Cloud Recon: How to find exposed cloud assets that work?

Hey there, fellow bug hunters! ⚡ In 2025, cloud adoption is at an all-time high—and so are the bounties for cloud misconfigurations. But with more hunters chasing the same targets, you need modern and innovative recon techniques to stand out and land those big payouts. In this article, we’ll dive deep into clour recon, focusing […]

Advanced Google Dorking part 3

Advanced Google Dorking: A Masterclass in Search and Cybersecurity Google Dorking, often referred to as Google hacking, utilizes the advanced search capabilities of the Google search engine to uncover hidden or sensitive information that is publicly accessible but not meant to be exposed. By leveraging specific search operators, professionals can pinpoint files, configurations, or vulnerabilities […]

Unmasking the Risks: Security Testing in AI and LLM Applications

Artificial Intelligence (AI) and Large Language Models (LLMs) are revolutionizing industries by automating complex tasks and enabling unprecedented efficiency. However, as with any rapidly evolving technology, these systems come with inherent risks, and security must remain a top priority. In a recent project, I delved into the vulnerabilities of an AI-powered application, uncovering key insights […]

Advanced Google Dorking part 2

Advanced Google Dorking: A Masterclass in Search and Cybersecurity Google Dorking, often referred to as Google hacking, utilizes the advanced search capabilities of the Google search engine to uncover hidden or sensitive information that is publicly accessible but not meant to be exposed. By leveraging specific search operators, professionals can pinpoint files, configurations, or vulnerabilities […]

Advanced Google Dorking part 1

Advanced Google Dorking: A Masterclass in Search and Cybersecurity Google Dorking, often referred to as Google hacking, utilizes the advanced search capabilities of the Google search engine to uncover hidden or sensitive information that is publicly accessible but not meant to be exposed. By leveraging specific search operators, professionals can pinpoint files, configurations, or vulnerabilities […]