Bug Bounty

Bug Bounty Tools that I use as a Bug Bounty Hunter

In this article, I will share the best bug bounty tools I personally use as a Bug bounty hunter. Of course, hundreds of tools exist for Prof…

Exploiting SQL Injection at Authorization token

Today In this post, I will be sharing a unique writeup on SQL injection with Authorization Headers token. A little bit intro to Authori…