<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>bug bounty hunter &#8211; Hackersatty – Learn Ethical Hacking, Bug Bounty, and Cybersecurity Tips</title>
	<atom:link href="https://hackersatty.com/tag/bug-bounty-hunter/feed/" rel="self" type="application/rss+xml" />
	<link>https://hackersatty.com</link>
	<description>Hack Ethicaly, Hunt Bugs</description>
	<lastBuildDate>Tue, 17 Jun 2025 18:30:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://hackersatty.com/wp-content/uploads/2025/06/cropped-cropped-HACKER-SATTY-scaled-1-32x32.jpg</url>
	<title>bug bounty hunter &#8211; Hackersatty – Learn Ethical Hacking, Bug Bounty, and Cybersecurity Tips</title>
	<link>https://hackersatty.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">245626826</site>	<item>
		<title>Powerful $1000 Bug Bounty Guide: Discover Hidden Endpoints in JavaScript JS Files</title>
		<link>https://hackersatty.com/javascript-js-file-analysis-bug-bounty-guide/</link>
					<comments>https://hackersatty.com/javascript-js-file-analysis-bug-bounty-guide/#respond</comments>
		
		<dc:creator><![CDATA[hackersatty]]></dc:creator>
		<pubDate>Tue, 17 Jun 2025 18:23:56 +0000</pubDate>
				<category><![CDATA[Bug Bounty Blogs]]></category>
		<category><![CDATA[bug bounty for beginners]]></category>
		<category><![CDATA[bug bounty hunter]]></category>
		<category><![CDATA[bug bounty reports]]></category>
		<category><![CDATA[bug bounty tools]]></category>
		<category><![CDATA[Bug Bounty writeup]]></category>
		<category><![CDATA[javascript file analysis]]></category>
		<category><![CDATA[javascript js file]]></category>
		<category><![CDATA[learn bug bounty hunting]]></category>
		<category><![CDATA[read javascript file]]></category>
		<guid isPermaLink="false">https://hackersatty.com/?p=418</guid>

					<description><![CDATA[Satyam Pawale (@hackersatty) Introduction If you&#8217;re a bug bounty hunter, JavaScript js files should be your best friends. They’re often overlooked but loaded with critical clues like hidden API endpoints, &#8230; <a href="https://hackersatty.com/javascript-js-file-analysis-bug-bounty-guide/" class="more-link">Read More</a>]]></description>
										<content:encoded><![CDATA[<p data-start="500" data-end="600"><strong data-start="500" data-end="540">Satyam Pawale (@hackersatty)</strong></p>
<hr data-start="602" data-end="605" />
<h2 data-start="607" data-end="622">Introduction</h2>
<p data-start="624" data-end="829">If you&#8217;re a bug bounty hunter, JavaScript js files should be your best friends. They’re often overlooked but loaded with critical clues like hidden API endpoints, hardcoded secrets, and sensitive directories.</p>
<p data-start="831" data-end="1119">In this guide, I’ll walk you through <strong data-start="868" data-end="906">how I use JavaScript file analysis</strong> to find real vulnerabilities and boost my bug bounty payouts. You’ll learn practical regex commands, tooling, and techniques to automate this process—even if you’re just getting started in <strong data-start="1096" data-end="1118">bug bounty hunting</strong>.</p>
<hr data-start="1121" data-end="1124" />
<h2 data-start="1126" data-end="1156">Why JavaScript Files Matter</h2>
<p data-start="1158" data-end="1256">JavaScript (JS) files aren’t just for front-end logic. Developers often leave sensitive info like:</p>
<ul data-start="1258" data-end="1389">
<li data-start="1258" data-end="1281">
<p data-start="1260" data-end="1281">Internal API routes</p>
</li>
<li data-start="1282" data-end="1309">
<p data-start="1284" data-end="1309">Auth tokens or API keys</p>
</li>
<li data-start="1310" data-end="1350">
<p data-start="1312" data-end="1350">Endpoints not listed in Swagger docs</p>
</li>
<li data-start="1351" data-end="1389">
<p data-start="1353" data-end="1389">Logic that reveals hidden features</p>
</li>
</ul>
<p data-start="1391" data-end="1481">They can expose the <strong data-start="1411" data-end="1439">entire backend structure</strong>, giving you a big advantage during recon.</p>
<hr data-start="1483" data-end="1486" />
<h2 data-start="1488" data-end="1540">Step 1: How to Read and Download JavaScript Files</h2>
<p data-start="1542" data-end="1695">You can find JavaScript files by opening <strong data-start="1583" data-end="1604">browser dev tools</strong>, going to the <strong data-start="1619" data-end="1630">Network</strong> tab, and filtering for <code data-start="1654" data-end="1659">.js</code>. Copy their URLs or use tools like:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre! language-bash">wget https://target.com/assets/app.js<br />
curl -O https://target.com/static/main.js<br />
</code></div>
</div>
<p data-start="1790" data-end="1828">Other tools to automate JS collection:</p>
<ul data-start="1829" data-end="1862">
<li data-start="1829" data-end="1844">
<p data-start="1831" data-end="1844"><code data-start="1831" data-end="1844">waybackurls</code></p>
</li>
<li data-start="1845" data-end="1852">
<p data-start="1847" data-end="1852"><code data-start="1847" data-end="1852">gau</code></p>
</li>
<li data-start="1853" data-end="1862">
<p data-start="1855" data-end="1862"><code data-start="1855" data-end="1862">subjs</code></p>
</li>
</ul>
<hr data-start="1864" data-end="1867" />
<h2 data-start="1869" data-end="1917">Step 2: Extract API Endpoints and Directories</h2>
<p data-start="1919" data-end="2002">JS files often contain relative or full API paths. Here’s a quick way to pull them:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="sticky top-9">
<div class="absolute end-0 bottom-0 flex h-9 items-center pe-2">
<div class="bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs"></div>
</div>
</div>
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre! language-bash">grep -Eo <span class="hljs-string">'("|\'</span>)(/[^<span class="hljs-string">"'\`]+)("</span>|\')<span class="hljs-string">' *.js | sort -u<br />
</span></code></div>
</div>
<p data-start="2067" data-end="2076">Look for:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre!"><span class="hljs-string">"/api/v1/user/"</span><br />
<span class="hljs-string">"/uploads/images/"</span><br />
<span class="hljs-string">"/admin/config/"</span><br />
</code></div>
</div>
<p data-start="2138" data-end="2220">These could be unprotected routes or useful for further attacks like IDOR or SSRF.</p>
<hr data-start="2222" data-end="2225" />
<h2 data-start="2227" data-end="2257">Step 3: Detect HTTP Methods</h2>
<p data-start="2259" data-end="2336">APIs don’t only use GET. JS files show all HTTP verbs like POST, PUT, DELETE:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="sticky top-9">
<div class="absolute end-0 bottom-0 flex h-9 items-center pe-2">
<div class="bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs"></div>
</div>
</div>
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre! language-js"><span class="hljs-title function_">fetch</span>(<span class="hljs-string">"/api/v1/update"</span>, { <span class="hljs-attr">method</span>: <span class="hljs-string">"POST"</span> })<br />
axios.<span class="hljs-title function_">post</span>(<span class="hljs-string">"/user/data"</span>, { <span class="hljs-attr">data</span>: payload })<br />
</code></div>
</div>
<p data-start="2437" data-end="2467">To extract them automatically:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="sticky top-9">
<div class="absolute end-0 bottom-0 flex h-9 items-center pe-2">
<div class="bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs"></div>
</div>
</div>
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre! language-bash">grep -Eo <span class="hljs-string">'fetch\([^)]*\)|axios\.[a-z]+'</span> *.js | <span class="hljs-built_in">sort</span> -u<br />
</code></div>
</div>
<p data-start="2537" data-end="2587">Look for dynamic methods or hidden admin requests.</p>
<hr data-start="2589" data-end="2592" />
<h2 data-start="2594" data-end="2633">Step 4: Search for Hardcoded Secrets</h2>
<p data-start="2635" data-end="2710">Sometimes developers leave keys right inside the JS. Use this to find them:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre! language-bash">grep -Eo <span class="hljs-string">'[A-Za-z0-9_-]{30,}'</span> *.js | <span class="hljs-built_in">sort</span> -u<br />
</code></div>
</div>
<p data-start="2770" data-end="2790">What you might find:</p>
<ul data-start="2791" data-end="2860">
<li data-start="2791" data-end="2808">
<p data-start="2793" data-end="2808">Firebase keys</p>
</li>
<li data-start="2809" data-end="2828">
<p data-start="2811" data-end="2828">AWS credentials</p>
</li>
<li data-start="2829" data-end="2844">
<p data-start="2831" data-end="2844">JWT secrets</p>
</li>
<li data-start="2845" data-end="2860">
<p data-start="2847" data-end="2860">Stripe tokens</p>
</li>
</ul>
<p data-start="2862" data-end="2900">Also try searching for these keywords:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre!"><span class="hljs-attribute">api_key</span><br />
secret<br />
token<br />
access_token<br />
</code></div>
</div>
<hr data-start="2944" data-end="2947" />
<h2 data-start="2949" data-end="2987">Step 5: Automate the Entire Process</h2>
<h3 data-start="2989" data-end="3025">Tools That Help You Hunt Faster:</h3>
<ul data-start="3027" data-end="3223">
<li data-start="3027" data-end="3071">
<p data-start="3029" data-end="3071"><strong data-start="3029" data-end="3043">LinkFinder</strong> – Extract endpoints from JS</p>
</li>
<li data-start="3072" data-end="3123">
<p data-start="3074" data-end="3123"><strong data-start="3074" data-end="3090">SecretFinder</strong> – Find secrets, keys, and tokens</p>
</li>
<li data-start="3124" data-end="3165">
<p data-start="3126" data-end="3165"><strong data-start="3126" data-end="3136">JSleak</strong> – Powerful tool for JS recon</p>
</li>
<li data-start="3166" data-end="3223">
<p data-start="3168" data-end="3223"><strong data-start="3168" data-end="3177">catjs</strong> – Highly customizable regex-based JS analyzer</p>
</li>
</ul>
<h3 data-start="3225" data-end="3246">Example Workflow:</h3>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre! language-bash">subjs domain.com | httpx -mc 200 | xargs -n1 wget<br />
grep -Eo <span class="hljs-string">'("|\'</span>)(/[^<span class="hljs-string">"'\`]+)("</span>|\')<span class="hljs-string">' *.js &gt; endpoints.txt<br />
grep -Eo '</span>[A-Za-z0-9_-]{30,}<span class="hljs-string">' *.js &gt; secrets.txt<br />
</span></code></div>
</div>
<hr data-start="3416" data-end="3419" />
<h2 data-start="3421" data-end="3460">Step 6: Fuzzing Discovered Endpoints</h2>
<p data-start="3462" data-end="3519">Once you’ve collected endpoints from JS, test them using:</p>
<ul data-start="3520" data-end="3629">
<li data-start="3520" data-end="3550">
<p data-start="3522" data-end="3550"><code data-start="3522" data-end="3528">ffuf</code> for directory fuzzing</p>
</li>
<li data-start="3551" data-end="3592">
<p data-start="3553" data-end="3592"><code data-start="3553" data-end="3568">Burp Intruder</code> for parameter injection</p>
</li>
<li data-start="3593" data-end="3629">
<p data-start="3595" data-end="3629"><code data-start="3595" data-end="3603">Nuclei</code> for known vulnerabilities</p>
</li>
</ul>
<p data-start="3631" data-end="3650">You might discover:</p>
<ul data-start="3651" data-end="3760">
<li data-start="3651" data-end="3677">
<p data-start="3653" data-end="3677">Unauthenticated access</p>
</li>
<li data-start="3678" data-end="3710">
<p data-start="3680" data-end="3710">Broken access control (IDOR)</p>
</li>
<li data-start="3711" data-end="3737">
<p data-start="3713" data-end="3737">Debug or dev-only APIs</p>
</li>
<li data-start="3738" data-end="3760">
<p data-start="3740" data-end="3760">Misconfigured routes</p>
</li>
</ul>
<h2 data-start="190" data-end="263">Step 7: Analyze JavaScript for Parameter Names and Sensitive Variables</h2>
<p data-start="265" data-end="460">When developers write frontend JavaScript, they often pass user input or internal values as parameters to API calls or functions. These variable names can help you craft <strong data-start="435" data-end="454">smarter attacks</strong> like:</p>
<ul data-start="462" data-end="528">
<li data-start="462" data-end="487">
<p data-start="464" data-end="487"><strong data-start="464" data-end="487">Parameter pollution</strong></p>
</li>
<li data-start="488" data-end="498">
<p data-start="490" data-end="498"><strong data-start="490" data-end="498">IDOR</strong></p>
</li>
<li data-start="499" data-end="518">
<p data-start="501" data-end="518"><strong data-start="501" data-end="518">Open redirect</strong></p>
</li>
<li data-start="519" data-end="528">
<p data-start="521" data-end="528"><strong data-start="521" data-end="528">XSS</strong></p>
</li>
</ul>
<hr data-start="530" data-end="533" />
<h3 data-start="535" data-end="559">🔍 What to Look For:</h3>
<p data-start="561" data-end="641">Look for variable names in JS code that might indicate sensitive input, such as:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre! language-js"><span class="hljs-keyword">const</span> userId = <span class="hljs-title function_">getCurrentUserId</span>();<br />
<span class="hljs-keyword">const</span> redirectUrl = <span class="hljs-variable language_">window</span>.<span class="hljs-property">location</span>.<span class="hljs-property">href</span>;<br />
<span class="hljs-keyword">const</span> token = <span class="hljs-title function_">getAuthToken</span>();<br />
</code></div>
</div>
<p data-start="761" data-end="842">These are goldmines — especially when passed to backend APIs or appended to URLs.</p>
<hr data-start="844" data-end="847" />
<h3 data-start="849" data-end="892">🛠️ Regex to Extract Suspect Variables:</h3>
<p data-start="894" data-end="931">Run this in your downloaded JS files:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre! language-bash">grep -Eo <span class="hljs-string">'([a-zA-Z0-9_]{3,})\s*=\s*(["'</span>\`]?.{1,80}[<span class="hljs-string">"'\`]?)' *.js | grep -iE 'user|token|auth|id|url|key'<br />
</span></code></div>
</div>
<p data-start="1051" data-end="1081">You&#8217;ll often catch lines like:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre!"><span class="hljs-attr">authToken</span> = <span class="hljs-string">"abc123xyz"</span><br />
<span class="hljs-attr">user_id</span> = request.user.id<br />
<span class="hljs-attr">redirectURL</span> = <span class="hljs-string">"/dashboard?next=/admin"</span><br />
</code></div>
</div>
<hr data-start="1181" data-end="1184" />
<h3 data-start="1186" data-end="1224">🎯 Why This Matters for Bug Bounty</h3>
<p data-start="1226" data-end="1316">Once you know the <strong data-start="1244" data-end="1269">exact parameter names</strong> being used, you can test them with tools like:</p>
<ul data-start="1318" data-end="1488">
<li data-start="1318" data-end="1376">
<p data-start="1320" data-end="1376"><strong data-start="1320" data-end="1337">Burp Repeater</strong> – Manually inject or override params</p>
</li>
<li data-start="1377" data-end="1436">
<p data-start="1379" data-end="1436"><strong data-start="1379" data-end="1402">ffuf or ParamSpider</strong> – Fuzz for parameter-based bugs</p>
</li>
<li data-start="1437" data-end="1488">
<p data-start="1439" data-end="1488"><strong data-start="1439" data-end="1448">Arjun</strong> – Auto-discovers hidden HTTP parameters</p>
</li>
</ul>
<p data-start="1490" data-end="1502">For example:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre! language-bash">ffuf -u https://target.com/profile?FUZZ=123 -w params.txt -fs 0<br />
</code></div>
</div>
<p data-start="1581" data-end="1616">You might discover parameters like:</p>
<ul data-start="1618" data-end="1668">
<li data-start="1618" data-end="1634">
<p data-start="1620" data-end="1634"><code data-start="1620" data-end="1632">admin=true</code></p>
</li>
<li data-start="1635" data-end="1656">
<p data-start="1637" data-end="1656"><code data-start="1637" data-end="1654">access=internal</code></p>
</li>
<li data-start="1657" data-end="1668">
<p data-start="1659" data-end="1668"><code data-start="1659" data-end="1668">debug=1</code></p>
</li>
</ul>
<p data-start="1670" data-end="1703">All because the JS revealed them!</p>
<hr data-start="3762" data-end="3765" />
<h2 data-start="3767" data-end="3784">Best Practices</h2>
<ul data-start="3786" data-end="4064">
<li data-start="3786" data-end="3884">
<p data-start="3788" data-end="3884">Always <strong data-start="3795" data-end="3807">prettify</strong> JavaScript code for better readability (<code data-start="3848" data-end="3862">jsbeautifier</code>, online formatters)</p>
</li>
<li data-start="3885" data-end="3936">
<p data-start="3887" data-end="3936">Respect <strong data-start="3895" data-end="3909">robots.txt</strong> and <strong data-start="3914" data-end="3934">terms of service</strong></p>
</li>
<li data-start="3937" data-end="3995">
<p data-start="3939" data-end="3995">Don’t report fake issues—test thoroughly and reproduce</p>
</li>
<li data-start="3996" data-end="4064">
<p data-start="3998" data-end="4064">Use clear write-ups with request/response, impact, and remediation</p>
</li>
</ul>
<hr data-start="4066" data-end="4069" />
<h2 data-start="4071" data-end="4128">Bonus: Real Bug Bounty Report from JavaScript Analysis</h2>
<p data-start="4130" data-end="4278">I once found a hidden admin dashboard <code data-start="4168" data-end="4192">/admin/internal/config</code> from a JS file. No auth, full access to user records. Reported it → <strong data-start="4261" data-end="4277">$1000 payout</strong>.</p>
<p data-start="4280" data-end="4291">Tools used:</p>
<ul data-start="4292" data-end="4336">
<li data-start="4292" data-end="4304">
<p data-start="4294" data-end="4304">Burp Suite</p>
</li>
<li data-start="4305" data-end="4317">
<p data-start="4307" data-end="4317">LinkFinder</p>
</li>
<li data-start="4318" data-end="4336">
<p data-start="4320" data-end="4336">Manual JS review</p>
</li>
</ul>
<hr data-start="4338" data-end="4341" />
<h2 data-start="4343" data-end="4356">Conclusion</h2>
<p data-start="4358" data-end="4580">If you want to be a successful <strong data-start="4389" data-end="4410">bug bounty hunter</strong>, you must master JavaScript analysis. It&#8217;s one of the highest ROI areas in recon. Start small—analyze one file, extract endpoints, look for secrets, automate what works.</p>
<p data-start="4582" data-end="4691">Stick with it. I started just a year ago, and now I consistently find high-severity bugs through JS analysis.</p>
<hr data-start="4693" data-end="4696" />
<h2 data-start="4698" data-end="4735">Keywords in This Article:</h2>
<ul data-start="4736" data-end="4999">
<li data-start="4736" data-end="4762">
<p data-start="4738" data-end="4762"><code data-start="4738" data-end="4760">read javascript file</code></p>
</li>
<li data-start="4763" data-end="4787">
<p data-start="4765" data-end="4787"><code data-start="4765" data-end="4785">javascript js file</code></p>
</li>
<li data-start="4788" data-end="4811">
<p data-start="4790" data-end="4811"><code data-start="4790" data-end="4809">bug bounty hunter</code></p>
</li>
<li data-start="4812" data-end="4836">
<p data-start="4814" data-end="4836"><code data-start="4814" data-end="4834">bug bounty reports</code></p>
</li>
<li data-start="4837" data-end="4867">
<p data-start="4839" data-end="4867"><code data-start="4839" data-end="4865">learn bug bounty hunting</code></p>
</li>
<li data-start="4868" data-end="4891">
<p data-start="4870" data-end="4891"><code data-start="4870" data-end="4889">bug bounty course</code></p>
</li>
<li data-start="4892" data-end="4916">
<p data-start="4894" data-end="4916"><code data-start="4894" data-end="4914">bug bounty writeup</code></p>
</li>
<li data-start="4917" data-end="4939">
<p data-start="4919" data-end="4939"><code data-start="4919" data-end="4937">bug bounty tools</code></p>
</li>
<li data-start="4940" data-end="4970">
<p data-start="4942" data-end="4970"><code data-start="4942" data-end="4968">bug bounty for beginners</code></p>
</li>
<li data-start="4971" data-end="4999">
<p data-start="4973" data-end="4999"><code data-start="4973" data-end="4999">javascript file analysis</code></p>
</li>
</ul>
<hr data-start="5001" data-end="5004" />
<h2 data-start="5006" data-end="5043">Internal Links</h2>
<ul data-start="5044" data-end="5336">
<li data-start="5262" data-end="5336">
<p data-start="5264" data-end="5336"><a href="https://hackersatty.com/idor-vulnerability-api-bug-bounty-case-study/">My Internal Blogs</a></p>
</li>
</ul>
<hr data-start="5338" data-end="5341" />
<h2 data-start="5343" data-end="5365">External Resources:</h2>
<ul data-start="5366" data-end="5541">
<li data-start="5366" data-end="5434">
<p data-start="5368" data-end="5434"><a class="" href="https://github.com/GerbenJavado/LinkFinder" target="_new" rel="noopener" data-start="5368" data-end="5434">LinkFinder on GitHub</a></p>
</li>
<li data-start="5435" data-end="5491">
<p data-start="5437" data-end="5491"><a class="" href="https://github.com/m4ll0k/SecretFinder" target="_new" rel="noopener" data-start="5437" data-end="5491">SecretFinder</a></p>
</li>
<li data-start="5492" data-end="5541">
<p data-start="5494" data-end="5541"><a class="" href="https://github.com/0x240x23elu/JSLeak" target="_new" rel="noopener" data-start="5494" data-end="5541">JSLeak</a></p>
</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://hackersatty.com/javascript-js-file-analysis-bug-bounty-guide/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">418</post-id>	</item>
	</channel>
</rss>
