▄▄▄▄▄▄▄▄▄▄▄
  ▄█░░░░░░░░░░░█▄
 ██░░░░░░░░░░░░░██
██░░▀███░░███▀░░░██
██░░░░░░░░░░░░░░░██
 ██░░░▀▀▀▀▀░░░░██
  ▀█░░░░░░░░░░█▀
    ▀▀█████▀▀

SANJOK

SECURITY RESEARCHER

SYS_TIME:--:--:--
UPTIME:00:00:00
STATUS:ONLINE
VIEW:BLOG
▶NAVIGATION[7]
00Home./init
01About./bio
02Credentials./auth
03Achievements./pwn
04Blog
[ACTIVE]
05Library./read
06Contact./msg
THREAT_NOISELOW
COFFEE99%
FOCUS92%
SECURE_CONN

© 2026 @thesanjok

$ cat /var/log/exploits/*

TOTAL_POSTS:3
STATUS:ACTIVE
CATEGORY:SECURITY_RESEARCH

Dorking for Bug Bounty: Multi-Engine Reconnaissance & Automation

HIGH

Deep-dive into Google, Bing, Yandex, DuckDuckGo, and GitHub dorking, plus automated recon workflows powered by multi-engine search.

May 17, 2025
[25 min read]
Bug BountyOSINTReconDorking
ID: POST_001$ cat article.md

GraphQL Security Testing Methodology

HIGH

A comprehensive guide to finding vulnerabilities in GraphQL APIs including introspection attacks, injection flaws, and authorization bypasses.

Sep 20, 2024
[15 min read]
GraphQLAPI SecurityPentesting
ID: POST_002$ cat article.md

HTTP Request Smuggling Explained

HIGH

Deep dive into HTTP desync attacks, CL.TE vs TE.CL variants, and real-world exploitation techniques for bypassing security controls.

Aug 10, 2024
[18 min read]
HTTPRequest SmugglingWeb Security
ID: POST_003$ cat article.md

▶ More writeups coming soon...

[EOF]