Open in app

Sign in

Medium Logo
Write

Sign in

Ott3rly
Ott3rly

4.7K followers

Home

About

InfoSec Write-ups

Published in

InfoSec Write-ups

AXIOM vs ShadowClone

Compare AXIOM and ShadowClone — two of the most robust recon orchestration tools.

Jul 22, 2024
AXIOM vs ShadowClone
AXIOM vs ShadowClone
Jul 22, 2024
InfoSec Write-ups

Published in

InfoSec Write-ups

Common 403 Bypasses Part 2

Back for more 403 bypasses? In this article, we will check various tools to help with the whole process. Get ready to level up your bypass…

Jul 15, 2024
Common 403 Bypasses Part 2
Common 403 Bypasses Part 2
Jul 15, 2024
InfoSec Write-ups

Published in

InfoSec Write-ups

Advanced SQLMap Customization

Do you know that you can add custom payloads to the SQLMap? This tool is powerful out of the box, but with advanced customization, you can…

Jul 8, 2024
1
Advanced SQLMap Customization
Advanced SQLMap Customization
Jul 8, 2024
1
InfoSec Write-ups

Published in

InfoSec Write-ups

Common 403 Bypasses Part 1

Are you tired of seeing those 403 Forbidden errors that block you while testing? Don’t worry, some effective techniques could help to avoid…

Jul 1, 2024
Common 403 Bypasses Part 1
Common 403 Bypasses Part 1
Jul 1, 2024
InfoSec Write-ups

Published in

InfoSec Write-ups

SQLi WAF Bypass Techniques Part 2

In our last session, we learned primary Time-Based SQL injection WAF bypasses. This time, we will move one step further and try to beat WAF…

Jun 24, 2024
SQLi WAF Bypass Techniques Part 2
SQLi WAF Bypass Techniques Part 2
Jun 24, 2024
InfoSec Write-ups

Published in

InfoSec Write-ups

SQLi WAF Bypass Techniques Part 1 — Time-Based Attacks

Web Application Firewall is a good but not perfect solution for protecting websites. It’s the defense framework made by request filtering…

Jun 17, 2024
SQLi WAF Bypass Techniques Part 1 — Time-Based Attacks
SQLi WAF Bypass Techniques Part 1 — Time-Based Attacks
Jun 17, 2024
InfoSec Write-ups

Published in

InfoSec Write-ups

Content Discovery With FFUF

Discover the hidden treasures of truly sensitive files using ffuf tool! It’s time to explore the topic of content discovery.

Jun 10, 2024
Content Discovery With FFUF
Content Discovery With FFUF
Jun 10, 2024
InfoSec Write-ups

Published in

InfoSec Write-ups

Your Own Search Engines For Bug Bounty

Customize search engines to show you the bug bounty targets. Let’s explore the way how you can set up custom search engines.

Jun 3, 2024
6
Your Own Search Engines For Bug Bounty
Your Own Search Engines For Bug Bounty
Jun 3, 2024
6
InfoSec Write-ups

Published in

InfoSec Write-ups

Building Own Nuclei Templates

It’s time to break the atoms! We will take a look at how it’s possible to create unique nuclei templates! Don’t miss out, since I will show…

May 27, 2024
1
Building Own Nuclei Templates
Building Own Nuclei Templates
May 27, 2024
1
InfoSec Write-ups

Published in

InfoSec Write-ups

Using Nuclei At Mass Scale

Nuclei is an extremely powerful tool in Bug Bounty. Discover top things that you should know to do better than the majority using this…

May 20, 2024
2
Using Nuclei At Mass Scale
Using Nuclei At Mass Scale
May 20, 2024
2
Ott3rly

Ott3rly

4.7K followers

I write stories about Bug Bounty Hunting and security research.

Following
  • Zonduhackerone

    Zonduhackerone

  • m0uka

    m0uka

  • Alex Birsan

    Alex Birsan

  • mert tasci

    mert tasci

  • Renwa

    Renwa

See all (27)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech