Dec 20, 2023
ThexssratHere is why you are doing automation wrong in ethical hackingIntroductionJul 4, 2023Jul 4, 2023
ThexssratThe power of chaining ethical hacking tools such as burp suite, OWASP ZAP, SQLmap and othersSetting Upstream Proxy of ZAP to Burp Suite: Complementing Features for Better Security TestingMay 23, 2023May 23, 2023
ThexssratPicking the Right Bug Bounty Program: Exploring Targets and PlatformsMay 22, 20231May 22, 20231