Ott3rlyXSS Web Application Firewall Bypass TechniquesWe all hate web application firewall! Most likely you have encountered those while testing for cross-site-scripting. If you manage to get…7 min read·May 13, 2024----
Ott3rlyBypass Firewall by Finding Origin IPBypass WAF by finding origin IP address as a method. We will explore multiple ways how you can do it.5 min read·May 6, 2024--1--1
Ott3rlyinInfoSec Write-upsRecon on Steroids — Discover EVEN MORE SubdomainsFind websites that nobody else has found. Explore unique methods to discover more core subdomains to increase your bug bounty targets.5 min read·Apr 29, 2024----
Ott3rlyinInfoSec Write-upsPort Scanning for Bug BountiesAre you using the same port scanning techniques as everybody else and not getting desirable results? It’s time to change your approach!6 min read·Apr 22, 2024--3--3
Ott3rlyinInfoSec Write-upsMastering Shodan Search EngineShodan Dorking lets you find many things — servers, webcams, washing machines, etc. It could be a true gold mine in your Bug Bounty…4 min read·Apr 19, 2024--1--1
Ott3rlyinInfoSec Write-upsActive DNS Recon using AXIOMAre you interested in getting a lot of subdomains of big targets? You will learn how you can do active DNS bruteforce using puredns.5 min read·Apr 15, 2024--1--1
Ott3rlyinInfoSec Write-upsTurning Wayback Machine Into GOLD MINING MACHINELearn how to turn Wayback machine, into a gold mining machine! Explore how to analyze historical data, to get some interesting leads!5 min read·Apr 12, 2024--2--2
Ott3rlyinInfoSec Write-upsSkyrocket Your Bug Bounty Success Using These CrawlersDiscover the best crawlers of top-tier bug bounty hunters used in the industry. These powerful crawlers that can skyrocket your success.9 min read·Mar 27, 2024--1--1
Ott3rlyinInfoSec Write-upsMass Blind Server-Side Testing Setup For Bug BountyDiscover how to hunt for Out-Of-Bound issues. Set up the OOB Server to detect critical severity findings which could lead to large…8 min read·Feb 1, 2024--1--1