Krishna AgarwalinInfoSec Write-upsHacking the WordPress sites for fun and profit | Part-1 [ Water ]Hello folks, I am Krishna Agarwal (Kr1shna 4garwal) from India 🇮🇳. An ordinary bug hunter and So called security researcher :)Oct 5, 202215Oct 5, 202215
TheBountyBoxinInfoSec Write-upsCool Recon techniques every hacker misses! Episode 2🔥🔥Welcome to the 2nd Episode of Cool Recon Techniques. We are back with some more cool recon techniques which we think hackers out there…Sep 18, 20225Sep 18, 20225
Ahmad HalabiUltimate Reconnaissance RoadMap for Bug Bounty Hunters & PentestersAdvanced Reconnaissance and Web Application Discovery RoadMap to Find Massive Vulnerabilities.Dec 22, 202114Dec 22, 202114
dinesh Kumar10 Pentesting Tools Every Hacker NeedsIf you’re new to using software for pentesting, here are some tools you need to know about.Mar 7, 20226Mar 7, 20226
Mr. Torjan CaptainExploring Google DorksNote: This article is strictly for educational purpose only.Apr 27, 2022Apr 27, 2022
Anurag__VermainInfoSec Write-ups$$$ Bank 🏦Verification Bypass(Broken Object Level Authorisation)Hey Readers, 👋, Hope you are doing great,Feb 24, 20222Feb 24, 20222
Tarun GargeJPT-eLearnSecurity Junior Penetration Testing Exam Guide.Follow this article if you wanna take eJPT exam.Oct 30, 20211Oct 30, 20211
KaorrosiFinding CSRF Vulnerabilities with BurpSuiteThis assumes that you already have BurpSuite set up as the proxy for your browser!Dec 5, 20211Dec 5, 20211
Gourav DharinLevel Up CodingSpoofing file extensions — Ethical HackingFile extension spoofing is a handy trick when creating trojans. I will be spoofing the ‘.exe’ extension to the ‘.jpg’ extension.Mar 7, 20222Mar 7, 20222