Methodology
Methodology
Methodology
  • 🧑‍🏫My Methodologies
  • 🕶️Google Dorks
  • 🌀Possible "Content-Type" Header values
  • 📜Scripts written by me for XSS
  • 🔼Subdomain Takeover
  • ✍️Tips and Write-ups
  • 🔧Tools and their Uses
  • 🎯XSS nuclei template CVE-2023-24488.yaml
  • 🕵️Recon strategies by other Hackers
    • 🔎Blind SQL Injection Detection and Exploitation (Cheat Sheet)
    • 🔎How i got more than 100 vulnerabilities in just one site? (zseano-challenge)
    • 🔎JS is l0ve ❤️.
    • 🔎My top 5 bookmarks that I consistently use for bug bounty and penetration testing.
    • 🔎Find the treasure hidden inside JavaScript
    • 🔎Deep-Subdomains-Enumeration-Methodology
    • 🔎Extensive Recon Guide For Bug Hunting
    • 🔎Finding Time Based SQLi injections : Edition 2023
    • 🔎From Self XSS to Account Take Over(ATO)
    • 🔎How I hacked NASA and got 8 bugs ?
    • 🔎How I was able to find 4 Cross-site scripting (XSS) on vulnerability disclosure program ?
    • 🔎Leakage of credential data for full control over the target.
    • 🔎Recon Like a Boss
    • 🔎Recon With Me
    • 🔎Simple Recon Methodology
    • 🔎SQL injection through HTTP headers
    • 🔎How to Get Unique Subdomains on Large scope
    • 🔎Static Analysis of Client-Side JavaScript for pen testers and bug bounty hunters
  • 🎯subdomain-enumeration
  • 🛠️CRLF
  • ❌xss
  • ⛴️Ghetto XSS Cheatsheet
  • 🚀Oneliners
Powered by GitBook
On this page
  • Bug Bounty Handbook: (https://gowthams.gitbook.io/bughunter-handbook/)
  • Bug Bounty Tips: (https://gowsundar.gitbook.io/book-of-bugbounty-tips/)
  • Subdomain Enumeration
  • Subdomain Enumeration Guide
  • Writeup About XSS Finding
  • Writeup about SQL Injection
  • 403 Bypass tool:
  • Filter Subdomains:
  • Sort unique domains based on their content length
  • Upload shell via SQLmap into Database

Tips and Write-ups

PreviousSubdomain TakeoverNextTools and their Uses

Last updated 2 months ago

Bug Bounty Handbook: ()

Bug Bounty Tips: ()


Subdomain Enumeration

The best terminal-based subdomain scanner tools to find subdomains

  • AMASS

  • SubBrute

  • Knock

  • DNSRecon

  • Sublist3r

  • AltDNS

  • Axiom

  • Haktrails

  • Anubis

  • Lepus

  • subfinder

Subdomain Enumeration Guide

Writeup About XSS Finding

Writeup about SQL Injection

403 Bypass tool:

Filter Subdomains:

awk -F[/.] 'NF > 5' subdomains.txt 

Sort unique domains based on their content length

cat cl.txt | awk '{print $NF, $0}' | sort -u -k1,1 | cut -d' ' -f2- 

Upload shell via SQLmap into Database

✍️
https://gowthams.gitbook.io/bughunter-handbook/
https://gowsundar.gitbook.io/book-of-bugbounty-tips/
https://kingcoolvikas.medium.com/how-i-was-able-to-see-sensitive-information-on-one-of-the-indias-best-school-website-5800b5ab834c
https://ajaksecurity.medium.com/how-to-become-a-successful-bug-bounty-hunter-in-2023-f3c1499959da
https://bxmbn.medium.com/
https://infosecwriteups.com/bug-bounty-hunting-methodology-tools-tips-tricks-blogs-books-6f84cda7ce34
https://sidxparab.gitbook.io/subdomain-enumeration-guide/passive-enumeration/passive-sources
https://infosecwriteups.com/how-i-was-able-to-find-50-cross-site-scripting-xss-security-vulnerabilities-on-bugcrowd-public-ba33db2b0ab1
https://medium.com/@a7madhacck/how-i-found-my-first-sql-injection-2-in-two-different-website-9c6c324b53c
GitHub - Dheerajmadhukar/4-ZERO-3: 403/401 Bypass Methods + Bash Automation + Your Support ;)GitHub
Logo