InInfoSec Write-upsbyMike Takahashi (TakSec)Reveal the Cloud with Google DorksFind sensitive data in Amazon AWS, Google Cloud, and moreFeb 7, 20231Feb 7, 20231
InInfoSec Write-upsbyMike Takahashi (TakSec)Get Into Cybersecurity in 2023: A Step-by-Step GuideUnlocking the Secrets to a Successful Cybersecurity Career: A Step-by-Step Guide for BeginnersFeb 3, 2023Feb 3, 2023
InInfoSec Write-upsbyMike Takahashi (TakSec)Tips for BAC and IDOR VulnerabilitiesStep-by-step guide for uncovering Broken Access Control and Indirect Object Reference vulnerabilities for bug bounty hunters and…Jan 16, 2023Jan 16, 2023
InThe Gray AreabyMike Takahashi (TakSec)XSS Bypass for Rich Text EditorsTips for bypassing XSS filters in rich text editors like TinyMCEJan 8, 20231Jan 8, 20231
Mike Takahashi (TakSec)How to start a Bug Bounty ProgramHow do you start a bug bounty at your organization? People are always asking me, so I thought I’d share what went into creating Stanford’s…Oct 23, 20191Oct 23, 20191
Mike Takahashi (TakSec)Breaking into Bug BountyHow do you break into bug bounty? People are always asking, so I decided to outline my personal tips to help you get started.Feb 22, 2018Feb 22, 2018
InThe Gray AreabyMike Takahashi (TakSec)5 Google Dorks Every Hacker Should KnowUncover hidden endpoints and sensitive data using these Google dorksJan 6, 20237Jan 6, 20237