
@Saanvi_dhillon If it's asus laptop then can't do anything...
English
Sharat Chandra
8 posts




Which video + article should I drop next? 1️⃣ Google API Key Mass Hunting & Exploitation for Bug $$Bounties Finding exposed keys at scale and turning them into real bounty-worthy impact. 2️⃣ Dependency Confusion Attacks: Zero to Hero Understanding the attack, setting up the lab, and exploiting it in real-world scenarios.


@jaaayveee Totally depend on target how they handle cause i got sometime credentials leaks include name email and phone numbers so it's all upto target am not saying it's critical etc so it depends case to case