Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!
curl + Postman + brain = 404ping When I built 404ping v0.0.1, it was a tiny experiment. I just...
DVWS (Damn Vulnerable Web Services) is a deliberately vulnerable web application for learning web and...
In July 2024, we launched a Vulnerability Disclosure Program (VDP) on HackerOne. Customers and...
Most people think fuzzers are just “tools that send fast requests.” That’s true. But building a...
( صل علي النبي) Introduction During a recent penetration test, I encountered an...
ToxSec | How to deal with GenAI in bug bounty programs.
A must-have tool for every security researcher, penetration tester, or bug bounty hunter who cares...
A complete guide to start earning money through bug bounty hunting. Table of...
Part 1 of 3 in Git Tales Series Enter fullscreen mode Exit fullscreen mode ...
My Journey: Discovering the Relationship Between Kali Linux and Black Arch As a...
We’ve all been there. You’re browsing a target site, hunting for bugs or debugging an API. You spot...
Part 3 of 3 in Git Tales Series Enter fullscreen mode Exit fullscreen mode ...
Part 2 of 3 in Git Tales Series Enter fullscreen mode Exit fullscreen mode ...
When people first learn about APIs, the textbook definition usually sounds something like this: “An...
Link to article In today’s rapidly evolving digital landscape, cybersecurity has become paramount....
Introduction Let's cut through the noise: the bug bounty landscape of 2025 isn't what...
I found critical vulnerabilities in Lovense that affected 11M+ users. Discovered email disclosure...
Recently, an Authorization Bypass vulnerability was discovered in the Next.js framework (one of the...
Comprehensive Bug Bounty Hunting Methodology This document outlines a detailed methodology...
Credential dumping is a common post-exploitation technique used by attackers to harvest user...
🧠 Why I’m Starting I've decided to begin my bug bounty journey — not because I'm an...
In this post, I share my 100-Hour Rule - how I structure every minute of hunting into focused phases,...
SafeLine is a self-hosted Web Application Firewall (WAF) that operates independently from any...
Web Cache Deception is a vulnerability first described in 2017. It occurs when a caching system —...
🎯 Target Prioritization Not all targets are created equal. Prioritization helps you allocate your...
Timeline June 28, 2022: A security researcher submits a report detailing a critical GraphQL...
** 🛠️ What is Burp Suite? **Burp Suite is one of the most powerful tools for web...
1. Introduction In the evolving landscape of information security, compliance and...
I'm excited to announce the release of Astra v1.1, the latest version of my open-source network...
Today I was reviewing my Telegram channels and realized that I hadn't written a summary of my "first...