PinnedPublished inOSINT TeamExposing the Dark Side of Google Dorks: How I Extracted Millions of Emails.How I was able to scrape large data of emails from the top mail domains(gmail,yahoo,hotmail etc..), .gov, .edu on of all countries and…Nov 11, 20243Nov 11, 20243
PinnedPublished inOSINT TeamAutomating Bug Bounty Hunts with Bash: A Beginner-Friendly GuideAutomating your methodologies makes life easier, every Bug hunters has their own script for automating their hunt. In this guide We’re…Oct 30, 20242Oct 30, 20242
PinnedPublished inOSINT TeamMy step by step process on how I do Bug Bounty Hunting: From finding targets to Submission of the…Firstly here’s a brief intro about me I’m an Application Security Engineer at Day & Penetration Tester at Night, Funny right!? I help…Oct 25, 2024Oct 25, 2024
Published inOSINT TeamOne way hackers stole API keys, Passwords, Tokens and Secrets.Disclaimer: Any misuse or illegal activities conducted using the methodologies outlined below are solely your responsibility and at your…Dec 10, 2024Dec 10, 2024
Fighting Fraud and Scams: Strengthening the First Line of Defense.Scams are very prominent this days and it’s much harder to track and isolate their movement, As fraudsters develop more sophisticated…Dec 1, 2024Dec 1, 2024
Published inOSINT TeamUnderstanding the Recent GCash Scam: Could It Be a 0-Click Exploit?GCash, one of the Philippines’ most popular digital wallets, has become a target of a widespread scam that has left many users concerned…Nov 9, 2024Nov 9, 2024
Published inOSINT TeamBehind the Scenes: How I Hacked one of the largest Amusement Park in the Philippines.This happened 2 years ago when I was doing some test on my Automation script the results of our query for hunting gave us thisNov 6, 2024Nov 6, 2024
Published inHacking101Unleashing the Bug Hunter Within: A Curated Toolkit and Proven ProcessTired of the same old bug-hunting routine? Ready to elevate your security game and uncover vulnerabilities that others miss? Dive into our…Nov 5, 20242Nov 5, 20242
Published inOSINT TeamMy step by step process on how I do Bug Bounty Hunting: From finding targets to Submission of the…So after our recon part where we gather all of the subdomains we’ll proceed to check all live host and crawl it, the way I do it is to use…Oct 29, 20242Oct 29, 20242
How to install WhatWeb & usage samples.WhatWeb is a versatile web scanner for identifying information about websites, like the technologies they use, running on different…Oct 25, 20241Oct 25, 20241