PinnedHow to URLing for Bug Bounties -Mastering URLs : Edition 2025Hi everyone,Feb 27A response icon2Feb 27A response icon2
PinnedHow to JS for Bug Bounties : Edition 2023Hi everyone,May 18, 2023A response icon6May 18, 2023A response icon6
JS for Bug Bounties 2.0 Extreme Edition 2024Hi everyone,Jun 7, 2024A response icon6Jun 7, 2024A response icon6
Hackers Exploiting Markdown’s Functions to Run Malicious CampaignsHello readers! I’m Aditya Shende aka Kongsec, Bounty Hunter, Biker, and Security Researcher from India. In today’s fast-evolving…Mar 13, 2024A response icon1Mar 13, 2024A response icon1
Exploiting Exposed Tokens and API Keys: Edition 2023Introduction: Welcome to my 14th article on exploiting exposed tokens and API keys. In this edition, I will discuss how to approach and…Jun 24, 2023A response icon1Jun 24, 2023A response icon1
How I Discovered and Reported a PII Disclosure VulnerabilityHi everyone,May 5, 2023A response icon1May 5, 2023A response icon1
Quantum Key Distribution: The Revolutionary Encryption Technique Enabling Unbreakable Secure…In the digital age, secure communication is essential for individuals and organizations alike. Encryption has been a popular approach to…May 5, 2023May 5, 2023
The Revolutionary Encryption Technique Enabling Secure Computation on Encrypted DataIn today’s digital world, data privacy and security have become crucial concerns for individuals and organizations alike. Encryption has…May 5, 2023May 5, 2023
EMP as a Weapon in Cybersecurity: A Blessing or a Curse?For many years, cybersecurity experts have debated the use of electromagnetic pulse (EMP) weapons. EMP can be used as a weapon with…May 3, 2023May 3, 2023
Is our VoIP Wire tap safe ???Making phone calls and participating in video conferences from anywhere in the globe is now simple thanks to VoIP (Voice over Internet…May 2, 2023A response icon2May 2, 2023A response icon2