rs0n_live

All four of my Bug Bounty Hunting Methodology sheets are (mostly) done and available on my DEFCON Workshop repo! The tools and techniques I used to find every valid bug bounty report I've ever submitted are documented in these files. I hope they help, and I can't wait to see everyone at DEFCON this weekend!!

github.com/R-s0n/bug-bounty-village-defcon32-works…

1 year ago | [YT] | 87



@jamesvelopmenthagood8998

Your educational type videos are the best on YouTube, for sure.

1 year ago | 0  

@aniketsrivastava2651

All the best :-)

1 year ago | 0  

@KiDR_IANI

By the way,you are awesome 💚

1 year ago | 0

@JuanFelix-

you are a machine

7 months ago | 0

@aatankbadboy3941

You have expertise so please tell me one thing to boost up my initial journey that in your beginning when you test for xss so there encoding or filter is present or not ... Because everytime I test for xss there is always encoding present means [<,> ,", : ] these charcter gets incoded in source code like &lt; , &gt; , &quote; 😔 which is essentiall for breaking the existing tag And when I run a tool at this type of case they give false positives Please tell me what should I do when I encounter such problem

1 year ago | 1