White Hats - Nepal

Security research · Bug bounty writeups · Pentest tutorials

New

IDOR Vulnerability Writeup: Exploiting Insecure Direct Object References

Master IDOR vulnerabilities with this expert writeup. Learn advanced bypass techniques, automation tools, and remediation strategies for modern web apps.

May 16, 2026
New

HTTP Request Smuggling Explained: A Pentester's Guide

Master HTTP request smuggling to bypass security controls and hijack sessions. Learn CL.TE and TE.CL techniques with practical exploitation examples.

May 15, 2026
New

API Pentesting Methodology: A Pro Security Testing Guide

Master the API pentesting methodology with this technical guide. Learn how to find BOLA, Mass Assignment, and JWT flaws like a professional researcher.

May 14, 2026
New

XXE Attack Tutorial: A Practical Guide for Pentesters

Learn how to exploit XML External Entity (XXE) vulnerabilities. This tutorial covers LFI, SSRF, Blind XXE, and OOB exfiltration for bug bounty hunters.

May 13, 2026
New

Directory Bruteforce Tools: Best Pointers for Pentesters

Explore the top directory bruteforce tools like ffuf and Gobuster. Learn how to find hidden files and directories in professional security audits.

May 12, 2026
New

Pentest Checklist: A Pro's Guide to Systematic Security Testing

Master your next engagement with this technical pentest checklist. From recon to post-exploitation, we cover the exact steps used by industry experts.

May 11, 2026
New

BloodHound Active Directory: Finding Hidden Attack Paths

Master BloodHound for Active Directory security. Learn how to map complex attack paths, identify privilege escalation risks, and secure your AD infrastructure.

May 10, 2026
New

Network Penetration Testing Methodology: A Pro Pentester's Guide

Master the network penetration testing methodology used by pros. Learn recon, scanning, exploitation, and lateral movement with this hands-on guide.

May 09, 2026
New

SSRF Vulnerability Example: A Pentester's Guide to Exploitation

Learn how SSRF works with this practical SSRF vulnerability example. Explore cloud metadata theft, internal port scanning, and bypass techniques for bug hunters.

May 08, 2026
New

Subdomain Enumeration Tools: A Pentester's Deep Dive

Master subdomain enumeration tools for bug bounties and red team ops. Discover practical techniques, powerful scripts, and essential strategies from a seasoned pentester.

May 07, 2026
New

Web Application Security Testing Guide: A Deep Dive for Pentesters

Master web application security testing with this practical guide. Learn methodologies, essential tools, and real-world techniques for bug bounty hunters and appsec engineers.

May 06, 2026
New

Windows Privilege Escalation Cheatsheet: Your Ultimate Guide for Pentesters

Master Windows privilege escalation with this comprehensive cheatsheet. Learn common techniques, tools, and practical examples for red teamers and bug bounty hunters.

May 05, 2026
New

Hashcat Tutorial: Master Password Cracking with Hashcat

Unlock the power of Hashcat for password cracking. This deep dive covers setup, attack modes, and advanced techniques for pentesters, red teamers, and bug bounty hunters.

May 04, 2026
New

Unmasking CSRF Attacks: A Pentester's Practical Guide

Dive deep into CSRF attacks, understand how they work, and learn practical detection and exploitation techniques for bug bounty hunters and pentesters.

May 03, 2026
New

Linux Privilege Escalation: A Pentester's Practical Guide

Master Linux privilege escalation techniques with this practical guide for pentesters. Learn hands-on methods, common vulnerabilities, and real-world scenarios to elevate privileges.

May 02, 2026
New

Active Directory Attack Techniques: A Pentester's Practical Guide

Explore common Active Directory attack techniques used by red teamers and bug bounty hunters. Learn practical AD exploitation methods, tools, and real-world scenarios.

May 01, 2026
New

XSS Attack Example: A Deep Dive for Pentesters & Bug Bounty Hunters

Explore real-world XSS attack examples, from reflected to DOM-based. Learn how to find, exploit, and prevent Cross-Site Scripting vulnerabilities with practical, code-heavy insights for pentesters and bug bounty hunters.

Apr 30, 2026
New

Mimikatz Tutorial: A Deep Dive for Pentesters & Red Teamers

Master Mimikatz for penetration testing and red teaming. This comprehensive tutorial covers installation, credential dumping, DCSync attacks, and defense strategies. Practical code examples included.

Apr 29, 2026
New

Burp Suite Tutorial for Pentesters: Your Ultimate Guide

Master Burp Suite for web app security testing. This comprehensive tutorial covers setup, proxy, scanner, intruder, repeater, and more. Essential for bug bounty hunters and pentesters.

Apr 28, 2026
New

Bug Bounty for Beginners: Your First Steps to Finding Vulnerabilities

Ready to start bug bounty hunting? This guide for beginners covers essential skills, tools, and strategies to find your first vulnerability and earn rewards. Practical tips from experienced pentesters.

Apr 27, 2026
New

Metasploit Tutorial for Pentesters: Your Ultimate Exploitation Guide

Master Metasploit with this hands-on tutorial. Learn setup, scanning, exploitation, and post-exploitation techniques for effective penetration testing and bug bounties.

Apr 26, 2026
New

HackTheBox CTF Walkthroughs: A Pentester's Practical Guide

Master HackTheBox CTF walkthroughs with this expert guide. Learn practical techniques, tools, and strategies for penetration testing and bug bounty hunting.

Apr 25, 2026
New

Reverse Shell Cheatsheet: Your Ultimate Pentesting Guide

Master reverse shells with this ultimate cheatsheet for pentesters & bug bounty hunters. Get practical code examples, bypass techniques, and troubleshooting tips.

Apr 24, 2026
New

OWASP Top 10 Explained: A Pentester's Practical Guide

Dive deep into the OWASP Top 10 with practical insights, real-world examples, and hands-on advice for bug bounty hunters, red teamers, and AppSec engineers. Master critical web security vulnerabilities.

Apr 23, 2026
New

Nmap Tutorial for Pentesters: Deep Dive into Network Scanning

Master Nmap with this in-depth tutorial for pentesters, bug bounty hunters, and red teamers. Learn essential commands, advanced scripts, and practical scanning techniques.

Apr 22, 2026
New

Wireshark Tutorial for Pentesters: Deep Dive into Packet Analysis

Master Wireshark for penetration testing and bug bounty hunting. This practical Wireshark tutorial covers installation, advanced filters, protocol analysis, and real-world scenarios for security research.

Apr 21, 2026
New

Kali Linux Commands for Pentesters & Bug Bounty Hunters

Master essential Kali Linux commands for penetration testing, bug bounty hunting, and red teaming. Practical examples, powerful tools, and expert tips for security professionals.

Apr 20, 2026
New

SQL Injection Explained: A Deep Dive for Pentesters & Bug Bounty Hunters

Uncover the dangers of SQL Injection. This practical guide for pentesters, red teamers, and bug bounty hunters breaks down common types, real-world attacks, and detection techniques. Learn to exploit and prevent SQLi.

Apr 19, 2026
Archive

Welcome to our blog.

Welcome to our blog.

2017
Archive

Multiple Stored XSS and HTML Injection in...

Title: Multiple Stored XSS and HTML Injection in Edueto. Found by: Skelor

2017
Archive

RCE In AddThis

This vulnerability has been fixed as of July 20, 2016 and is shared with consent from the vendor. If you wish to share the information provided in the write up, provide credit f…

2017
Archive

PornHub: Email Confirmation Bypass

Reporter : Vaxo Dai (@___0x00) After signing up client needs to verify his email address to further use but the confirmation can be bypassed and can put any email address to con…

2017
Archive

Reading Uber’s Internal Emails [Uber Bug Bounty report worth $10,000]

After recent finding about one of the Uber’s subdomain takeover was publicly disclosed, I looked into Uber to find similar bugs. One of my colleagues Abhibandu Kafle, pointed ou…

2017
Archive

How I snooped into your private Slack messages [Slack Bug bounty worth $2,500]

When researching about MX records of slack.com, I noticed that they used a 3rd party email service. In that service, however slack.com was already claimed. After a little more r…

2017
Archive

Bypassing Ebay XSS Protection to launch XSS by Nirmal Dahal

This is a small proof of concept regarding “Reflective Cross-Site Scripting [ R-XSS ]” which I had found on Ebay. I am not an active participant in bug bounty programs, but one …

2017
Archive

I got emails - G Suite Vulnerability

After recent finding about Uber and SendGrid bug, I decided to check other third party applications that were also used for similar cases. During the investigation, some third p…

2017
Archive

This domain is my domain - G Suite A record vulnerability

In part two of G Suite vulnerability discussion, I am writing about a simple but quite serious vulnerability in yet another part of G Suite Application. In general, G Suite is a…

2017