PinnedPwndec0c0Automating Bug Bounty Hunts with Bash: A Beginner-Friendly GuideAutomating your methodologies makes life easier, every Bug hunters has their own script for automating their hunt. In this guide We’re…2d ago2d ago
PinnedPwndec0c0My step by step process on how I do Bug Bounty Hunting: From finding targets to Submission of the…Firstly here’s a brief intro about me I’m an Application Security Engineer at Day & Penetration Tester at Night, Funny right!? I help…Oct 25Oct 25
Pwndec0c0Stay Secure: How to Use the “+” Sign in Gmail to Track Account Leaks.Maybe some of you already know this but I still want to reiterate this since Data leaks, Unsolicited emails spams by third party and other…12h ago12h ago
Pwndec0c0My step by step process on how I do Bug Bounty Hunting: From finding targets to Submission of the…So after our recon part where we gather all of the subdomains we’ll proceed to check all live host and crawl it, the way I do it is to use…3d ago3d ago
Pwndec0c0How to install WhatWeb & usage samples.WhatWeb is a versatile web scanner for identifying information about websites, like the technologies they use, running on different…Oct 25Oct 25
Pwndec0c0One Payload for Bugbounty(X$$)!One night out of nowhere I was thinking can you actually earn in bug bounty with just one payload?? and guess what I tried it immediately…Oct 231Oct 231