Loading...
This site is best viewed in a modern browser with JavaScript enabled.
Something went wrong while trying to load the full version of this site. Try hard-refreshing this page to fix the error.
Web Security
About Web Application Security & Penetration testing.
How to start Bug Bounty Hunting $$$$ in 2024??
The Unwanted Love Letter
My Recon methodology and tools for bug bounty and web security
My Recon Tools and Methodology.
Top Resources For BugHunting - A Comprehensive Guide.
Three Ways To Get Your WHole Organization Involved In Cybersecurity
How I found 130+ Sub-domain Takeover vulnerabilities using Nuclei
Securing Your Small Business: The Vital Role of Cybersecurity
How I Found an Authentication Bypass Vulnerability — CVE-2023–43154
Python for Hackers #7 | Building a multithreaded Subdomain Bruteforcer
Python For Hackers #6 | Building A Recursive Web Crawler
Insider Ambassadors And Security Culture With Michael Montoyo
Chris Wysopal On Lopht, New Threats, And What Cyber Needs
A direct Comparative Overview of TLS 1.2, TLS 1.3, QUIC, MASQUE, WireGuard, and IPsec communication protocols
Understanding the Critical CVE-2023–22515 in Confluence Server
Burpsuite 101 : Going deep Into intruder
Burpsuite 101: Exploring Burp Repeater and Burp Comparer
Burp Suite 101: Exploring Burp Proxy and Target Specification
Burp Suite 101: Understanding Navigation, Dashboard, Configuration
Burpsuite 101: Introduction and Installation
Next Page »