# Table of contents * [🧑‍🏫 My Methodologies](README.md) * [🕶️ Google Dorks](google-dorks.md) * [🌀 Possible "Content-Type" Header values](possible-content-type-header-values.md) * [📜 Scripts written by me for XSS](scripts-written-by-me-for-xss.md) * [🔼 Subdomain Takeover](subdomain-takeover.md) * [✍️ Tips and Write-ups](tips-and-write-ups.md) * [🔧 Tools and their Uses](tools-and-their-uses.md) * [🎯 XSS nuclei template CVE-2023-24488.yaml](xss-nuclei-template-cve-2023-24488.yaml.md) * [🕵️ Recon strategies by other Hackers](recon-strategies-by-other-hackers/README.md) * [🔎 Blind SQL Injection Detection and Exploitation (Cheat Sheet)](recon-strategies-by-other-hackers/blind-sql-injection-detection-and-exploitation-cheat-sheet.md) * [🔎 How i got more than 100 vulnerabilities in just one site? (zseano-challenge)](recon-strategies-by-other-hackers/how-i-got-more-than-100-vulnerabilities-in-just-one-site-zseano-challenge.md) * [🔎 JS is l0ve ❤️.](recon-strategies-by-other-hackers/js-is-l0ve-..md) * [🔎 My top 5 bookmarks that I consistently use for bug bounty and penetration testing.](recon-strategies-by-other-hackers/my-top-5-bookmarks-that-i-consistently-use-for-bug-bounty-and-penetration-testing..md) * [🔎 Find the treasure hidden inside JavaScript](recon-strategies-by-other-hackers/find-the-treasure-hidden-inside-javascript.md) * [🔎 Deep-Subdomains-Enumeration-Methodology](recon-strategies-by-other-hackers/deep-subdomains-enumeration-methodology.md) * [🔎 Extensive Recon Guide For Bug Hunting](recon-strategies-by-other-hackers/extensive-recon-guide-for-bug-hunting.md) * [🔎 Finding Time Based SQLi injections : Edition 2023](recon-strategies-by-other-hackers/finding-time-based-sqli-injections-edition-2023.md) * [🔎 From Self XSS to Account Take Over(ATO)](recon-strategies-by-other-hackers/from-self-xss-to-account-take-over-ato.md) * [🔎 How I hacked NASA and got 8 bugs ?](recon-strategies-by-other-hackers/how-i-hacked-nasa-and-got-8-bugs.md) * [🔎 How I was able to find 4 Cross-site scripting (XSS) on vulnerability disclosure program ?](recon-strategies-by-other-hackers/how-i-was-able-to-find-4-cross-site-scripting-xss-on-vulnerability-disclosure-program.md) * [🔎 Leakage of credential data for full control over the target.](recon-strategies-by-other-hackers/leakage-of-credential-data-for-full-control-over-the-target..md) * [🔎 Recon Like a Boss](recon-strategies-by-other-hackers/recon-like-a-boss.md) * [🔎 Recon With Me](recon-strategies-by-other-hackers/recon-with-me.md) * [🔎 Simple Recon Methodology](recon-strategies-by-other-hackers/simple-recon-methodology.md) * [🔎 SQL injection through HTTP headers](recon-strategies-by-other-hackers/sql-injection-through-http-headers.md) * [🔎 How to Get Unique Subdomains on Large scope](recon-strategies-by-other-hackers/how-to-get-unique-subdomains-on-large-scope.md) * [🔎 Static Analysis of Client-Side JavaScript for pen testers and bug bounty hunters](recon-strategies-by-other-hackers/static-analysis-of-client-side-javascript-for-pen-testers-and-bug-bounty-hunters.md) * [🎯 subdomain-enumeration](subdomain-enumeration/README.md) * [🛠️ CRLF](crlf.md) * [❌ xss](xss/README.md) * [⛴️ Ghetto XSS Cheatsheet](ghetto-xss-cheatsheet.md) * [🚀 Oneliners](oneliners.md)