My-Methodologies/SUMMARY.md

27 lines
2.3 KiB
Markdown
Raw Normal View History

# Table of contents
* [🧑🏫 My Methodologies](README.md)
* [🕶 Google Dorks](google-dorks.md)
* [🌀 Possible "Content-Type" Header values](possible-content-type-header-values.md)
* [📜 Scripts written by me for XSS](scripts-written-by-me-for-xss.md)
* [🔼 Subdomain Takeover](subdomain-takeover.md)
* [✍ Tips and Write-ups](tips-and-write-ups.md)
* [🔧 Tools and their Uses](tools-and-their-uses.md)
* [🎯 XSS nuclei template CVE-2023-24488.yaml](xss-nuclei-template-cve-2023-24488.yaml.md)
* [🕵 Recon strategies by other Hackers](recon-strategies-by-other-hackers/README.md)
* [🔎 Find the treasure hidden inside JavaScript](recon-strategies-by-other-hackers/find-the-treasure-hidden-inside-javascript.md)
* [🔎 Deep-Subdomains-Enumeration-Methodology](recon-strategies-by-other-hackers/deep-subdomains-enumeration-methodology.md)
* [🔎 Extensive Recon Guide For Bug Hunting](recon-strategies-by-other-hackers/extensive-recon-guide-for-bug-hunting.md)
* [🔎 Finding Time Based SQLi injections : Edition 2023](recon-strategies-by-other-hackers/finding-time-based-sqli-injections-edition-2023.md)
* [🔎 From Self XSS to Account Take Over(ATO)](recon-strategies-by-other-hackers/from-self-xss-to-account-take-over-ato.md)
* [🔎 How I hacked NASA and got 8 bugs ?](recon-strategies-by-other-hackers/how-i-hacked-nasa-and-got-8-bugs.md)
* [🔎 How I was able to find 4 Cross-site scripting (XSS) on vulnerability disclosure program ?](recon-strategies-by-other-hackers/how-i-was-able-to-find-4-cross-site-scripting-xss-on-vulnerability-disclosure-program.md)
* [🔎 Leakage of credential data for full control over the target.](recon-strategies-by-other-hackers/leakage-of-credential-data-for-full-control-over-the-target..md)
* [🔎 Recon Like a Boss](recon-strategies-by-other-hackers/recon-like-a-boss.md)
* [🔎 Recon With Me](recon-strategies-by-other-hackers/recon-with-me.md)
* [🔎 Simple Recon Methodology](recon-strategies-by-other-hackers/simple-recon-methodology.md)
* [🔎 SQL injection through HTTP headers](recon-strategies-by-other-hackers/sql-injection-through-http-headers.md)
* [🔎 How to Get Unique Subdomains on Large scope](recon-strategies-by-other-hackers/how-to-get-unique-subdomains-on-large-scope.md)
* [🎯 subdomain-enumeration](subdomain-enumeration/README.md)
* [❌ xss](xss/README.md)