PinnedHow Getting Stuck Led Me to a $3,XXX Bounty: The Recon That Almost Meant NothingHi everyone, I’m Aditya Shende (aka Kong) from India -a bug bounty hunter, biker, and cybersecurity researcher . As July is my birthday…Jun 24A response icon6Jun 24A response icon6
How to URLing for Bug Bounties -Mastering URLs : Edition 2025Hi everyone,Feb 27A response icon2Feb 27A response icon2
JS for Bug Bounties 2.0 Extreme Edition 2024Hi everyone,Jun 7, 2024A response icon8Jun 7, 2024A response icon8
Hackers Exploiting Markdown’s Functions to Run Malicious CampaignsHello readers! I’m Aditya Shende aka Kongsec, Bounty Hunter, Biker, and Security Researcher from India. In today’s fast-evolving…Mar 13, 2024A response icon1Mar 13, 2024A response icon1
Exploiting Exposed Tokens and API Keys: Edition 2023Introduction: Welcome to my 14th article on exploiting exposed tokens and API keys. In this edition, I will discuss how to approach and…Jun 24, 2023A response icon1Jun 24, 2023A response icon1
How to JS for Bug Bounties : Edition 2023Hi everyone,May 18, 2023A response icon6May 18, 2023A response icon6
How I Discovered and Reported a PII Disclosure VulnerabilityHi everyone,May 5, 2023A response icon1May 5, 2023A response icon1
Quantum Key Distribution: The Revolutionary Encryption Technique Enabling Unbreakable Secure…In the digital age, secure communication is essential for individuals and organizations alike. Encryption has been a popular approach to…May 5, 2023May 5, 2023
The Revolutionary Encryption Technique Enabling Secure Computation on Encrypted DataIn today’s digital world, data privacy and security have become crucial concerns for individuals and organizations alike. Encryption has…May 5, 2023May 5, 2023
EMP as a Weapon in Cybersecurity: A Blessing or a Curse?For many years, cybersecurity experts have debated the use of electromagnetic pulse (EMP) weapons. EMP can be used as a weapon with…May 3, 2023May 3, 2023