Ott3rlyCommon 403 Bypasses Part 2Back for more 403 bypasses? In this article, we will check various tools to help with the whole process. Get ready to level up your bypass…Jul 15Jul 15
Ott3rlyAdvanced SQLMap CustomizationDo you know that you can add custom payloads to the SQLMap? This tool is powerful out of the box, but with advanced customization, you can…Jul 8Jul 8
Ott3rlyinInfoSec Write-upsCommon 403 Bypasses Part 1Are you tired of seeing those 403 Forbidden errors that block you while testing? Don’t worry, some effective techniques could help to avoid…Jul 1Jul 1
Ott3rlyinInfoSec Write-upsSQLi WAF Bypass Techniques Part 2In our last session, we learned primary Time-Based SQL injection WAF bypasses. This time, we will move one step further and try to beat WAF…Jun 24Jun 24
Ott3rlyinInfoSec Write-upsSQLi WAF Bypass Techniques Part 1 — Time-Based AttacksWeb Application Firewall is a good but not perfect solution for protecting websites. It’s the defense framework made by request filtering…Jun 17Jun 17
Ott3rlyinInfoSec Write-upsContent Discovery With FFUFDiscover the hidden treasures of truly sensitive files using ffuf tool! It’s time to explore the topic of content discovery.Jun 10Jun 10
Ott3rlyinInfoSec Write-upsYour Own Search Engines For Bug BountyCustomize search engines to show you the bug bounty targets. Let’s explore the way how you can set up custom search engines.Jun 34Jun 34
Ott3rlyinInfoSec Write-upsBuilding Own Nuclei TemplatesIt’s time to break the atoms! We will take a look at how it’s possible to create unique nuclei templates! Don’t miss out, since I will show…May 27May 27
Ott3rlyinInfoSec Write-upsUsing Nuclei At Mass ScaleNuclei is an extremely powerful tool in Bug Bounty. Discover top things that you should know to do better than the majority using this…May 202May 202
Ott3rlyinInfoSec Write-upsXSS Web Application Firewall Bypass TechniquesWe all hate web application firewall! Most likely you have encountered those while testing for cross-site-scripting. If you manage to get…May 134May 134