PinnedDeep-Subdomains-Enumeration-MethodologyMastering the art of subdomain enumeration is a crucial skill for those seeking to unlock the full potential of web architecture. By…Jun 13, 20233Jun 13, 20233
Ultimate CVE Hunter Tool: A Comprehensive GuideCybersecurity professionals and enthusiasts often face the challenge of identifying vulnerabilities within networks or systems. The…Jan 16Jan 16
🚀 Introducing ShodanSpider v2: Your Ultimate Free Tool for CVE Searching and Shodan Data Analysis…In today’s fast-paced cybersecurity world, staying ahead of vulnerabilities is critical. ShodanSpider v2 takes your security research to…Dec 13, 20245Dec 13, 20245
ShodanSpider: A Powerful Tool for Cybersecurity ResearchIn the ever-evolving world of cybersecurity, having the right tools can make all the difference. ShodanSpider is a powerful, user-friendly…Nov 22, 20242Nov 22, 20242
Automating Subdomain Enumeration to Discover Critical VulnerabilitiesHello, I’m Shubham Tiwari, commonly known as Rooter in the cybersecurity space. Today, I’m going to share how I identified a critical…Sep 15, 20243Sep 15, 20243
XSS Automation Finding with RooterI’m Shubham Tiwari, and I’ve been actively involved in bug bounty hunting for quite some time. In my journey, I’ve inspired myself to…Apr 8, 20242Apr 8, 20242
Critical Vulnerability in PostgreSQL JDBC Driver — Understanding CVE-2024–1597Hey there, fellow cybersecurity enthusiasts!Mar 21, 2024Mar 21, 2024
Mastering Bug Bounty Hunting: A Comprehensive Methodology by Shubham TiwariIntroduction: In the realm of cybersecurity, bug bounty hunting has evolved into a dynamic and rewarding pursuit. Join me, Shubham Tiwari…Aug 26, 20231Aug 26, 20231