PinnedPublished inGeek CultureMain App Bug Bounty Methodology — V3IntroductionApr 9, 2021A response icon1Apr 9, 2021A response icon1
PinnedIDORs: What are they and how do you test for them?In this article i try to completely cover IDORs.Nov 26, 2020Nov 26, 2020
How to get into bug bounties — A list of resources V2.0Hello friends, I’ve seen this question come by often so I’ve decided to try and group all the resources of myself that I have about…6d ago6d ago
The Origins of XSS (Cross-Site Scripting)First of all, I heard you like free stuff so I made free stuff for you so you can enjoy your free stuff while you enjoy your free stuff ……May 20May 20
The Ultimate Checklist for Detecting IDOR and Broken Access Control VulnerabilitiesWhen testing web applications for security vulnerabilities, Insecure Direct Object References (IDOR) and Broken Access Control (BAC) are…Dec 25, 2024Dec 25, 2024
Very Basic Beginner Bug Bounty Methodology: Practical Tips and Techniques for Web AppsBeginner Bug Bounty Methodology: Practical Tips and Techniques for Web AppsDec 23, 2024Dec 23, 2024
100 CLI Flags and Tricks Every Bug Bounty Hunter Should KnowBug bounty hunting is an exciting yet challenging field that requires the mastery of numerous tools and techniques. While graphical…Dec 23, 2024Dec 23, 2024
Understanding and Testing for API3:2023 — Broken Object Property Level AuthorizationIntroductionDec 7, 2024Dec 7, 2024