PinnedShubham TiwariDeep-Subdomains-Enumeration-MethodologyMastering the art of subdomain enumeration is a crucial skill for those seeking to unlock the full potential of web architecture. By…Jun 13, 20232Jun 13, 20232
Shubham TiwariAutomating Subdomain Enumeration to Discover Critical VulnerabilitiesHello, I’m Shubham Tiwari, commonly known as Rooter in the cybersecurity space. Today, I’m going to share how I identified a critical…Sep 153Sep 153
Shubham TiwariXSS Automation Finding with RooterI’m Shubham Tiwari, and I’ve been actively involved in bug bounty hunting for quite some time. In my journey, I’ve inspired myself to…Apr 82Apr 82
Shubham TiwariCritical Vulnerability in PostgreSQL JDBC Driver — Understanding CVE-2024–1597Hey there, fellow cybersecurity enthusiasts!Mar 21Mar 21
Shubham TiwariWifi Soft Unibox Administration 3.0 Login Page ExploitIntroductionSep 8, 2023Sep 8, 2023
Shubham TiwariMastering Bug Bounty Hunting: A Comprehensive Methodology by Shubham TiwariIntroduction: In the realm of cybersecurity, bug bounty hunting has evolved into a dynamic and rewarding pursuit. Join me, Shubham Tiwari…Aug 26, 20231Aug 26, 20231
Shubham TiwariUnveiling Vulnerabilities: Navigating the Realm of CVE DiscoveryIntroduction: In the intricate landscape of cybersecurity, my role as a full-time bug hunter is defined by the unwavering commitment to…Aug 26, 2023Aug 26, 2023
Shubham TiwariBasics-Of -Subdomain-takeoversSubdomain takeover is a high-security vulnerability via which an attacker can control an expired management service from where the…Jan 2, 2023Jan 2, 2023