Bug bounty

Google dorks to find sqli, lfi, xss, rfi,cctv camers parameters

GOOGLE DORKS TO FIND SQLI, LFI. XSS, RFI, CCTV CAMERAS Google Dorking or Google hacking refers to using Google search techniques to hack into vulnerable sites or search for information that is not available in public search results. The Google search engine works similarly to an interpreter using search strings and operators. For example, you …

Google dorks to find sqli, lfi, xss, rfi,cctv camers parameters Read More »

penetration testing

Web application penetration testing roadmap

Introduction Today, I am going to share resources to get a kickstart in bug bounty or web  application penetration testing, followed by the history of internet, Web and Server Technology, Setting up the lab with BurpSuite and bWAPP, Mapping the application and attack surface, Understanding and exploiting OWASP top 10 vulnerabilities, Session management testing, Bypassing …

Web application penetration testing roadmap Read More »

How to use HTTPX ?

What is HTTPX ? httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. Features of HTTPX ? httpx is a fast and multi-purpose HTTP toolkit allow to run multiple Simple and modular code base making it easy …

How to use HTTPX ? Read More »

How to use subfinder

How to use subfinder ?

What is subfinder ? Subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and is optimized for speed. subfinder is built for doing one thing only – passive subdomain enumeration, and it does that very well. Installation Subfinder requires go1.17 to …

How to use subfinder ? Read More »