PinnedDeep-Subdomains-Enumeration-MethodologyMastering the art of subdomain enumeration is a crucial skill for those seeking to unlock the full potential of web architecture. By…Jun 13, 2023A response icon4Jun 13, 2023A response icon4
The IDOR That Played Hide-and-Seek in the URL PathFinding vulnerabilities is often like detective work. You follow clues, look for inconsistencies, and sometimes, the culprit is hiding…May 27May 27
Ultimate CVE Hunter Tool: A Comprehensive GuideCybersecurity professionals and enthusiasts often face the challenge of identifying vulnerabilities within networks or systems. The…Jan 16Jan 16
🚀 Introducing ShodanSpider v2: Your Ultimate Free Tool for CVE Searching and Shodan Data Analysis…In today’s fast-paced cybersecurity world, staying ahead of vulnerabilities is critical. ShodanSpider v2 takes your security research to…Dec 13, 2024A response icon5Dec 13, 2024A response icon5
ShodanSpider: A Powerful Tool for Cybersecurity ResearchIn the ever-evolving world of cybersecurity, having the right tools can make all the difference. ShodanSpider is a powerful, user-friendly…Nov 22, 2024A response icon4Nov 22, 2024A response icon4
Automating Subdomain Enumeration to Discover Critical VulnerabilitiesHello, I’m Shubham Tiwari, commonly known as Rooter in the cybersecurity space. Today, I’m going to share how I identified a critical…Sep 15, 2024A response icon3Sep 15, 2024A response icon3
XSS Automation Finding with RooterI’m Shubham Tiwari, and I’ve been actively involved in bug bounty hunting for quite some time. In my journey, I’ve inspired myself to…Apr 8, 2024A response icon2Apr 8, 2024A response icon2
Critical Vulnerability in PostgreSQL JDBC Driver — Understanding CVE-2024–1597Hey there, fellow cybersecurity enthusiasts!Mar 21, 2024Mar 21, 2024
Best Recon methodology (Shubham Rooter)What is recon?Feb 1, 2024A response icon2Feb 1, 2024A response icon2