# Table of contents * [💡 My Methodologies](README.md) * [🔧 Tools and their Uses](tools-and-their-uses.md) * [🔼 Subdomain Takeover](subdomain-takeover.md) * [✍ Tips and Write-ups](tips-and-write-ups.md) * [📜 Scripts written by me for XSS](scripts-written-by-me-for-xss.md) * [🕵 Recon strategies by other Hackers](recon-strategies-by-other-hackers/README.md) * [🔎 Recon Like a Boss](recon-strategies-by-other-hackers/recon-like-a-boss.md) * [🔎 Recon With Me](recon-strategies-by-other-hackers/recon-with-me.md) * [🔎 Extensive Recon Guide For Bug Hunting](recon-strategies-by-other-hackers/extensive-recon-guide-for-bug-hunting.md) * [🔎 Deep-Subdomains-Enumeration-Methodology](recon-strategies-by-other-hackers/deep-subdomains-enumeration-methodology.md) * [🔎 How I hacked NASA and got 8 bugs ?](recon-strategies-by-other-hackers/how-i-hacked-nasa-and-got-8-bugs.md) * [🔎 Simple Recon Methodology](recon-strategies-by-other-hackers/simple-recon-methodology.md) * [🔎 How I was able to find 4 Cross-site scripting (XSS) on vulnerability disclosure program ?](recon-strategies-by-other-hackers/how-i-was-able-to-find-4-cross-site-scripting-xss-on-vulnerability-disclosure-program.md) * [🔎 From Self XSS to Account Take Over(ATO)](recon-strategies-by-other-hackers/from-self-xss-to-account-take-over-ato.md) * [Leakage of credential data for full control over the target.](recon-strategies-by-other-hackers/leakage-of-credential-data-for-full-control-over-the-target..md) * [🌀 Possible "Content-Type" Header values](possible-content-type-header-values.md) * [🎯 XSS nuclei template CVE-2023-24488.yaml](xss-nuclei-template-cve-2023-24488.yaml.md)