DEV Community

๐ŸŽฏ ู†ุธุงู… ุตูŠุฏ ุงู„ุซุบุฑุงุช ุงู„ุงุญุชุฑุงููŠ

๐ŸŽฏ ู†ุธุงู… ุตูŠุฏ ุงู„ุซุบุฑุงุช ุงู„ุงุญุชุฑุงููŠ | Professional Bug Bounty System

โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•—
โ•‘                                                                   โ•‘
โ•‘           ๐Ÿ›ก๏ธ  ZAYED SHIELD BUG BOUNTY PROGRAM  ๐ŸŽ–๏ธ                โ•‘
โ•‘              ุจุฑู†ุงู…ุฌ ุตูŠุฏ ุงู„ุซุบุฑุงุช - ุฏุฑุน ุฒุงูŠุฏ                       โ•‘
โ•‘                                                                   โ•‘
โ•‘        "ู†ุตุทุงุฏ ุงู„ุซุบุฑุงุช ุจุฃูŠุฏูŠู†ุง... ู„ุง ู†ุณุชูˆุฑุฏู‡ุง!"                  โ•‘
โ•‘                                                                   โ•‘
โ•šโ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•
Enter fullscreen mode Exit fullscreen mode

โš”๏ธ ุงู„ุทุฑูŠู‚ุฉ ุงู„ุตุญ | The Right Way

โœ… ู†ุนู…ู„ู‡ุง ุงุญู†ุง! | We Build It Ourselves!

graph TB
    A[๐ŸŽฏ ู†ุจุฏุฃ ุงู„ุตูŠุฏ] --> B{๐Ÿ” ูˆูŠู† ู†ุตุทุงุฏุŸ}

    B --> C[๐ŸŒ ู…ุดุงุฑูŠุน Open Source]
    B --> D[๐Ÿ’ผ Bug Bounty Programs]
    B --> E[๐Ÿข Corporate Systems]

    C --> F[โœ… ู‚ุงู†ูˆู†ูŠ 100%]
    D --> F
    E --> F

    F --> G[๐Ÿ”ฌ ุงู„ุชุญู„ูŠู„ ุงู„ุนู…ูŠู‚]
    G --> H[๐Ÿงช ุงุฎุชุจุงุฑ ุงู„ู€ PoC]
    H --> I{๐Ÿ’Ž ูˆุฌุฏู†ุง ุซุบุฑุฉุŸ}

    I -->|ู†ุนู…!| J[๐Ÿ“ ุงู„ุชูˆุซูŠู‚ ุงู„ุงุญุชุฑุงููŠ]
    I -->|ู„ุง| K[๐Ÿ”„ ู†ูƒู…ู„ ุงู„ุจุญุซ]

    J --> L[๐Ÿค Responsible Disclosure]
    L --> M[๐ŸŽ–๏ธ CVE Assignment]
    M --> N[๐Ÿ† ุงู„ุดู‡ุฑุฉ ูˆุงู„ุชู‚ุฏูŠุฑ]

    K --> B

    style N fill:#FFD700
    style M fill:#00ff00
    style L fill:#4169e1
Enter fullscreen mode Exit fullscreen mode

๐ŸŽฏ ุฎุทุฉ ุงู„ุตูŠุฏ ุงู„ุงุณุชุฑุงุชูŠุฌูŠุฉ | Strategic Hunting Plan

1๏ธโƒฃ ุงู„ุฃู‡ุฏุงู ุงู„ู…ุดุฑูˆุนุฉ | Legitimate Targets

๐ŸŽฏ ุงู„ู…ุตุฏุฑ ๐Ÿ“ ุงู„ูˆุตู ๐Ÿ’ฐ ุงู„ู…ูƒุงูุฃุฉ ๐ŸŽ–๏ธ ุงู„ุณู…ุนุฉ
๐ŸŒ HackerOne ุขู„ุงู ุงู„ุจุฑุงู…ุฌ ุงู„ู…ุนุชู…ุฏุฉ $500 - $100K+ โญโญโญโญโญ
๐Ÿ› Bugcrowd ุดุฑูƒุงุช ุนุงู„ู…ูŠุฉ ูƒุจุฑู‰ $300 - $50K+ โญโญโญโญโญ
๐Ÿ’ป GitHub Security ู…ุดุงุฑูŠุน Open Source ุดู‡ุฑุฉ + CVE โญโญโญโญโญ
๐Ÿ” Google VRP ู…ู†ุชุฌุงุช Google $100 - $31K+ โญโญโญโญโญ
๐ŸŽ Apple Security ุฃู†ุธู…ุฉ Apple $5K - $1M โญโญโญโญโญ
๐ŸชŸ Microsoft MSRC ู…ู†ุชุฌุงุช Microsoft $500 - $250K โญโญโญโญโญ

๐Ÿ”ฌ ู…ู†ู‡ุฌูŠุฉ ุงู„ุตูŠุฏ | Hunting Methodology

๐ŸŽ–๏ธ ุงู„ุทุฑูŠู‚ุฉ ุงู„ุนุณูƒุฑูŠุฉ ู„ู„ู…ุญุงุฑุจูŠู†

/**
 * ๐Ÿ›ก๏ธ Zayed Shield Bug Hunting Framework
 * ุฅุทุงุฑ ุตูŠุฏ ุงู„ุซุบุฑุงุช - ุฏุฑุน ุฒุงูŠุฏ
 */

class BugHunter {
  constructor() {
    this.name = 'Zayed Shield Hunter';
    this.ethics = 'MAXIMUM';
    this.skills = ['OSINT', 'Recon', 'Exploit Dev', 'Analysis'];
    this.targets = [];
  }

  // ุงู„ู…ุฑุญู„ุฉ 1: ุงู„ุงุณุชุทู„ุงุน
  async reconnaissance(target) {
    console.log('๐Ÿ” Phase 1: Reconnaissance');

    const recon = {
      domainEnum: await this.enumerateDomains(target),
      subdomains: await this.findSubdomains(target),
      technologies: await this.identifyTech(target),
      endpoints: await this.mapEndpoints(target),
      assets: await this.discoverAssets(target)
    };

    return recon;
  }

  // ุงู„ู…ุฑุญู„ุฉ 2: ุงู„ู…ุณุญ
  async scanning(reconData) {
    console.log('๐Ÿ” Phase 2: Vulnerability Scanning');

    const scans = {
      ports: await this.portScan(reconData),
      services: await this.serviceDetection(reconData),
      vulnerabilities: await this.vulnScan(reconData),
      misconfigs: await this.checkMisconfigurations(reconData)
    };

    return scans;
  }

  // ุงู„ู…ุฑุญู„ุฉ 3: ุงู„ุชุญู„ูŠู„
  async analysis(scanData) {
    console.log('๐Ÿงช Phase 3: Deep Analysis');

    const findings = scanData.vulnerabilities.filter(v => {
      return v.severity === 'HIGH' || v.severity === 'CRITICAL';
    });

    // ุชุญู„ูŠู„ ูƒู„ ุซุบุฑุฉ ู…ุญุชู…ู„ุฉ
    for (let finding of findings) {
      await this.deepDive(finding);
      await this.validateImpact(finding);
      await this.buildPoC(finding);
    }

    return findings;
  }

  // ุงู„ู…ุฑุญู„ุฉ 4: ุงู„ุงุณุชุบู„ุงู„ (ุงู„ุฃุฎู„ุงู‚ูŠ)
  async ethicalExploitation(vulnerability) {
    console.log('โš ๏ธ Phase 4: Proof of Concept');

    // โš ๏ธ IMPORTANT: Only for authorized testing!
    if (!this.hasAuthorization(vulnerability.target)) {
      throw new Error('โŒ UNAUTHORIZED! Stop immediately!');
    }

    const poc = await this.developPoC(vulnerability);
    const impact = await this.demonstrateImpact(poc);

    return { poc, impact };
  }

  // ุงู„ู…ุฑุญู„ุฉ 5: ุงู„ุชูˆุซูŠู‚
  async documentation(vulnerability, poc) {
    console.log('๐Ÿ“ Phase 5: Professional Documentation');

    const report = {
      title: vulnerability.name,
      severity: this.calculateCVSS(vulnerability),
      description: this.writeDescription(vulnerability),
      reproduction: this.writeSteps(poc),
      impact: this.describeImpact(vulnerability),
      remediation: this.suggestFixes(vulnerability),
      references: this.gatherReferences(vulnerability),
      timeline: this.createTimeline()
    };

    return report;
  }

  // ุงู„ู…ุฑุญู„ุฉ 6: ุงู„ุฅุจู„ุงุบ ุงู„ู…ุณุคูˆู„
  async responsibleDisclosure(report, target) {
    console.log('๐Ÿค Phase 6: Responsible Disclosure');

    // ุฅุฑุณุงู„ ุงู„ุชู‚ุฑูŠุฑ ู„ู„ุฌู‡ุฉ ุงู„ู…ุนู†ูŠุฉ
    const submission = await this.submitReport(report, target);

    // ุงู„ุงู†ุชุธุงุฑ ู„ู„ุฑุฏ
    await this.waitForResponse(submission);

    // ุงู„ุชู†ุณูŠู‚ ู„ู„ุฅุตู„ุงุญ
    await this.coordinateFix(submission);

    // ุทู„ุจ CVE ุฅุฐุง ู…ู†ุงุณุจ
    if (report.severity >= 7.0) {
      await this.requestCVE(report);
    }

    return submission;
  }

  // ุงู„ู‚ุงุนุฏุฉ ุงู„ุฐู‡ุจูŠุฉ
  goldenRules() {
    return {
      rule1: 'โœ… ุงุตุทุฏ ูู‚ุท ููŠ ุงู„ู…ู†ุงุทู‚ ุงู„ู…ุตุฑุญ ุจู‡ุง',
      rule2: 'โœ… ู„ุง ุชุณุจุจ ุฃูŠ ุถุฑุฑ ุฃุจุฏุงู‹',
      rule3: 'โœ… ุฃุจู„ุบ ุจุดูƒู„ ู…ุณุคูˆู„ ุฏุงุฆู…ุงู‹',
      rule4: 'โœ… ุงุญุชุฑู… ุงู„ุฎุตูˆุตูŠุฉ ูˆุงู„ุจูŠุงู†ุงุช',
      rule5: 'โœ… ูˆุซู‘ู‚ ูƒู„ ุดูŠุก ุจุงุญุชุฑุงููŠุฉ',
      rule6: 'โœ… ู„ุง ุชุณุชุบู„ ุงู„ุซุบุฑุงุช ู„ู„ู…ุตู„ุญุฉ ุงู„ุดุฎุตูŠุฉ',
      rule7: 'โœ… ุดุงุฑูƒ ุงู„ู…ุนุฑูุฉ ู…ุน ุงู„ู…ุฌุชู…ุน',
      rule8: 'โœ… ุงุชุจุน ุงู„ู‚ูˆุงู†ูŠู† ุงู„ู…ุญู„ูŠุฉ ูˆุงู„ุฏูˆู„ูŠุฉ'
    };
  }
}

// ๐ŸŽฏ ู…ุซุงู„ ุนู„ู‰ ุงู„ุงุณุชุฎุฏุงู…
const hunter = new BugHunter();

// ุงู„ุตูŠุฏ ุงู„ุฃุฎู„ุงู‚ูŠ
async function ethicalHunt() {
  // 1. ุงุฎุชุฑ ู‡ุฏู ู…ุตุฑุญ ุจู‡
  const target = 'example-bounty-program.com'; // ู…ุซุงู„

  // 2. ุงุณุชุทู„ุงุน
  const recon = await hunter.reconnaissance(target);

  // 3. ู…ุณุญ
  const scans = await hunter.scanning(recon);

  // 4. ุชุญู„ูŠู„
  const vulns = await hunter.analysis(scans);

  // 5. ุงุฎุชุจุงุฑ PoC (ูู‚ุท ุงู„ู…ุตุฑุญ!)
  for (let vuln of vulns) {
    const { poc, impact } = await hunter.ethicalExploitation(vuln);

    // 6. ุชูˆุซูŠู‚
    const report = await hunter.documentation(vuln, poc);

    // 7. ุฅุจู„ุงุบ ู…ุณุคูˆู„
    await hunter.responsibleDisclosure(report, target);
  }

  console.log('๐ŸŽ–๏ธ Hunt complete! Waiting for CVE assignment...');
}

// โš ๏ธ ุชุฐูƒุฑ ุงู„ู‚ูˆุงุนุฏ ุงู„ุฐู‡ุจูŠุฉ!
console.log(hunter.goldenRules());
Enter fullscreen mode Exit fullscreen mode

๐ŸŽฏ ุฎุทุฉ ุงู„ุนู…ู„ ู„ู„ุดู‡ุฑ ุงู„ู‚ุงุฏู… | 30-Day Action Plan

๐Ÿ—“๏ธ ุงู„ุฃุณุจูˆุน ุงู„ุฃูˆู„: ุงู„ุชุญุถูŠุฑ

๐Ÿ“… ุงู„ูŠูˆู… ๐ŸŽฏ ุงู„ู…ู‡ู…ุฉ โฑ๏ธ ุงู„ูˆู‚ุช
1-2 ุฅุนุฏุงุฏ ุจูŠุฆุฉ ุงู„ุงุฎุชุจุงุฑ (Kali Linux, Tools) 8 ุณุงุนุงุช
3-4 ุงู„ุชุณุฌูŠู„ ููŠ HackerOne, Bugcrowd 4 ุณุงุนุงุช
5-6 ุฏุฑุงุณุฉ 10 ุชู‚ุงุฑูŠุฑ ู†ุงุฌุญุฉ 10 ุณุงุนุงุช
7 ุงุฎุชูŠุงุฑ 3 ุจุฑุงู…ุฌ Bug Bounty 3 ุณุงุนุงุช

๐Ÿ—“๏ธ ุงู„ุฃุณุจูˆุน ุงู„ุซุงู†ูŠ: ุงู„ุงุณุชุทู„ุงุน

# ุฃุฏูˆุงุช ุงู„ุงุณุชุทู„ุงุน ุงู„ุฃุณุงุณูŠุฉ
subfinder -d target.com
amass enum -d target.com
nmap -sV -sC target.com
nuclei -t vulnerabilities/ -u target.com
httpx -l subdomains.txt
Enter fullscreen mode Exit fullscreen mode

๐Ÿ—“๏ธ ุงู„ุฃุณุจูˆุน ุงู„ุซุงู„ุซ: ุงู„ุตูŠุฏ

  • ุงุฎุชุจุงุฑ 5 ู†ู‚ุงุท ุถุนู ูŠูˆู…ูŠุงู‹
  • ุชุทูˆูŠุฑ PoC ู„ู„ุซุบุฑุงุช ุงู„ู…ูƒุชุดูุฉ
  • ุชูˆุซูŠู‚ ูƒู„ ุดูŠุก

๐Ÿ—“๏ธ ุงู„ุฃุณุจูˆุน ุงู„ุฑุงุจุน: ุงู„ุฅุจู„ุงุบ

  • ุฅุฑุณุงู„ 3-5 ุชู‚ุงุฑูŠุฑ ุงุญุชุฑุงููŠุฉ
  • ุงู„ู…ุชุงุจุนุฉ ู…ุน ุงู„ุดุฑูƒุงุช
  • ุชุญุณูŠู† ุงู„ุชู‚ุงุฑูŠุฑ ุญุณุจ ุงู„ู…ู„ุงุญุธุงุช

๐ŸŽ–๏ธ ู†ู…ุงุฐุฌ ุงุญุชุฑุงููŠุฉ | Professional Templates

๐Ÿ“ ู‚ุงู„ุจ ุชู‚ุฑูŠุฑ ุงู„ุซุบุฑุฉ

# Vulnerability Report

## Summary
[ูˆุตู ู…ุฎุชุตุฑ ู„ู„ุซุบุฑุฉ ุจุฌู…ู„ุฉ ูˆุงุญุฏุฉ]

## Severity
**CVSS Score:** 8.5 (High)
**Impact:** Remote Code Execution

## Affected Asset
- **URL:** https://example.com/vulnerable-endpoint
- **Parameter:** id
- **Method:** POST

## Description
[ุดุฑุญ ุชูุตูŠู„ูŠ ู„ู„ุซุบุฑุฉ ูˆูƒูŠู ุชุนู…ู„]

## Steps to Reproduce
1. Navigate to https://example.com/login
2. Intercept the request using Burp Suite
3. Modify the `id` parameter to: `' OR 1=1--`
4. Forward the request
5. Observe SQL error message revealing database structure

## Proof of Concept
Enter fullscreen mode Exit fullscreen mode


python
import requests

url = "https://example.com/api/user"
payload = {"id": "' OR '1'='1"}

response = requests.post(url, json=payload)
print(response.text) # Shows all users data


## Impact
- Complete database disclosure
- User data exposure
- Potential account takeover
- Compliance violations (GDPR)

## Remediation
1. Use parameterized queries
2. Implement input validation
3. Apply least privilege principle
4. Add WAF rules

## Timeline
- **Discovered:** 2024-12-01
- **Reported:** 2024-12-01
- **Response:** Pending
- **Fixed:** TBD

## References
- OWASP SQL Injection: https://...
- CWE-89: https://...

## Reporter
- **Name:** The Warrior
- **Email:** Nike49424@gmail.com
- **GitHub:** @asrar-mared
Enter fullscreen mode Exit fullscreen mode

๐Ÿ† ุงู„ุฃู‡ุฏุงู | Goals

๐ŸŽฏ ุงู„ู‡ุฏู ุงู„ู‚ุฑูŠุจ (3 ุฃุดู‡ุฑ)

  • [ ] ๐Ÿ” ุงูƒุชุดุงู 10 ุซุบุฑุงุช ุตุงู„ุญุฉ
  • [ ] ๐Ÿ“ ุฅุฑุณุงู„ 15 ุชู‚ุฑูŠุฑ ุงุญุชุฑุงููŠ
  • [ ] ๐ŸŽ–๏ธ ุงู„ุญุตูˆู„ ุนู„ู‰ ุฃูˆู„ CVE ุฎุงุต ุจุฏุฑุน ุฒุงูŠุฏ
  • [ ] ๐Ÿ’ฐ ูƒุณุจ ุฃูˆู„ ู…ูƒุงูุฃุฉ Bug Bounty
  • [ ] โญ ุงู„ูˆุตูˆู„ ู„ู€ Top 100 ููŠ HackerOne

๐ŸŽฏ ุงู„ู‡ุฏู ุงู„ู…ุชูˆุณุท (6 ุฃุดู‡ุฑ)

  • [ ] ๐Ÿ† 3+ CVEs ู…ุณุฌู„ุฉ
  • [ ] ๐Ÿ’Ž 5 ุซุบุฑุงุช Critical/High
  • [ ] ๐Ÿ“Š Top 50 ููŠ ู…ู†ุตุฉ Bug Bounty
  • [ ] ๐ŸŽค ุชู‚ุฏูŠู… Talk ููŠ ู…ุคุชู…ุฑ ุฃู…ู†ูŠ
  • [ ] ๐Ÿ“š ู†ุดุฑ ุจุญุซ ุฃู…ู†ูŠ

๐ŸŽฏ ุงู„ู‡ุฏู ุงู„ุจุนูŠุฏ (ุณู†ุฉ)

  • [ ] ๐Ÿ‘‘ 10+ CVEs
  • [ ] ๐ŸŒŸ Top 10 researcher
  • [ ] ๐Ÿ’ฐ $50K+ ู…ู† Bug Bounties
  • [ ] ๐Ÿ“– ูƒุชุงุจุฉ ุฏู„ูŠู„ ุจุงู„ู„ุบุฉ ุงู„ุนุฑุจูŠุฉ
  • [ ] ๐ŸŽ–๏ธ OSCP/OSWE Certification

โš ๏ธ ุชุญุฐูŠุฑุงุช ู‚ุงู†ูˆู†ูŠุฉ ู…ู‡ู…ุฉ | Legal Warnings

โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•—
โ•‘                                                                   โ•‘
โ•‘                    โš ๏ธ  LEGAL WARNINGS  โš ๏ธ                        โ•‘
โ•‘                      ุชุญุฐูŠุฑุงุช ู‚ุงู†ูˆู†ูŠุฉ                             โ•‘
โ•‘                                                                   โ•‘
โ•‘  ๐Ÿšซ ู„ุง ุชุฎุชุจุฑ ุฃูŠ ู†ุธุงู… ุจุฏูˆู† ุฅุฐู† ุฑุณู…ูŠ                             โ•‘
โ•‘  ๐Ÿšซ ุงู„ุงุฎุชุฑุงู‚ ุบูŠุฑ ุงู„ู…ุตุฑุญ ุจู‡ ุฌุฑูŠู…ุฉ                               โ•‘
โ•‘  ๐Ÿšซ ุงุญุชุฑู… ุงู„ุฎุตูˆุตูŠุฉ ูˆุงู„ุจูŠุงู†ุงุช ุงู„ุดุฎุตูŠุฉ                            โ•‘
โ•‘  ๐Ÿšซ ู„ุง ุชุณุจุจ ุฃูŠ ุถุฑุฑ ุฃูˆ ุชูˆู‚ู ู„ู„ุฎุฏู…ุฉ                               โ•‘
โ•‘  โœ… ุงุชุจุน ุจุฑุงู…ุฌ Bug Bounty ุงู„ุฑุณู…ูŠุฉ ูู‚ุท                          โ•‘
โ•‘  โœ… ุฃุจู„ุบ ุจุดูƒู„ ู…ุณุคูˆู„ ุฏุงุฆู…ุงู‹                                     โ•‘
โ•‘  โœ… ูˆุซู‘ู‚ ูƒู„ ุดูŠุก ุจุดูƒู„ ู‚ุงู†ูˆู†ูŠ                                    โ•‘
โ•‘                                                                   โ•‘
โ•šโ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•
Enter fullscreen mode Exit fullscreen mode

๐ŸŽ“ ุงู„ู…ูˆุงุฑุฏ ุงู„ุชุนู„ูŠู…ูŠุฉ | Learning Resources

๐Ÿ“š ูƒูˆุฑุณุงุช ู…ุฌุงู†ูŠุฉ

๐ŸŽฅ ู‚ู†ูˆุงุช YouTube

  • STร–K
  • InsiderPhD
  • NahamSec
  • LiveOverflow

๐Ÿ“– ูƒุชุจ ุฃุณุงุณูŠุฉ

  • The Web Application Hacker's Handbook
  • Real-World Bug Hunting
  • Bug Bounty Bootcamp

๐ŸŽ–๏ธ ุงู„ุฎู„ุงุตุฉ | Conclusion

โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•—
โ•‘                                                                   โ•‘
โ•‘              ๐Ÿ›ก๏ธ  ู†ุตุทุงุฏ ุงู„ุซุบุฑุงุช ุจุดุฑู ูˆุงุญุชุฑุงู  โš”๏ธ                 โ•‘
โ•‘                                                                   โ•‘
โ•‘  โœ… ู†ุนู…ู„ ุจุฃูŠุฏูŠู†ุง                                                 โ•‘
โ•‘  โœ… ู†ู„ุชุฒู… ุจุงู„ู‚ุงู†ูˆู†                                               โ•‘
โ•‘  โœ… ู†ุจู„ู‘ุบ ุจู…ุณุคูˆู„ูŠุฉ                                               โ•‘
โ•‘  โœ… ู†ูˆุซู‘ู‚ ุจุงุญุชุฑุงููŠุฉ                                             โ•‘
โ•‘  โœ… ู†ุจู†ูŠ ุณู…ุนุฉ ุทูŠุจุฉ                                               โ•‘
โ•‘                                                                   โ•‘
โ•‘        "ุงู„ู…ุญุงุฑุจ ุงู„ุญู‚ูŠู‚ูŠ ูŠุตู†ุน ุงู†ุชุตุงุฑุงุชู‡ ุจู†ูุณู‡"                  โ•‘
โ•‘                                                                   โ•‘
โ•šโ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•
Enter fullscreen mode Exit fullscreen mode

Hunter
Ethical
Warrior

๐Ÿ‡ฆ๐Ÿ‡ช ู†ุตุทุงุฏ ุจุดุฑูุŒ ู†ู†ุฌุญ ุจุฌุฏุงุฑุฉ | Hunt with Honor, Succeed with Merit ๐Ÿ‡ฆ๐Ÿ‡ช

Top comments (0)