Skip to content
cyber_security_mumbai_logo
  • About us
  • Our Courses
  • Hacking Blogs
    • Cyber Security
    • Bug Bounty
    • Information Gathering
    • Exploitation
    • Black Hat
    • Reverse Engineering
  • Resources
    • eBooks
    • FREE Courses
    • Hacking Tools
  • Job Updates
    • Internships
    • For Freshers
    • For Experienced
  • Contact us
  • Toggle website search
Menu Close
  • About us
  • Our Courses
  • Hacking Blogs
    • Cyber Security
    • Bug Bounty
    • Information Gathering
    • Exploitation
    • Black Hat
    • Reverse Engineering
  • Resources
    • eBooks
    • FREE Courses
    • Hacking Tools
  • Job Updates
    • Internships
    • For Freshers
    • For Experienced
  • Contact us

Bug hunting

  1. Home>
  2. Bug hunting
Automate XSS With These 3 Simple Tools

Automate XSS With These 3 Simple Tools

  • Post author:Indian_Hacker
  • Post category:Hacking Blogs/Bug Bounty

What are the Tools you need? To Automate xss this process you just need these 3 Tools. The Installation process…

Continue ReadingAutomate XSS With These 3 Simple Tools
The Hidden SQL Injection Techniques That You Should Know

The Hidden SQL Injection Techniques That You Should Know

  • Post author:Indian_Hacker
  • Post category:Hacking Blogs/Bug Bounty

SQL injection is a severe security vulnerability that occurs when an attacker manipulates user inputs to execute unauthorised SQL queries…

Continue ReadingThe Hidden SQL Injection Techniques That You Should Know
The Ultimate Guide for Bypassing Web Access IP Blocks

The Ultimate Guide for Bypassing Web Access IP Blocks

  • Post author:Indian_Hacker
  • Post category:Hacking Blogs/Bug Bounty

Are you struggling to access a website due to an IP block? Check out our guide on Bypassing Web Access IP Blocks to learn about different methods.

Continue ReadingThe Ultimate Guide for Bypassing Web Access IP Blocks
How To Find the Origin IP Behind CDNs

How To Find the Origin IP Behind CDNs

  • Post author:Indian_Hacker
  • Post category:Hacking Blogs/Bug Bounty

Find the origin IP address of a website hidden behind a Content Delivery Network. Follow our simple instructions to uncover the source.

Continue ReadingHow To Find the Origin IP Behind CDNs
How to Make Ransomware with Python in just 5 steps

How to Make Ransomware with Python in just 5 steps

  • Post author:Indian_Hacker
  • Post category:Exploitation/Hacking Blogs

Ransomware is a malicious software or computer viruses, but with one purpose to encrypt your data and make a ransom for you.

Continue ReadingHow to Make Ransomware with Python in just 5 steps
How to Bypass 2-Factor Authentication?

How to Bypass 2-Factor Authentication?

  • Post author:Indian_Hacker
  • Post category:Hacking Blogs/Bug Bounty

In 2-Factor Authentication when a user enters his password with the intention to log in the web application sends a temporary code to the user’s verified email address

Continue ReadingHow to Bypass 2-Factor Authentication?
Common Bugs found in File Upload Functions
Bugs found in File Upload

Common Bugs found in File Upload Functions

  • Post author:Indian_Hacker
  • Post category:Bug Bounty/Hacking Blogs

File upload is a function commonly founded in web app. You may find it in social network app, job seeking…

Continue ReadingCommon Bugs found in File Upload Functions
How to get into bug bounty hunting with 0 experience ?
Bug hunting with zero Experience

How to get into bug bounty hunting with 0 experience ?

  • Post author:Indian_Hacker
  • Post category:Bug Bounty

Introduction- Hello guys my name is Indian hacker I’m a web developer, security researcher, and bug bounty expert. In today’s…

Continue ReadingHow to get into bug bounty hunting with 0 experience ?
  • Instagram
  • Telegram
  • LinkedIn
  • Twitter
  • Mail

Bug Bounty Bug hunting cyber security internship cyber security jobs Darkweb Tools Ethical Hacking Ethical Hacking Roadmap Exploitation free ebooks free hacking ebooks Hack Android Phone Hacking Courses Hacking tools Hack pack Information gathering Network scanner nmap post exploitation Reverse Engineering Tor Tools

Join Our Community For FREE

Loading

Categories

  • Black Hat
  • Bug Bounty
  • Cyber Security
  • EBooks
  • Exploitation
  • for experienced
  • for freshers
  • FREE Courses
  • Hacking Blogs
  • Hacking Tools
  • Information Gathering
  • internships
  • Job Updates
  • Resources
  • Reverse Engineering

Recent Posts

  • The Complete Blue Team Toolkit: 30+ Best Blue Team Tools for FREE
  • Top 18 Powerful DDOS Attack Tools 2025 FREE Download
  • 30+ FREE Red Team Tools for Effective Security Testing
  • Master Essential Networking Concepts for Cyber security
  • Building Your Own Ethical Hacking Lab with Virtual Box: A Step-by-Step Guide

You Tell us, we listen.

E-Mail : cybersec@cybersecuritymumbai.com​
Address : Mumbai, India

Need help ? Call us.

+91 9987173011

Bug Bounty Bug hunting cyber security internship cyber security jobs Ethical Hacking free ebooks free hacking ebooks Hack Android Phone Hacking tools Information gathering

Keep in touch with us.

  • Instagram
  • Telegram
  • Mail
  • LinkedIn
  • Twitter
  • About us
  • Terms & Conditions
  • Privacy Policy
  • Disclaimer
  • Contact us
  • About us
  • Privacy Policy
  • Terms & Conditions
  • Contact us
Copyright Cyber Security Mumbai - 2022