White Hats - Nepal

Security research · Bug bounty writeups · Pentest tutorials

New

Bug Bounty for Beginners: Your First Steps to Finding Vulnerabilities

Ready to start bug bounty hunting? This guide for beginners covers essential skills, tools, and strategies to find your first vulnerability and earn rewards. Practical tips from experienced pentesters.

Apr 27, 2026
New

Metasploit Tutorial for Pentesters: Your Ultimate Exploitation Guide

Master Metasploit with this hands-on tutorial. Learn setup, scanning, exploitation, and post-exploitation techniques for effective penetration testing and bug bounties.

Apr 26, 2026
New

HackTheBox CTF Walkthroughs: A Pentester's Practical Guide

Master HackTheBox CTF walkthroughs with this expert guide. Learn practical techniques, tools, and strategies for penetration testing and bug bounty hunting.

Apr 25, 2026
New

Reverse Shell Cheatsheet: Your Ultimate Pentesting Guide

Master reverse shells with this ultimate cheatsheet for pentesters & bug bounty hunters. Get practical code examples, bypass techniques, and troubleshooting tips.

Apr 24, 2026
New

OWASP Top 10 Explained: A Pentester's Practical Guide

Dive deep into the OWASP Top 10 with practical insights, real-world examples, and hands-on advice for bug bounty hunters, red teamers, and AppSec engineers. Master critical web security vulnerabilities.

Apr 23, 2026
New

Nmap Tutorial for Pentesters: Deep Dive into Network Scanning

Master Nmap with this in-depth tutorial for pentesters, bug bounty hunters, and red teamers. Learn essential commands, advanced scripts, and practical scanning techniques.

Apr 22, 2026
New

Wireshark Tutorial for Pentesters: Deep Dive into Packet Analysis

Master Wireshark for penetration testing and bug bounty hunting. This practical Wireshark tutorial covers installation, advanced filters, protocol analysis, and real-world scenarios for security research.

Apr 21, 2026
New

Kali Linux Commands for Pentesters & Bug Bounty Hunters

Master essential Kali Linux commands for penetration testing, bug bounty hunting, and red teaming. Practical examples, powerful tools, and expert tips for security professionals.

Apr 20, 2026
New

SQL Injection Explained: A Deep Dive for Pentesters & Bug Bounty Hunters

Uncover the dangers of SQL Injection. This practical guide for pentesters, red teamers, and bug bounty hunters breaks down common types, real-world attacks, and detection techniques. Learn to exploit and prevent SQLi.

Apr 19, 2026
Archive

Welcome to our blog.

Welcome to our blog.

2017
Archive

Multiple Stored XSS and HTML Injection in...

Title: Multiple Stored XSS and HTML Injection in Edueto. Found by: Skelor

2017
Archive

RCE In AddThis

This vulnerability has been fixed as of July 20, 2016 and is shared with consent from the vendor. If you wish to share the information provided in the write up, provide credit f…

2017
Archive

PornHub: Email Confirmation Bypass

Reporter : Vaxo Dai (@___0x00) After signing up client needs to verify his email address to further use but the confirmation can be bypassed and can put any email address to con…

2017
Archive

Reading Uber’s Internal Emails [Uber Bug Bounty report worth $10,000]

After recent finding about one of the Uber’s subdomain takeover was publicly disclosed, I looked into Uber to find similar bugs. One of my colleagues Abhibandu Kafle, pointed ou…

2017
Archive

How I snooped into your private Slack messages [Slack Bug bounty worth $2,500]

When researching about MX records of slack.com, I noticed that they used a 3rd party email service. In that service, however slack.com was already claimed. After a little more r…

2017
Archive

Bypassing Ebay XSS Protection to launch XSS by Nirmal Dahal

This is a small proof of concept regarding “Reflective Cross-Site Scripting [ R-XSS ]” which I had found on Ebay. I am not an active participant in bug bounty programs, but one …

2017
Archive

I got emails - G Suite Vulnerability

After recent finding about Uber and SendGrid bug, I decided to check other third party applications that were also used for similar cases. During the investigation, some third p…

2017
Archive

This domain is my domain - G Suite A record vulnerability

In part two of G Suite vulnerability discussion, I am writing about a simple but quite serious vulnerability in yet another part of G Suite Application. In general, G Suite is a…

2017