Akash GhoshAPI Hacktics: Unveiling Vulnerabilities in Modern Web APIsHi, I’m Akash Ghosh (myselfakash20), my friend I want to share a recent hunting of mine about API vulnerabilities.7h ago7h ago
Akash GhoshComprehensive Guide to Exploitation Techniques for Bug Bounty Hunters: From Beginner to AdvancedHello, I’m Akash Ghosh, a dedicated Bug Bounty Hunter and Cybersecurity Professional with a passion for exploring and uncovering web…16h ago16h ago
Akash GhoshMastering Recon for Bug Hunters, Part 4: Advanced Strategies & Real-World ExamplesWelcome back to the final installment of our Mastering Recon for Bug Hunters series! In Part 4, we’re diving deep into the most advanced…1d ago1d ago
Akash GhoshMastering Reconnaissance Part 3: Unleashing Advanced Exploitation and Post-Recon TacticsWelcome to Part 3 of the “Mastering Recon for Bug Hunters” series! I’m Akash Ghosh, a seasoned bug bounty hunter and cybersecurity…3d ago3d ago
Akash GhoshMastering Reconnaissance Part 2: Advanced Scanning, Content Discovery, and Automation for Bug…In Part 2 of the “Mastering Reconnaissance” series, we’re stepping up our recon game. This guide will cover port scanning, service…5d ago5d ago
Akash GhoshGoogle Dorking in Bug Hunting: Uncovering Hidden VulnerabilitiesAs cybersecurity experts and bug hunters, we are always on the lookout for creative ways to identify vulnerabilities on the web. One of the…Nov 7Nov 7
Akash GhoshA Step-by-Step Guide to the Bug Hunting Process: From Reconnaissance to ReportingBug hunting is both an art and a science. It requires a methodical approach to uncover vulnerabilities, combined with a creative mindset to…Nov 6Nov 6