Mike TakahashiinInfoSec Write-ups10 Google Dorks for Sensitive DataDiscover Exposed Documents on Cloud Platforms with Google Dorks for CybersecurityApr 20, 20233Apr 20, 20233
Mike TakahashiinInfoSec Write-ups6 Burp Suite Tips & TricksTurbocharge your web application security testing, bug bounty hunting, and pentesting with these essential Burp Suite configuration hacksApr 3, 20232Apr 3, 20232
Mike TakahashiinInfoSec Write-upsThe Ultimate XSS PoC with ChatGPT-4 🎯XSS to Demonstrate Stealing Cookies, Local Storage, and Page Content Generated with ChatGPT-4 🤖Mar 26, 2023Mar 26, 2023
Mike TakahashiinInfoSec Write-upsXXE with ChatGPTGenerate Custom XXE Payloads with AIMar 13, 2023Mar 13, 2023
Mike TakahashiinInfoSec Write-ups5 ChatGPT Prompts for Bug BountyJS, XSS, CSRF, and Decoding Made Easy with ChatGPTMar 7, 2023Mar 7, 2023
Mike TakahashiinInfoSec Write-upsCreate Your Own XSS Lab with ChatGPTGet up and running quickly with this easy-to-follow tutorial on creating and running your own custom XSS lab with ChatGPT.Mar 3, 2023Mar 3, 2023
Mike TakahashiinInfoSec Write-upsChatGPT for Bug Bounty: Faster Hunting and ReportingSave Time, Learn Technical Skills, and Write Effective Reports with AI-Powered ChatGPTFeb 27, 20236Feb 27, 20236
Mike TakahashiinInfoSec Write-upsReveal the Cloud with Google DorksFind sensitive data in Amazon AWS, Google Cloud, and moreFeb 7, 20231Feb 7, 20231
Mike TakahashiinInfoSec Write-upsGet Into Cybersecurity in 2023: A Step-by-Step GuideUnlocking the Secrets to a Successful Cybersecurity Career: A Step-by-Step Guide for BeginnersFeb 3, 2023Feb 3, 2023
Mike TakahashiinInfoSec Write-upsTips for BAC and IDOR VulnerabilitiesStep-by-step guide for uncovering Broken Access Control and Indirect Object Reference vulnerabilities for bug bounty hunters and…Jan 16, 2023Jan 16, 2023