Bug bounty Archives ~ Easy Hack

How to bypass Cloudflare WAF

Hey guys, I was doing Penetration testing for the private company. I am used to of manual testing instead of tools. At...

Sub-domain enumeration techniques

What is Sub-domain enumeration? Sub-domain means Sub-division of domain. As a Penetration Tester most of...

WordPress vulnerability version 4.9.6

WordPress exploit | Introducing WordPress New Vulnerabilities to Delete Sensitive Files and Reset WordPress, as well as Other Accessibility Google...

Bypass firewalls using DNS history

This script (ab)uses DNS history records. This script will search for old DNS A records and check if the server replies for that...

How to Find SQL Injection Attack Vulnerability?

Today, I am sharing my resource to find SQLi vulnerability. SQLi is the technique to take over the database of the website. SQLi is the...

XSS fuzzer Generate XSS payloads

Xss fuzzer is a simple tool for generating xss payloads. It is mainly used in bug bounty programs. It generates XSS payloads based on user-defined...

Bypass Email filter

In this blog, I am talking about how to email filter bypass. Once I have participated in the bug bounty program, I registered in Web...

Safari universal cross site scripting

The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that is mishandled...

Google cardboard send sensitive information

Google Cardboard is a virtual-reality platform developed by Google. TheCardboard app heps you launch your VR, new experiences, and view. What is Issue? The Google Cardboard application...

Facebook Bug – Missing functional level access control in facebook albums

Hi All. So this bug is related to facebook albums in which a blocked album contributor have some missing functional level access control. Who is...

Latest news