πBug Bounty
Hunting MethodologyAPI BAC leads to PII Data DisclosureMisconfigured OATUH leads to Pre-Account TakeoverAutomating Bug Bounty with GitHub ActionsMy Methodlogy with Public BBPExploring Subdomains: From Enumeration to Takeover Victory
Last updated