I just published another writeup in my Bug Bounty Hunting Series: "Choosing Your First Program in Bug Bounties: A Beginner’s Guide"
it4chis3c.medium.com/choosing-your-…
Day 18: Mastering Insecure Deserialization Vulnerability
Uncover hidden Insecure Deserialization Vulnerability flaws with advanced payloads & Defense bypass techniques.
Check out the full blog here: it4chis3c.medium.com/day-18-of-30-d…#BugBounty#30daychallenge
Day 17: Mastering Path/Directory Traversal Vulnerability
Uncover hidden Path/Directory Traversal Vulnerability flaws with advanced payloads & Defense bypass techniques.
Check out the full blog here: it4chis3c.medium.com/day-17-of-30-d…#BugBounty#30daychallenge
Day 16: Mastering Subdomain Takeover Vulnerability
Uncover hidden Subdomain Takeover Vulnerability flaws with advanced payloads & Defense bypass techniques.
Check out the full blog here: it4chis3c.medium.com/day-16-of-30-d…#BugBounty#30daychallenge
5 Followers 231 FollowingAspiring Computer Science Professional | Passionate about Technology and Leadership | Engaged in Community Building and Knowledge Sharing
12 Followers 227 FollowingCoding aficionado and tech enthusiast. Passionate about creating software solutions that drive innovation. Let’s dive into the world of coding and explore
3K Followers 0 FollowingWe teach OSINT from multiple perspectives. InfoSec experts, journalists, law enforcement and other intelligence specialists read us to grow their skills faster.
2K Followers 1 FollowingI was sitting alone, lost, in a park. @CircleNinja saw me one day, hired me and that's how I am here full time working at your service. 🤖
14K Followers 4K FollowingWeb AppSec Researcher | #❶ in Microsoft's Top 100 Security Researcher List -2018 | #❹ in Microsoft's Most Valuable Researcher List -2019 & 2020 | Thanks #🆇🆂🆂
83K Followers 16 FollowingTrend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
37K Followers 125 FollowingDetect real, exploitable vulnerabilities. Harness the power of Nuclei for fast and accurate findings without false positives.
37K Followers 184 FollowingNuclei uses a vast templating library to scan applications, cloud infrastructure, and networks to find and remediate vulnerabilities.
285K Followers 71 FollowingPart of @CISAgov, we respond to major incidents, analyze threats, and exchange critical cybersecurity information with partners around the world.
6K Followers 20 FollowingSquareX helps detect, mitigate & threat-hunt web attacks against end-users in real-time, including malicious sites, files, scripts, networks and more.
213K Followers 532 FollowingWe improve the security of apps with community-led open source projects, 260 local chapters, and tens of thousands of members worldwide. Famous for OWASP Top 10
52K Followers 616 FollowingGrzegorz Niedziela - a hacker who documents his hacking journey by creating and curating the best content about bug bounty and offensive security.
190K Followers 0 FollowingWe make learning web hacking and security easier. Online systems, code review, videos & courses that can be used to understand, test and exploit bugs!
108K Followers 2 FollowingMonitor your external network, search the Internet of Things and perform empirical market research. You can also find us on https://t.co/nPLFbFy8R5
56K Followers 3 FollowingOfficial account maintained by the CVE™ Program to notify the community of new CVE IDs. Posts contain abbreviated details. Full CVE Records on https://t.co/ALn4YvUtom
No recent Favorites. New Favorites will appear here.