PinnedPublished inInfoSec Write-upsFrom Newbie to Pro: My Journey to a $3,000 Bug BountyTwo or Three years ago, I had no idea what bug bounty hunting was. I wasn’t a hacker, nor did I have a formal computer science degree. I…Dec 6, 20247Dec 6, 20247
Published inOSINT TeamScroll, Find, Boom! How I Tripped Over a Bounty in Just 3 Lines of Code“I swear I didn’t mean to find this, it just jumped at me!”1d ago1d ago
Published inInfoSec Write-upsCreativity Over Commands: Why Hacking is 80% Mindset, 20% ToolsOr as I like to call it: “How I stopped worrying and learned to hack like myself.”2d ago12d ago1
Published inSystem WeaknessZero to Pro The Ultimate Guide to CDX API for Your Bug Bounty Recon Journey: Let’s talk about the…Photo by Giulia May on Unsplash4d ago4d ago
Published inInfoSec Write-upsWhy You Need Your Own Recon Strategy in Bug Bounty (And Why Copy-Pasting Won’t Make You Rich 💸)The “Script Kiddie Syndrome” 🧑💻Mar 291Mar 291
Published inInfoSec Write-ups💸 Stealing Money at the Speed of Light: Exploiting Race Conditions for Financial Fraud in…Imagine you’re shopping online, about to check out, and you suddenly realize… what if you could pay once and place the same order multiple…Mar 26Mar 26
Published inOSINT TeamThe Ultimate Guide to CDX API for Bug Bounty ReconUnveiling Hidden Vulnerabilities with CDX APIMar 18Mar 18
Published inInfoSec Write-upsHow I Ethically Hacked a Government Portal: SQL Injection in a Gov. PortalMar 61Mar 61
Published inOSINT TeamCracking the Shield: Advanced WAF Bypass Techniques That Still Work in 2025Web Application Firewalls (WAFs) have evolved, leveraging machine learning, behavioral analysis, and AI-driven detection to block…Mar 5Mar 5
Published inInfoSec Write-upsJavaScript Enumeration for Bug Bounties: Expose Hidden Endpoints & Secrets Like a Pro!Feb 27Feb 27