PinnedThexssratinGeek CultureMain App Bug Bounty Methodology — V3IntroductionApr 9, 20211Apr 9, 20211
PinnedThexssratIDORs: What are they and how do you test for them?In this article i try to completely cover IDORs.Nov 26, 2020Nov 26, 2020
ThexssratUnderstanding Broken Access Control (BAC): A Comprehensive GuideLearn how to detect, prevent, and mitigate Broken Access Control (BAC) vulnerabilities, from privilege escalation and IDOR to multi-tenancy1d ago1d ago
ThexssratHow To Automate Your Broad Scope ReconObjective: To provide a comprehensive, automated reconnaissance methodology for web application hacking that combines Python and Bash…1d ago1d ago
ThexssratHunting for IDOR and BAC Vulnerabilities in B2B Applications with Burp Suite’s Authorize ExtensionIn today’s fast-paced world of agile development and B2B (business-to-business) applications, security professionals and bug bounty hunters…Oct 31Oct 31
ThexssratDefend Your Network: Join the CYBER CRUSADE Webinar on DoS and DDoS AttacksIn today’s interconnected world, understanding and mitigating cyber threats is crucial. One of the most devastating forms of attacks on…Oct 5Oct 5
ThexssratHacking The butler — Jenkins hacking 101let’s hack the most popular CI/CD tool out there …Sep 23Sep 23
ThexssratA Very Basic Beginner Bug Bounty MethodologyCross-Site Scripting (XSS)Dec 21, 2023Dec 21, 2023
ThexssratA list of 50 tools every hacker should knowWireshark: Network protocol analyzer.Dec 21, 20231Dec 21, 20231