PinnedHacked My Way Into Google’s Hall of Fame! 🚀 The Relentless Bug Bounty HuntHello, guys! I’m back! My name is zabit — a passionate ethical hacker and a part-time bug bounty hunter. Today, I’m bringing you a…Feb 191Feb 191
PinnedHow I Found a Sensitive Data Leak in Microsoft!” 🚀🔥Hey everyone, this is zabit! I’m an ethical hacker and a part-time bug bounty hunter. But this story? This one’s different. It’s about how…Feb 162Feb 162
PinnedMastering SQL Injection: Detection, Exploitation & Automation Guide 🚀Hello everyone, my name is xabit. I’m an ethical hacker and cybersecurity researcher. Today, I’ll be teaching you the basics of SQL…Feb 13Feb 13
PinnedPixel Flood Attack: Crashing Web Apps with Oversized ImagesHello, my name is XABIT, and I am an ethical hacker and cybersecurity researcher. Today, we are going to discuss a Denial-of-Service (DoS)…Feb 12Feb 12
PinnedUnderstanding XSS (Cross-Site Scripting) — A Complete GuideHello! My name is XABIT, and I am an ethical hacker and part-time bug bounty hunter. In this write-up, I will teach you everything about…Feb 11Feb 11
Uncovering Secrets: The Importance of JavaScript (.js) File Recon in Bug BountyHello Guys , I’m XABIT , an ethical hacker, cybersecurity researcher, and part-time bug bounty hunter. In today’s write-up, I’ll be…1d ago1d ago
Command Execution in Bug Bounties: How to Find, Test, and ExploitCommand execution vulnerabilities occur when an application improperly processes user-supplied input, allowing an attacker to execute…Feb 15Feb 15
FROM STRUGGLES TO SUCCESS: MY JOURNEY TO THE NASA HALL OF FAMEHello, everyone! My name is zabit . I am a cybersecurity researcher, ethical hacker, and bug bounty hunter with a dream to leave my mark…Dec 18, 20243Dec 18, 20243