PinnedPublished inGeek CultureMain App Bug Bounty Methodology — V3IntroductionApr 9, 20211Apr 9, 20211
PinnedIDORs: What are they and how do you test for them?In this article i try to completely cover IDORs.Nov 26, 2020Nov 26, 2020
Understanding Broken Access Control (BAC): A Comprehensive GuideLearn how to detect, prevent, and mitigate Broken Access Control (BAC) vulnerabilities, from privilege escalation and IDOR to multi-tenancy1d ago1d ago
How To Automate Your Broad Scope ReconObjective: To provide a comprehensive, automated reconnaissance methodology for web application hacking that combines Python and Bash…1d ago1d ago
Hunting for IDOR and BAC Vulnerabilities in B2B Applications with Burp Suite’s Authorize ExtensionIn today’s fast-paced world of agile development and B2B (business-to-business) applications, security professionals and bug bounty hunters…Oct 31Oct 31
Defend Your Network: Join the CYBER CRUSADE Webinar on DoS and DDoS AttacksIn today’s interconnected world, understanding and mitigating cyber threats is crucial. One of the most devastating forms of attacks on…Oct 5Oct 5
Hacking The butler — Jenkins hacking 101let’s hack the most popular CI/CD tool out there …Sep 23Sep 23
A list of 50 tools every hacker should knowWireshark: Network protocol analyzer.Dec 21, 20231Dec 21, 20231