Open in app

Sign In

Write

Sign In

Faiyaz Ahmad
Faiyaz Ahmad

1K Followers

Home

About

Nov 16, 2022

HOW TO CRAWL LINKS LIKE A PRO!

Hi everyone! I hope you all are doing good. In this article, we are going to learn how we can crawl more links of a domain to increase our scope. If you are wondering “why we would ever do that?” The answer is simple: To increase the chances of getting…

Bug Bounty

3 min read

HOW TO CRAWL LINKS LIKE A PRO!
HOW TO CRAWL LINKS LIKE A PRO!
Bug Bounty

3 min read


Nov 4, 2022

BUG BOUNTY: FIND HIDDEN PARAMETERS

Hey everyone! I hope you all are doing good and hunting bugs. In this article, we are going to learn how to find hidden parameters in web application. I am actually not very active on Medium because me and my friend were creating a platform which aims to provide cybersecurity…

Bug Bounty

4 min read

BUG BOUNTY: FIND HIDDEN PARAMETERS
BUG BOUNTY: FIND HIDDEN PARAMETERS
Bug Bounty

4 min read


Oct 31, 2022

TOP 5 AWESOME BUG BOUNTY BOOKS FOR BEGINNERS THAT YOU SHOULD KNOW

This article was originally published on BePractical Want to know the best way to learn bug bounty hunting? Here are 5 bug bounty books for beginners that you should read! FIRST TIME VISITED OUR WEBSITE???? If yes, then you are missing a lot! We are providing free cybersecurity & web…

Cybersecurity

6 min read

TOP 5 AWESOME BUG BOUNTY BOOKS FOR BEGINNERS THAT YOU SHOULD KNOW
TOP 5 AWESOME BUG BOUNTY BOOKS FOR BEGINNERS THAT YOU SHOULD KNOW
Cybersecurity

6 min read


Sep 19, 2022

THE BUG OFTEN IGNORED: BLIND XSS

INTRODUCTION Hi everyone! I hope you all are doing good and I’m so sorry for posting article after a very long time. Before we dive deep in this article, Let me ask you a question, Have you ever tried to find a blind xss while doing bug bounty? …

Cybersecurity

4 min read

THE BUG OFTEN IGNORED: BLIND XSS
THE BUG OFTEN IGNORED: BLIND XSS
Cybersecurity

4 min read


Jul 25, 2022

OPEN REDIRECT VULNERABILITIES: ESCALATING TO XSS

This article was originally published at BePractical INTRODUCTION A lot of bug bounty hunters usually just reports the vulnerability that they found directly to the program without understanding the impact of it. Although this is completely fine, but sometimes it restricts you to get the bounty you deserve. For example, If…

Cybersecurity

4 min read

OPEN REDIRECT VULNERABILITIES: ESCALATING TO XSS
OPEN REDIRECT VULNERABILITIES: ESCALATING TO XSS
Cybersecurity

4 min read


Jul 23, 2022

Bug Bounty: Hunting Open Redirect Vulnerabilities For $$$

This article was originally published at BePractical INTRODUCTION Do you know that you can earn up to $1000 by finding open redirect vulnerabilities? Well, it turns out that most people underestimate open redirect vulnerabilities because of its nature. For those who doesn’t know about open redirect vulnerability, It is a web…

Cybersecurity

3 min read

Bug Bounty: Hunting Open Redirect Vulnerabilities For $$$
Bug Bounty: Hunting Open Redirect Vulnerabilities For $$$
Cybersecurity

3 min read


Jul 19, 2022

DNS SPOOF ATTACK: EVERYTHING YOU NEED TO KNOW

This article was originally published at BePractical Learn everything about dns spoof attack from basics to advanced INTRODUCTION Hi everyone! Suppose you are in your WiFi network and trying to book a movie ticket online. You opened the website there is no sign of phishing and everything seems nice. You buy…

Penetration Testing

3 min read

DNS SPOOF ATTACK: EVERYTHING YOU NEED TO KNOW
DNS SPOOF ATTACK: EVERYTHING YOU NEED TO KNOW
Penetration Testing

3 min read


Jul 18, 2022

Bug Bounty: Blind XSS Payloads Explained

This article was originally posted on bepractical.tech INTRODUCTION Hi everyone! In this article, you will learn about how to craft blind xss payloads to get yourself bounties. Before we dive deep in this article, let us first learn about some few things: What is XSS(Cross Site Scripting)? In simple terms, It…

Cybersecurity

4 min read

Bug Bounty: Blind XSS Payloads Explained
Bug Bounty: Blind XSS Payloads Explained
Cybersecurity

4 min read


Jun 28, 2022

Giveaway #2: The Ultimate Guide to Hunt Account Takeover(2022)

INTRODUCTION Hey everyone! Do you want to learn all about account takeover from scratch? If yes, then welcome to this amazing course “The Ultimate Guide to Hunt Account Takeover” that will teach you everything from basic to advance. Curriculum

Cybersecurity

2 min read

Giveaway #2: The Ultimate Guide to Hunt Account Takeover(2022)
Giveaway #2: The Ultimate Guide to Hunt Account Takeover(2022)
Cybersecurity

2 min read


Jun 12, 2022

HOW I GOT GOOGLE’S HALL OF FAME?

Introduction Hi everyone, In this article I am going to show you how i got google’s hall of fame by finding security vulnerability in one of their acquisition. So, let’s get started!

Cybersecurity

3 min read

HOW I GOT GOOGLE’S HALL OF FAME?
HOW I GOT GOOGLE’S HALL OF FAME?
Cybersecurity

3 min read

Faiyaz Ahmad

Faiyaz Ahmad

1K Followers

Learn cybersecurity for free: https://bepractical.tech

Following
  • Vickie Li

    Vickie Li

  • nynan

    nynan

  • Prasan singh

    Prasan singh

  • Avinash Jain (@logicbomb)

    Avinash Jain (@logicbomb)

  • Alg0rithmcoderzz

    Alg0rithmcoderzz

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech