Published inSystem WeaknessGetting Started with Recon Automation using ReNgine on Windows (WSL): Installation GuideReconnaissance plays a crucial role in bug hunting and pentesting, serving as a vital step to ensure coverage of all assetsDec 18, 2023Dec 18, 2023
Exploring New Vulnerability Vectors: A Systematic Approach to Manual Google DorkingA Step-by-Step Google Dorking Guide based on my previous ExperienceDec 7, 2023Dec 7, 2023