Published inInfoSec Write-upsAXIOM vs ShadowCloneCompare AXIOM and ShadowClone — two of the most robust recon orchestration tools.Jul 22Jul 22
Published inInfoSec Write-upsCommon 403 Bypasses Part 2Back for more 403 bypasses? In this article, we will check various tools to help with the whole process. Get ready to level up your bypass…Jul 15Jul 15
Published inInfoSec Write-upsAdvanced SQLMap CustomizationDo you know that you can add custom payloads to the SQLMap? This tool is powerful out of the box, but with advanced customization, you can…Jul 81Jul 81
Published inInfoSec Write-upsCommon 403 Bypasses Part 1Are you tired of seeing those 403 Forbidden errors that block you while testing? Don’t worry, some effective techniques could help to avoid…Jul 1Jul 1
Published inInfoSec Write-upsSQLi WAF Bypass Techniques Part 2In our last session, we learned primary Time-Based SQL injection WAF bypasses. This time, we will move one step further and try to beat WAF…Jun 24Jun 24
Published inInfoSec Write-upsSQLi WAF Bypass Techniques Part 1 — Time-Based AttacksWeb Application Firewall is a good but not perfect solution for protecting websites. It’s the defense framework made by request filtering…Jun 17Jun 17
Published inInfoSec Write-upsContent Discovery With FFUFDiscover the hidden treasures of truly sensitive files using ffuf tool! It’s time to explore the topic of content discovery.Jun 101Jun 101
Published inInfoSec Write-upsYour Own Search Engines For Bug BountyCustomize search engines to show you the bug bounty targets. Let’s explore the way how you can set up custom search engines.Jun 36Jun 36
Published inInfoSec Write-upsBuilding Own Nuclei TemplatesIt’s time to break the atoms! We will take a look at how it’s possible to create unique nuclei templates! Don’t miss out, since I will show…May 271May 271
Published inInfoSec Write-upsUsing Nuclei At Mass ScaleNuclei is an extremely powerful tool in Bug Bounty. Discover top things that you should know to do better than the majority using this…May 202May 202