Using ‘Waymore’ to Uncover Archived Treasures and Customer DataIn bug bounty hunting, even the smallest scopes can lead to surprising discoveries. This is the story of how a seemingly limited program…Oct 8, 2024A response icon2Oct 8, 2024A response icon2
How a ‘.git’ file Leads to Zendesk Panel Takeoverبِسْمِ اللَّهِ الرَّحْمَـٰنِ الرَّحِيمِApr 25, 2024A response icon1Apr 25, 2024A response icon1
FB OAuth Misconfiguration Leads to Takeover any AccountApr 4, 2024A response icon3Apr 4, 2024A response icon3
Magic Links as Gateways Account Takeoversبِسْمِ اللَّهِ الرَّحْمَـٰنِ الرَّحِيمِMar 3, 2024A response icon3Mar 3, 2024A response icon3
Aspiring Bug Bounty Hunters’ New Year Goals ToolkitAs we stand at the cusp of a new year, it’s the perfect time for aspiring hunters to chart their course toward success. Setting achievable…Dec 21, 2023A response icon1Dec 21, 2023A response icon1
IDOR | My first P2 that Lead to Full PII Exposure.بِسْم اللَّه الرَّحْمن الرَّحِيم . . اللَّهمَّ صَلِّ وَسلَّم وبارك على نَبِينَا مُحمَّدSep 27, 2023A response icon4Sep 27, 2023A response icon4
This Easy Bug will help you Earn Your first Bounty“بسم الله الرحمن الرحيم” “اللهم صلي وسلم وبارك علي نبينا محمد”Mar 25, 2023A response icon7Mar 25, 2023A response icon7
How I got into Nokia HOF in 5 Minsبسم الله الرحمن الرحيمFeb 22, 2023A response icon3Feb 22, 2023A response icon3
How I found XSS on Admin Page without login!IntroductionJan 22, 2023A response icon11Jan 22, 2023A response icon11
My Methodology for Making a Book library with Notion for Bug Bounty and PentestingHow to Use Notion 100% in Your Bug Bounyt and Pentesting Self-Study.Oct 28, 2022A response icon2Oct 28, 2022A response icon2