AI-Powered Security With LLM Agents

Discover how AI-powered security scanners and LLM agents are transforming blockchain security through automated vulnerability detection in CI/CD pipelines. Learn about TouchCyber’s innovative approach to blockchain security.
How to Find Private Keys on GitHub Using OSINT

Discover how to find private keys on GitHub using OSINT techniques. Learn advanced search queries, automation tools, and ethical bug bounty practices for security researchers.
OAuth Attack Surface Mapping Using URLScan Dorking

Learn how to perform effective OAuth attack surface mapping using URLScan dorking techniques to discover vulnerable authentication implementations and expand your bug bounty hunting success.
Manual Bug Hunting Without Specialized Tools

Discover how manual bug hunting techniques helped me find a critical security vulnerability using just a browser and developer tools, proving that sophisticated tools aren’t always necessary.
Information Disclosure Vulnerability With A HackerOne

Learn how I discovered and reported an information disclosure vulnerability through HackerOne that exposed sensitive user data, earning a bounty and helping secure a major platform.
How I Found SQL Injection Vulnerability in NASA

Discover how I identified and responsibly reported a SQL injection vulnerability in NASA’s web infrastructure using basic penetration testing techniques and persistence.