PinnedDeep-Subdomains-Enumeration-MethodologyMastering the art of subdomain enumeration is a crucial skill for those seeking to unlock the full potential of web architecture. By…Jun 13, 20232Jun 13, 20232
🚀 Introducing ShodanSpider v2: Your Ultimate Free Tool for CVE Searching and Shodan Data Analysis…In today’s fast-paced cybersecurity world, staying ahead of vulnerabilities is critical. ShodanSpider v2 takes your security research to…Dec 134Dec 134
ShodanSpider: A Powerful Tool for Cybersecurity ResearchIn the ever-evolving world of cybersecurity, having the right tools can make all the difference. ShodanSpider is a powerful, user-friendly…Nov 221Nov 221
Automating Subdomain Enumeration to Discover Critical VulnerabilitiesHello, I’m Shubham Tiwari, commonly known as Rooter in the cybersecurity space. Today, I’m going to share how I identified a critical…Sep 153Sep 153
XSS Automation Finding with RooterI’m Shubham Tiwari, and I’ve been actively involved in bug bounty hunting for quite some time. In my journey, I’ve inspired myself to…Apr 82Apr 82
Critical Vulnerability in PostgreSQL JDBC Driver — Understanding CVE-2024–1597Hey there, fellow cybersecurity enthusiasts!Mar 21Mar 21
Mastering Bug Bounty Hunting: A Comprehensive Methodology by Shubham TiwariIntroduction: In the realm of cybersecurity, bug bounty hunting has evolved into a dynamic and rewarding pursuit. Join me, Shubham Tiwari…Aug 26, 20231Aug 26, 20231
Unveiling Vulnerabilities: Navigating the Realm of CVE DiscoveryIntroduction: In the intricate landscape of cybersecurity, my role as a full-time bug hunter is defined by the unwavering commitment to…Aug 26, 2023Aug 26, 2023