PinnedDeep-Subdomains-Enumeration-MethodologyMastering the art of subdomain enumeration is a crucial skill for those seeking to unlock the full potential of web architecture. By…Jun 13, 20232Jun 13, 20232
Automating Subdomain Enumeration to Discover Critical VulnerabilitiesHello, I’m Shubham Tiwari, commonly known as Rooter in the cybersecurity space. Today, I’m going to share how I identified a critical…Sep 153Sep 153
XSS Automation Finding with RooterI’m Shubham Tiwari, and I’ve been actively involved in bug bounty hunting for quite some time. In my journey, I’ve inspired myself to…Apr 82Apr 82
Critical Vulnerability in PostgreSQL JDBC Driver — Understanding CVE-2024–1597Hey there, fellow cybersecurity enthusiasts!Mar 21Mar 21
Mastering Bug Bounty Hunting: A Comprehensive Methodology by Shubham TiwariIntroduction: In the realm of cybersecurity, bug bounty hunting has evolved into a dynamic and rewarding pursuit. Join me, Shubham Tiwari…Aug 26, 20231Aug 26, 20231
Unveiling Vulnerabilities: Navigating the Realm of CVE DiscoveryIntroduction: In the intricate landscape of cybersecurity, my role as a full-time bug hunter is defined by the unwavering commitment to…Aug 26, 2023Aug 26, 2023
Basics-Of -Subdomain-takeoversSubdomain takeover is a high-security vulnerability via which an attacker can control an expired management service from where the…Jan 2, 2023Jan 2, 2023