Ott3rlyinInfoSec Write-upsAXIOM vs ShadowCloneCompare AXIOM and ShadowClone — two of the most robust recon orchestration tools.Jul 22Jul 22
Ott3rlyinInfoSec Write-upsCommon 403 Bypasses Part 2Back for more 403 bypasses? In this article, we will check various tools to help with the whole process. Get ready to level up your bypass…Jul 15Jul 15
Ott3rlyinInfoSec Write-upsAdvanced SQLMap CustomizationDo you know that you can add custom payloads to the SQLMap? This tool is powerful out of the box, but with advanced customization, you can…Jul 81Jul 81
Ott3rlyinInfoSec Write-upsCommon 403 Bypasses Part 1Are you tired of seeing those 403 Forbidden errors that block you while testing? Don’t worry, some effective techniques could help to avoid…Jul 1Jul 1
Ott3rlyinInfoSec Write-upsSQLi WAF Bypass Techniques Part 2In our last session, we learned primary Time-Based SQL injection WAF bypasses. This time, we will move one step further and try to beat WAF…Jun 24Jun 24
Ott3rlyinInfoSec Write-upsSQLi WAF Bypass Techniques Part 1 — Time-Based AttacksWeb Application Firewall is a good but not perfect solution for protecting websites. It’s the defense framework made by request filtering…Jun 17Jun 17
Ott3rlyinInfoSec Write-upsContent Discovery With FFUFDiscover the hidden treasures of truly sensitive files using ffuf tool! It’s time to explore the topic of content discovery.Jun 10Jun 10
Ott3rlyinInfoSec Write-upsYour Own Search Engines For Bug BountyCustomize search engines to show you the bug bounty targets. Let’s explore the way how you can set up custom search engines.Jun 35Jun 35
Ott3rlyinInfoSec Write-upsBuilding Own Nuclei TemplatesIt’s time to break the atoms! We will take a look at how it’s possible to create unique nuclei templates! Don’t miss out, since I will show…May 271May 271
Ott3rlyinInfoSec Write-upsUsing Nuclei At Mass ScaleNuclei is an extremely powerful tool in Bug Bounty. Discover top things that you should know to do better than the majority using this…May 202May 202