PinnedThexssratinGeek CultureMain App Bug Bounty Methodology — V3Introduction·12 min read·Apr 9, 2021--1--1
PinnedThexssratIDORs: What are they and how do you test for them?In this article i try to completely cover IDORs.·6 min read·Nov 26, 2020----
ThexssratA Very Basic Beginner Bug Bounty MethodologyCross-Site Scripting (XSS)·3 min read·Dec 21, 2023----
ThexssratA list of 50 tools every hacker should knowWireshark: Network protocol analyzer.·2 min read·Dec 21, 2023--1--1
ThexssratHow to look for SQLi with a practical SQLmap guide.SQLMap is a powerful open-source penetration testing tool that automates the process of detecting and exploiting SQL injection…·5 min read·Dec 20, 2023----
ThexssratHere is why you are doing automation wrong in ethical hackingIntroduction·4 min read·Jul 4, 2023----
ThexssratThe XSS Revolution: A Game-Changer in the Cybersecurity Landscape·3 min read·May 27, 2023----
ThexssratThe power of chaining ethical hacking tools such as burp suite, OWASP ZAP, SQLmap and othersSetting Upstream Proxy of ZAP to Burp Suite: Complementing Features for Better Security Testing·5 min read·May 23, 2023----
ThexssratPicking the Right Bug Bounty Program: Exploring Targets and Platforms·4 min read·May 22, 2023--1--1