Using ‘Waymore’ to Uncover Archived Treasures and Customer DataIn bug bounty hunting, even the smallest scopes can lead to surprising discoveries. This is the story of how a seemingly limited program…Oct 82Oct 82
How a ‘.git’ file Leads to Zendesk Panel Takeoverبِسْمِ اللَّهِ الرَّحْمَـٰنِ الرَّحِيمِApr 251Apr 251
Aspiring Bug Bounty Hunters’ New Year Goals ToolkitAs we stand at the cusp of a new year, it’s the perfect time for aspiring hunters to chart their course toward success. Setting achievable…Dec 21, 20232Dec 21, 20232
IDOR | My first P2 that Lead to Full PII Exposure.بِسْم اللَّه الرَّحْمن الرَّحِيم . . اللَّهمَّ صَلِّ وَسلَّم وبارك على نَبِينَا مُحمَّدSep 27, 20234Sep 27, 20234
This Easy Bug will help you Earn Your first Bounty“بسم الله الرحمن الرحيم” “اللهم صلي وسلم وبارك علي نبينا محمد”Mar 25, 20237Mar 25, 20237
My Methodology for Making a Book library with Notion for Bug Bounty and PentestingHow to Use Notion 100% in Your Bug Bounyt and Pentesting Self-Study.Oct 28, 20221Oct 28, 20221