104 тысяч подписчиков
351 видео
||XSS cloudflare Bypass || Report -30|| Bug Bounty ||403 bypass ||
Learn Cybersecurity By Doing Simple Projects at Home😎|Part-2|
Advent of Cyber 2023 in Tamil || Tryhackme||
Can I Dive Into Bug Bounty Without Cybersecurity Basics?🤔||
Cloudflare Improper session management POC || 200$ Bounty||
Popular Sites to Practice Hacking😈
Clickjacking Triaged! || P5/Informative To Triaged! ||Real-Time Exploitation||
OS Command Injection in Upload feature || $$$$|| SQLI||
Atlassian Confluence Zero-day RCE || Detection and Exploitation|| Jira || CVE-2022-26134|| live ||
Kali linux for Ethical Hackers 2021||Beginners to Advanced|| Tamil || Linux||
Automate XSS using XSS validator with Burp Suite || Tamil ||
Escalating Default Credentials to RCE ||
Automate Google Dorks with this GUI Tool! || Bug Bounty Helper ||
Sensitive Info Disclosure Through API || $750 Bounty|| || Ethical Hacking||2023||Bug Bounty ||
6000+ Publicly disclosed Reports || Hackerone Reports || H1 || Hackerone || 2022|| Bug Bounty||
URL Tampering leads to Unsubscribing Users marketing mail||HoneyComb.io || POC||live site||2022||
Top 5 CTF Platforms for Beginners❤️
RCE via Symfony Framework || 3362$ || Escalating Phpinfo() to RCE||2023||
Find Server Origin IP with Cloud Fail|| Cloudflare Bypass || Part-1|| Bug Bounty || Live site ||
Bug Bounty expectations vs Reality 😂🔥
Basics Things to Know before starting Bug Bounty
Improper JWT Validation Leads to IDOR ||
Bypassing No rate limit Flaw via Host Header Manipulation || Bypassing Cloudflare WAF|| Bug Bounty||
Find This Easy P1 Bug within 5mIns - No Burpsuite Required || ATO || P1||
If you want it You wanna earn it 💀
Blogs and POCs are the Key😈
NASA Bypassing Email Verification Authentication||
How To Report a Bug Which is not a part of VDP program ?|| Live Example ||
Fake Tinder Account got Verified || Bypass Authentication ||
Weak password policy Bug POC || Bug Bounty || Hall of fame || Live site ||2022||
I got Hall of Fame in Nasa 😍 ||
How I Got Listed in UN Hall Of Fame😍 || IDOR || EXIF||
Top 5 Recognised Cyber Forensics Tools
Customizing Kali Linux: How to Display Your Name and Change the Terminal Color |
Open Source Bug Bounty Tips || Part-2 ||
Mistakes to Avoid in Bug Bounty Part-2 ||
403 Forbidden Bypass to Access Sensitive File || Report -38|| Bug Bounty ||403 Bypass||2022|| P1||
Blind XSS to SSRF || $500 ||Bug Bounty || Blog Series || Ethical Hacking||2023||
Top 5 Scripting Languages Used by Hackers 😈
3 Easy Tricks to Bypass Cloudflare WAF For File Upload || Bug Bounty || 403 Bypass || WAF Bypass ||#
Virtual Box and kali Linux latest Version Installation || VirtualBox 7.0.2|| kali Linux 2022.3||2022
JIRA Path Traversal POC || CVE-2021-26086 || P3 || Information Disclosure || 2021|| Live site||
Exploiting Boolean Based SQLI|| Bug Bounty|| Report-28|| VPD||P1|| My new Blog||