Security Cipher
xss
sql injection
xxe
bug-bounty
recon
wordpress
ai
red-team
ctf
graphql
Title | Link | Author | Tags | Publication date |
---|---|---|---|---|
Bug bounty training from scratch: | https://medium.com/@kataeriidubstep/bug-bounty-training-from-scratch-f62cc13fbe64?source=rss------bug_bounty-5 | Pavan kumar.G | appsec, computer-science, bug-bounty | 07-Dec-2023 |
Bug bounty training from scratch for beginners: | https://medium.com/@kataeriidubstep/bug-bounty-training-from-scratch-for-beginners-1f17e609fbf0?source=rss------bug_bounty-5 | Pavan kumar.G | cybersecurity, appsec, computer-science, bug-bounty, linux | 07-Dec-2023 |
Bug bounty training from scratch(part1->lesson12): | https://medium.com/@kataeriidubstep/bug-bounty-training-from-scratch-part1-lesson12-206baedf6747?source=rss------bug_bounty-5 | Pavan kumar.G | bug-bounty, appsec, computer-science | 07-Dec-2023 |
Bug bounty training from scratch(part1->lesson11): | https://medium.com/@kataeriidubstep/bug-bounty-training-from-scratch-part1-lesson11-6f2c71aa8135?source=rss------bug_bounty-5 | Pavan kumar.G | computer-science, appsec, bug-bounty | 07-Dec-2023 |
Bug bounty training from scratch(part1->lesson10): | https://medium.com/@kataeriidubstep/bug-bounty-training-from-scratch-part1-lesson10-b2af2898a6b1?source=rss------bug_bounty-5 | Pavan kumar.G | appsec, computer-science, bug-bounty | 07-Dec-2023 |
Bug bounty training from scratch(part1->lesson9): | https://medium.com/@kataeriidubstep/bug-bounty-training-from-scratch-part1-lesson9-44b004fe5550?source=rss------bug_bounty-5 | Pavan kumar.G | appsec, computer-science, bug-bounty | 07-Dec-2023 |
Bug bounty training from scratch(part1-> lesson8): | https://medium.com/@kataeriidubstep/bug-bounty-training-from-scratch-part1-lesson8-98680d93e4bf?source=rss------bug_bounty-5 | Pavan kumar.G | bug-bounty, appsec, computer-science | 07-Dec-2023 |
Bug bounty training from scratch(part1->lesson7): | https://medium.com/@kataeriidubstep/bug-bounty-training-from-scratch-part1-lesson7-d04def4b4ef3?source=rss------bug_bounty-5 | Pavan kumar.G | appsec, computer-science, bug-bounty | 07-Dec-2023 |
Bug bounty training from scratch (part1->lesson6): | https://medium.com/@kataeriidubstep/bug-bounty-training-from-scratch-part1-lesson6-1b4b8742a1ec?source=rss------bug_bounty-5 | Pavan kumar.G | computer-science, bug-bounty, appsec | 07-Dec-2023 |
Bug bounty training from scratch(part1->lesson5): | https://medium.com/@kataeriidubstep/bug-bounty-training-from-scratch-part1-lesson5-15d8c1f2cc5e?source=rss------bug_bounty-5 | Pavan kumar.G | appsec, computer-science, bug-bounty | 07-Dec-2023 |
Bug bounty training from scratch (part1->lesson4): | https://medium.com/@kataeriidubstep/bug-bounty-training-from-scratch-part1-lesson4-653699a21284?source=rss------bug_bounty-5 | Pavan kumar.G | appsec, computer-science, bug-bounty | 07-Dec-2023 |
Advent of Cyber 2023 -Day 6 Walkthrough.. By Manoj Mudabagil. | https://medium.com/@manojmudabagil/advent-of-cyber-2023-day-6-walkthrough-by-manoj-mudabagil-cd7062261d33?source=rss------bug_bounty-5 | Manoj Mudabagil | tryhackme, hacking, advent-of-cyber-2023, cybersecurity, bug-bounty | 7-Dec-2023 |
How I Discovered SSRF on Hackerone Program | https://medium.com/@kerstanhgnhzhw/how-i-discovered-ssrf-on-hackerone-program-42b73c1aa716?source=rss------bug_bounty-5 | kerstan | ssrf, bug-bounty, hackerone, bug-bounty-tips, graphql | 7-Dec-2023 |
20 Days Of Hacking: Bug Bounty Challenge —Conclusion | https://wallotry.medium.com/20-days-of-hacking-bug-bounty-challenge-conclusion-0ac57a737883?source=rss------bug_bounty-5 | Wallotry | bug-bounty-writeup, bug-bounty-tips, bug-bounty-hunter, bug-bounty, bug-bounty-hunting | 06-Dec-2023 |
The Secret World of Malicious Strings and Hidden Threats – Are You at Risk? | https://medium.com/@paritoshblogs/the-secret-world-of-malicious-strings-and-hidden-threats-are-you-at-risk-cb25535d4718?source=rss------bug_bounty-5 | Paritosh | information-security, hacking, http-headers, bug-bounty, cybersecurity | 06-Dec-2023 |
Python Program to find GCD (Greatest Common Divisor) for Cryptography | https://rajput623929.medium.com/python-program-to-find-gcd-greatest-common-divisor-for-cryptography-816075bba2fa?source=rss------bug_bounty-5 | Mr.Horbio | cybersecurity, hacking, crytocurrency, cryptography, bug-bounty | 06-Dec-2023 |
API Security — Web Security Academy | https://mrshan.medium.com/api-security-web-security-academy-3578589fc3fa?source=rss------bug_bounty-5 | MR SHAN | web-security-academy, bug-bounty | 06-Dec-2023 |
Mantle LSP バグバウンティプログラムのお知らせ | https://medium.com/0xmantle-jp/mantle-lsp-%E3%83%90%E3%82%B0%E3%83%90%E3%82%A6%E3%83%B3%E3%83%86%E3%82%A3%E3%83%97%E3%83%AD%E3%82%B0%E3%83%A9%E3%83%A0%E3%81%AE%E3%81%8A%E7%9F%A5%E3%82%89%E3%81%9B-ba2116b62f52?source=rss------bug_bounty-5 | nori | bug-bounty, mantle, mantle-lsp, l2 | 06-Dec-2023 |
Spool Unveils Comprehensive Bug Bounty Programme to Fortify DeFi Security | https://medium.com/spoolfi/spool-unveils-comprehensive-bug-bounty-programme-to-fortify-defi-security-673559c463dd?source=rss------bug_bounty-5 | Spool | bug-bounty, security, blockchain, defi, smart-contracts | 6-Dec-2023 |
Cheat code for file upload vulnerability by kidnapshadow | https://medium.com/@kidnapshadow/cheat-code-for-file-upload-vulnerability-by-kidnapshadow-ebb0794581f2?source=rss------bug_bounty-5 | Kidnapshadow | kidnapshadow, owasp, vulnerability, file-upload-vulnerability, bug-bounty | 6-Dec-2023 |
API Documentation Tips | https://medium.com/@lopseg/api-documentation-tips-e36e63f47589?source=rss------bug_bounty-5 | Rafael Silva | bug-bounty-tips, bug-hunting, bug-bounty | 06-Dec-2023 |
From Bug Bounty Prodigy to Leadership Luminary: Aditya Shende Ascends at XCOODE | https://medium.com/@xcoode/from-bug-bounty-prodigy-to-leadership-luminary-aditya-shende-ascends-at-xcoode-18a6aaab1471?source=rss------bug_bounty-5 | XCOODE | cybersecurity, bug-bounty, leadership, cyber | 05-Dec-2023 |
Empowering the Next Generation: XCOODE Unveils Hacckers Bug Bounty Platform for Cyber Enthusiasts | https://medium.com/@xcoode/empowering-the-next-generation-xcoode-unveils-hacckers-bug-bounty-platform-for-cyber-enthusiasts-bc6dc31c27b9?source=rss------bug_bounty-5 | XCOODE | cybersecurity, hacker, cyber, bug-bounty | 05-Dec-2023 |
PDF Upload Leading to Stored XSS | https://medium.com/@katmaca2014/pdf-upload-leading-to-stored-xss-f712326705ee?source=rss------bug_bounty-5 | Kaan Atmaca | cybersecurity, penetration-testing, bug-bounty, hacking, pentesting | 05-Dec-2023 |
LFI via SMTP log poisoning | https://medium.com/@akshadjoshi/lfi-via-smtp-log-poisoning-65e02dd21068?source=rss------bug_bounty-5 | Akshad Joshi | log-poisoning, local-file-inclusion, smtp, bug-bounty, rce | 05-Dec-2023 |
Bypassing 2FA Authentication in TeamPass System | https://medium.com/@developer_1991/bypassing-2fa-authentication-in-teampass-system-f3184fe8589d?source=rss------bug_bounty-5 | HamidReza Faghani | bug-bounty, account-takeover, security, 0day, exploitation | 05-Dec-2023 |
Bugbounty Write-up: IDOR (Insecure Direct Object References) | https://medium.com/@spydernox/bugbounty-write-up-idor-insecure-direct-object-references-b1cd15ae5e3b?source=rss------bug_bounty-5 | @SpyderNox | ethical-hacking, bug-bounty, hunting, bugcrowd, pentesting | 05-Dec-2023 |
Admin Panel Access | https://medium.com/@omdubey170/admin-panel-access-5dd2fd4938a0?source=rss------bug_bounty-5 | Omdubey | bug-bounty, bugs, bug-bounty-tips, ethical-hacking, pentesting | 05-Dec-2023 |
LFI on Microsoft | https://medium.com/@sushilgill08/lfi-on-microsoft-2d30c9283534?source=rss------bug_bounty-5 | Sushil Choudhary | hackerone, bug-hunting, microsoft, bug-bounty, bugbounty-writeup | 04-Dec-2023 |
How I Found A Website Vulnerability In Under 10 Minutes | https://medium.com/@abidmafahim7/how-i-found-a-website-vulnerability-in-under-10-minutes-2b2ff934545d?source=rss------bug_bounty-5 | Abidmafahim | git-exposed, web-vulnerabilities, bug-bounty | 04-Dec-2023 |
Elevating Security: Whatfix Transition to a Custom Vulnerability Disclosure Program (VDP) | https://medium.com/whatfix-techblog/elevating-security-whatfix-transition-to-a-custom-vulnerability-disclosure-program-vdp-e6d5a7e11c9d?source=rss------bug_bounty-5 | Kamlesh Tukaral | vulnerability-disclosure, whatfix, vdp, bug-bounty, infosec | 04-Dec-2023 |
The Hidden Dangers Lurking in Your Active Directory Certificate Services – What You Need to Know… | https://medium.com/@paritoshblogs/the-hidden-dangers-lurking-in-your-active-directory-certificate-services-what-you-need-to-know-7c735c09e0fd?source=rss------bug_bounty-5 | Paritosh | cybersecurity, active-directory, bug-bounty, information-security, adc | 04-Dec-2023 |
Bug Hunter journal day #3 and #4 | https://medium.com/@joaomaia171820/bug-hunter-journal-day-3-and-4-37b4c653abd9?source=rss------bug_bounty-5 | Jhonny_The_Kid | bug-bounty-writeup, bug-bounty-program, bug-bounty, cybersecurity | 04-Dec-2023 |
Javascript Analysis to SQL injection | https://melguerdawi.medium.com/javascript-analysis-to-sql-injection-ca763f9c4c4e?source=rss------bug_bounty-5 | Mostafa Elguerdawi | bug-bounty, bug-bounty-tips, hackerone, sql-injection | 04-Dec-2023 |
Web Enumeration With Gobuster | https://medium.com/@ronak.d.sharma111/web-enumeration-with-gobuster-ca4ac46da90b?source=rss------bug_bounty-5 | Ronak Sharma | cybersecurity, hacking, bug-bounty | 04-Dec-2023 |
20 Days Of Hacking: Bug Bounty Challenge — Day 2 | https://wallotry.medium.com/20-days-of-hacking-bug-bounty-challenge-day-2-51b02ca865ea?source=rss------bug_bounty-5 | Wallotry | bug-bounty-hunter, bug-bounty, bug-bounty-writeup, bug-bounty-tips | 03-Dec-2023 |
How I Found My First Website Vulnerability as a Web Pentester | https://medium.com/@abidmafahim7/how-i-found-my-first-website-vulnerability-as-a-web-pentester-2dee809e0eea?source=rss------bug_bounty-5 | Abidmafahim | sql-injection-attack, bug-bounty, web-vulnerabilities, xss-vulnerability | 03-Dec-2023 |
My first and simple ATO in a private program | https://medium.com/@pabs2141/my-first-and-simple-ato-in-a-private-program-212c6b17b245?source=rss------bug_bounty-5 | PanSa | bug-bounty, bug-bounty-writeup, hacking, account-takeover | 03-Dec-2023 |
My Confusion Over Local File Inclusion | https://medium.com/illuminations-mirror/my-confusion-over-local-file-inclusion-11f3d7c43b23?source=rss------bug_bounty-5 | Quintius Walker | poetry, bug-bounty, writeup, cybersecurity, poetry-on-medium | 03-Dec-2023 |
The Shocking Secrets Behind Foolproof Vulnerability Response! | https://medium.com/@paritoshblogs/the-shocking-secrets-behind-foolproof-vulnerability-response-fc6fe8b91d47?source=rss------bug_bounty-5 | Paritosh | vulnerability, cybersecurity, bug-bounty, hacking, information-security | 03-Dec-2023 |
The ONE Vulnerability Every Website Owner Fears — Learn How YOU Can Expose It! | https://medium.com/@paritoshblogs/the-one-vulnerability-every-website-owner-fears-learn-how-you-can-expose-it-71fef31b0ece?source=rss------bug_bounty-5 | Paritosh | programming, bug-bounty, hacking, information-security, cybersecurity | 03-Dec-2023 |
My First Valid Bug!!! | https://medium.com/@sushilgill08/my-first-valid-bug-444f26e1f8be?source=rss------bug_bounty-5 | Sushil Choudhary | cybersecurity, bug-bounty-writeup, bugbounty-tips, bug-hunting, bug-bounty | 03-Dec-2023 |
Everything I know on Recon | https://medium.com/@joshdesharnais1/everything-i-know-on-recon-689f6a535757?source=rss------bug_bounty-5 | Joshua Desharnais | recon, tools-and-resources, tools, bug-bounty, bug-bounty-tips | 03-Dec-2023 |
Streamable Finance Bug Bounty Campaign is live! | https://streamablefinance.medium.com/streamable-finance-bug-bounty-campaign-is-live-2ced6e4c68d5?source=rss------bug_bounty-5 | Streamable Finance | bug-bounty, product-launch | 03-Dec-2023 |
Business Logic Vulnerability: Payment bypass | https://vrushabhd.medium.com/business-logic-vulnerability-payment-bypass-9335bdbdbdf6?source=rss------bug_bounty-5 | Mr. Vrushabh | pentesting, bug-bounty, vulnerability, bug-bounty-tips, hackerone | 03-Dec-2023 |
How I Created an Advanced Web Code Analyzer Using ChatGPT | https://infosecwriteups.com/how-i-created-an-advanced-web-code-analyzer-using-chatgpt-6b32a7d42f88?source=rss------bug_bounty-5 | Jarred Longoria | cybersecurity, chatgpt, infosec, bug-bounty | 03-Dec-2023 |
Azure Log Analysis: Real-Life Incidents and Practical Tips to Safeguard | https://medium.com/@paritoshblogs/azure-log-analysis-real-life-incidents-and-practical-tips-to-safeguard-077faf28919b?source=rss------bug_bounty-5 | Paritosh | cybersecurity, incident-response, azure, bug-bounty, information-security | 03-Dec-2023 |
How to debug android native libraries using JEB decompiler? | https://medium.com/@shubhamsonani/how-to-debug-android-native-libraries-using-jeb-decompiler-eec681a22cf3?source=rss------bug_bounty-5 | Shubham Sonani | bug-bounty, hacking, android, cybersecurity, penetration-testing | 03-Dec-2023 |
How to bypass debugger detection in Android/iOS native libraries using IDA Pro? | https://medium.com/@shubhamsonani/how-to-bypass-debugger-detection-in-android-ios-native-libraries-using-ida-pro-3e289c2127d6?source=rss------bug_bounty-5 | Shubham Sonani | bug-bounty, cybersecurity, android, hacking, penetration-testing | 03-Dec-2023 |
How to debug Android/iOS native library using GDB debugger? | https://medium.com/@shubhamsonani/how-to-debug-android-ios-native-library-using-gdb-debugger-d02c0e0341eb?source=rss------bug_bounty-5 | Shubham Sonani | hacking, penetration-testing, cybersecurity, technology, bug-bounty | 03-Dec-2023 |
20 Days Of Hacking: Bug Bounty Challenge — Day 1 | https://wallotry.medium.com/20-days-of-hacking-bug-bounty-challenge-day-1-38a1735644ab?source=rss------bug_bounty-5 | Wallotry | bug-bounty-hunter, bug-bounty-tips, bug-bounty-writeup, bug-bounty | 02-Dec-2023 |
Vulnerability Discovery in SRC — Concurrency | https://medium.com/@rynnnn617/vulnerability-discovery-in-src-concurrency-baa9ffdfa9d9?source=rss------bug_bounty-5 | Ry4nnnn | concurrency, bug-bounty-tips, bug-bounty | 02-Dec-2023 |
Lateral Movement Techniques Through File Share Exploitation | https://medium.com/@paritoshblogs/lateral-movement-techniques-through-file-share-exploitation-a50d1ffdb8e7?source=rss------bug_bounty-5 | Paritosh | lateral-movement, hacking, information-security, cybersecurity, bug-bounty | 02-Dec-2023 |
The Rising Threat of Cookie Theft and RMM Takeover | https://medium.com/@paritoshblogs/the-rising-threat-of-cookie-theft-and-rmm-takeover-bafe0013ffc0?source=rss------bug_bounty-5 | Paritosh | realtime-monitoring, cookies, cybersecurity, hacking, bug-bounty | 02-Dec-2023 |
Bug Hunter journal day(week) #1 | https://medium.com/@joaomaia171820/bug-hunter-journal-day-week-1-699926bf1a70?source=rss------bug_bounty-5 | Jhonny_The_Kid | bug-bounty-writeup, bug-bounty-program, bug-bounty, pentest | 02-Dec-2023 |
Mastering Bug Bounty: A Comprehensive Guide to Earning Money Ethically and Safely in Cybersecurity. | https://medium.com/@thecyberxcompany/mastering-bug-bounty-a-comprehensive-guide-to-earning-money-ethically-and-safely-in-cybersecurity-46c1b44f52fd?source=rss------bug_bounty-5 | The CyberX Company | ethical-hacking, hacking, cybersecurity, bug-bounty, earn-money-online | 02-Dec-2023 |
Mastering Bug Bounty Hunting: A Comprehensive Guide to Launch Your Cybersecurity Career. | https://medium.com/@thecyberxcompany/mastering-bug-bounty-hunting-a-comprehensive-guide-to-launch-your-cybersecurity-career-5553ddcced30?source=rss------bug_bounty-5 | The CyberX Company | bug-bounty-tips, bugs, ethical-hacking, cybersecurity, bug-bounty | 02-Dec-2023 |
How MAC Spoofing works and How attackers do that!! | https://medium.com/@hackerdom_devil/how-mac-spoofing-works-and-how-attackers-do-that-57797179430f?source=rss------bug_bounty-5 | Gokuleswaran B | ethical-hacking, mac-spoofing, penetration-testing, bug-bounty, bug-bounty-tips | 02-Dec-2023 |
Top 25 Advanced Google Dorks for OSINT and Bug Bounty Hunting | https://osintteam.blog/top-25-advanced-google-dorks-for-osint-and-bug-bounty-hunting-f2d9dceed068?source=rss------bug_bounty-5 | as-squirrel | bug-bounty, osint, cybersecurity, google-dorks-list, hacking | 02-Dec-2023 |
Day 12 Bug Bounty — 60 days 60 bugs challenge (Didn’t found anything, but could be something… | https://medium.com/@avbhijitdutta99/day-12-bug-bounty-60-days-60-bugs-challenge-didnt-found-anything-but-could-be-something-ba0324d96ce7?source=rss------bug_bounty-5 | Abhijit Dutta | bug-bounty, bug-bounty-hunter, bugbountychallenge, bug-bounty-writeup | 01-Dec-2023 |
Writing High-Quality Bug Reports: Best Practices for Effective Bug Bounty Hunting | https://medium.com/@prathameshbagul/writing-high-quality-bug-reports-best-practices-for-effective-bug-bounty-hunting-74542dff9793?source=rss------bug_bounty-5 | Prath | cybersecurity, pentesting, report, bug-bounty-tips, bug-bounty | 01-Dec-2023 |
What is this httpx thing? Using it in your adventure with Bugbounty? | https://systemweakness.com/what-is-this-httpx-thing-using-it-in-your-adventure-with-bugbounty-f91f1ef31d49?source=rss------bug_bounty-5 | Vicky Aryan | recon, bug-bounty, cybersecurity, hacking, httpx | 01-Dec-2023 |
Verification Bypass via “Mass Assignment” | https://larebsec.medium.com/verification-bypass-via-mass-assignment-25707e210a42?source=rss------bug_bounty-5 | Lareb | bug-bounty, cybersecurity, bugbounty-writeup, hacking, vulnerability | 01-Dec-2023 |
How attackers use ARP Spoofing / Poisoning to takeover a complete Network!! | https://medium.com/@hackerdom_devil/how-attackers-use-arp-spoofing-poisoning-to-takeover-a-complete-network-8477cea362c4?source=rss------bug_bounty-5 | Gokuleswaran B | penetration-testing, bug-bounty, ethical-hacking, network-security, arp-spoofing | 01-Dec-2023 |
Building Kubernetes Detections: Strengthening Security with Real-world Examples | https://medium.com/@paritoshblogs/building-kubernetes-detections-strengthening-security-with-real-world-examples-8268cddd852f?source=rss------bug_bounty-5 | Paritosh | bug-bounty, cybersecurity, programming, information-security, hacking | 01-Dec-2023 |
Part 03 | What To Do After Choosing a Target? | Post Recon |Bug Bounty | https://infosecwriteups.com/part-03-what-to-do-after-choosing-a-target-post-recon-bug-bounty-1a7f431b4d79?source=rss------bug_bounty-5 | Om Arora | bug-bounty, hacking, bug-bounty-tips, methodology, infosec | 01-Dec-2023 |
Navigating the Bug Bounty Arena: Earn $605,000 Reward, Learn More | https://medium.com/coded-tech-talk/navigating-the-bug-bounty-arena-earn-605-000-reward-learn-more-e754e077a81c?source=rss------bug_bounty-5 | Coded Conversations | bug-bounty-tips, cybersecurity, security, hacking, bug-bounty | 01-Dec-2023 |
Project 2510: Bug Bounty Challenge — The End? | https://wallotry.medium.com/project-2510-bug-bounty-challenge-the-end-afb67ea2abd1?source=rss------bug_bounty-5 | Wallotry | bug-bounty-hunter, bug-bounty-tips, bug-bounty-writeup, bug-bounty-hunting, bug-bounty | 30-Nov-2023 |
Exploring the Logic of XSS Attacks and Bypassing Techniques through Browser Decoding | https://medium.com/@test_90648/considering-xss-attacks-and-bypass-logic-from-the-perspective-of-browser-decoding-logic-can-provide-b4579d3c458b?source=rss------bug_bounty-5 | JessicaSecurity | xs, bug-bounty, web, security, browsers | 30-Nov-2023 |
What is SQL injection | https://medium.com/@savanghori1203/what-is-sql-injection-a3907c6967a5?source=rss------bug_bounty-5 | Savanghori | vulnerability, bug-bounty-tips, bug-bounty, sql-injection, sql | 30-Nov-2023 |
Cross-Site Scripting (XSS) | https://medium.com/@savanghori1203/cross-site-scripting-xss-b6139b38fa2b?source=rss------bug_bounty-5 | Savanghori | bug-bounty, xss-vulnerability, bug-bounty-tips, bugs, xss-attack | 30-Nov-2023 |
The Shocking Truth Behind Indicators of Compromise (IOCs) — You Won’t Believe What We Found! | https://medium.com/@paritoshblogs/the-shocking-truth-behind-indicators-of-compromise-iocs-you-wont-believe-what-we-found-5255d54b98d9?source=rss------bug_bounty-5 | Paritosh | bug-bounty, malware-analysis, cybersecurity, ioc, information-security | 30-Nov-2023 |
Subdomain Enumeration Techniques | https://medium.com/@savanghori1203/subdomain-enumeration-00f487d6b829?source=rss------bug_bounty-5 | Savanghori | bug-bounty-tips, bug-bounty, recon, subdomains-enumeration, subdomain | 30-Nov-2023 |
Day 11 Bug Bounty — 60 days 60 bugs challenge | https://medium.com/@avbhijitdutta99/day-11-bug-bounty-60-days-60-bugs-challenge-530119a74c90?source=rss------bug_bounty-5 | Abhijit Dutta | bugbountychallenge, bug-bounty-tips, bug-bounty, bug-bounty-writeup | 30-Nov-2023 |
Network Managed Detection and Response (NMDR): Strengthening Cybersecurity Defenses | https://medium.com/@paritoshblogs/network-managed-detection-and-response-nmdr-strengthening-cybersecurity-defenses-a8a5e989b310?source=rss------bug_bounty-5 | Paritosh | information-security, managed-detection, bug-bounty, nmdr, cybersecurity | 30-Nov-2023 |
Server-Side Request Forgery (SSRF) | https://medium.com/@savanghori1203/server-side-request-forgery-ssrf-1e9755b38c59?source=rss------bug_bounty-5 | SavanGhori | ssrf, vulnerability, bug-bounty, ssrf-bug, bug-bounty-tips | 30-Nov-2023 |
Ödeme sayfasında Business Logic | https://medium.com/@el-cezeri/%C3%B6deme-sayfas%C4%B1nda-business-logic-cba493d9f6b8?source=rss------bug_bounty-5 | Samet Yiğit | bugbounty-writeup, ödülavcılığı, bug-bounty | 30-Nov-2023 |
Remote Code Execution (RCE) | https://medium.com/@savanghori1203/remote-code-execution-rce-9f078b98316a?source=rss------bug_bounty-5 | SavanGhori | bugs, bug-bounty-tips, bug-bounty, rce, vulnerability | 30-Nov-2023 |
Insecure Direct Object Reference(IDOR) | https://medium.com/@savanghori1203/idor-insecure-direct-object-reference-88576225e265?source=rss------bug_bounty-5 | SavanGhori | vulnerability, idor, bugs, bug-bounty, bug-bounty-tips | 30-Nov-2023 |
Simple Recon Di Android Menggunakan Tools TheTimeMachine dan Dirsearch | https://alpinnnnnn13.medium.com/simple-recon-di-android-menggunakan-tools-thetimemachine-dan-dirsearch-3384aad17c15?source=rss------bug_bounty-5 | Mohammad Alfin Hidayatullah | bug-bounty, bug-bounty-tips, recon, scanning | 30-Nov-2023 |
Race Condition - A cURL Chaos | https://shahjerry33.medium.com/race-condition-a-curl-chaos-820cb289cbf1?source=rss------bug_bounty-5 | Jerry Shah (Jerry) | cybersecurity, infosec, bug-bounty, vulnerability, pentesting | 30-Nov-2023 |
Easy Bug Hunting: HTML Injection Explained Step by Step” | https://medium.com/@faizankhaliq26/easy-bug-hunting-html-injection-explained-step-by-step-011901f183d9?source=rss------bug_bounty-5 | MUHAMMAD FAIZAN KHAN | bwapp, bug-bounty, web-application-security, penetration-testing, html-injection | 30-Nov-2023 |
Top Free Resources for Ethical Hacking and Bug Bounty Beginners & Experts | https://infosecwriteups.com/top-free-resources-for-ethical-hacking-and-bug-bounty-beginners-experts-9556ef045db4?source=rss------bug_bounty-5 | Jarred Longoria | cybersecurity, ethical-hacking, bug-bounty, free-resources | 30-Nov-2023 |
1.11 Lab: Blind SQL injection with time delays and information retrieval | 2023 | https://cyberw1ng.medium.com/1-11-lab-blind-sql-injection-with-time-delays-and-information-retrieval-2023-e8123405e87d?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | cybersecurity, careers, penetration-testing, hacking, bug-bounty | 30-Nov-2023 |
Easy Bug Hunting: HTML Injection Explained Step by Step | https://medium.com/@faizankhaliq26/easy-bug-hunting-html-injection-explained-step-by-step-011901f183d9?source=rss------bug_bounty-5 | MUHAMMAD FAIZAN KHAN | bwapp, bug-bounty, web-application-security, penetration-testing, html-injection | 30-Nov-2023 |
Rise of Broken Access Control | https://medium.com/@rafinrahmanchy/rise-of-broken-access-control-51356916235f?source=rss------bug_bounty-5 | Rafin Rahman Chy | bug-bounty, appsec, application-security, infosec, web-security | 30-Nov-2023 |
Easy Bug Hunting: HTML Injection Explained Step by Step | https://medium.com/@faizankhaliq26/easy-bug-hunting-html-injection-explained-step-by-step-011901f183d9?source=rss------bug_bounty-5 | bwapp, bug-bounty, web-application-security, penetration-testing, html-injection | 30-Nov-2023 | |
Day 10 Bug Bounty — 60 days 60bugs challenge — New Start! | https://medium.com/@avbhijitdutta99/day-10-bug-bounty-60-days-60bugs-challenge-new-start-832988aeb569?source=rss------bug_bounty-5 | Abhijit Dutta | bug-bounty, bug-bounty-tips, bugbountychallenge, bug-bounty-writeup | 29-Nov-2023 |
Windows Login Bypass | https://infosecwriteups.com/windows-login-bypass-eab148bc9dd5?source=rss------bug_bounty-5 | c0d3x27 | software-development, bug-bounty, cybersecurity, windows, hacking | 29-Nov-2023 |
Cybersecurity Risk of Opening Up to the Internet | https://medium.com/@paritoshblogs/cybersecurity-risk-of-opening-up-to-the-internet-c624c9a018ba?source=rss------bug_bounty-5 | Paritosh | cybersecurity, bug-bounty, programming, hacking, internet-of-things | 29-Nov-2023 |
OSINT: How to find information on anyone | https://medium.com/@sakthi172000/osint-how-to-find-information-on-anyone-14514216cec1?source=rss------bug_bounty-5 | SAKTHIVEL P | bug-bounty, infosec, cybersecurity, osint, osint-tool | 29-Nov-2023 |
Mastering API Penetration Testing: A Comprehensive Guide for Security Pentesters | https://infosecwriteups.com/mastering-api-penetration-testing-a-comprehensive-guide-for-security-pentesters-bf62f65b5b21?source=rss------bug_bounty-5 | Suprajabaskaran | ethical-hacking, bug-bounty, pentesting, cybersecurity, api | 29-Nov-2023 |
Useful tools for bug hunter | https://medium.com/@cyberhansu/useful-tools-for-bug-hunter-f493866fa1bc?source=rss------bug_bounty-5 | cyberhansu | hunter-s-thompson, bug-hunting, bug-bounty, hacker, bug-hunter | 29-Nov-2023 |
How to make money legally as a Hacker | https://medium.com/@cyberhansu/how-to-make-money-legally-as-a-hacker-c27037b143a9?source=rss------bug_bounty-5 | cyberhansu | bug-bounty, make-money, web-application-security, mobileapplicationsecurity | 29-Nov-2023 |
PII Disclosure Worth $750 | https://vijetareigns.medium.com/pii-disclosure-worth-750-758b72e7e8ca?source=rss------bug_bounty-5 | the_unlucky_guy | bug-bounty-tips, bugbounty-writeup, bug-bounty, bug-bounty-writeup, cybersecurity | 29-Nov-2023 |
R.xyz: Web3 Bug Bounty Platform | https://medium.com/coinmonks/r-xyz-web3-bug-bounty-platform-95d48c911989?source=rss------bug_bounty-5 | Officer's Notes | smart-contract-security, bug-bounty-tips, bug-bounty, hacking, web3 | 29-Nov-2023 |
CRLF to XSS | https://medium.com/@a7med.ctf/crlf-to-xss-8059ceefd349?source=rss------bug_bounty-5 | Ahmed Mahmoued | snapchat, bug-bounty-tips, hacker, bug-bounty | 29-Nov-2023 |
Aztec Multiple-Spend Error Bugfix Review | https://medium.com/immunefi/aztec-multiple-spend-error-bugfix-review-20074581d224?source=rss------bug_bounty-5 | Immunefi Editor | cryptocurrency, security, bug-bounty, web3, multiple-spend-error | 29-Nov-2023 |
1.10 Lab: Blind SQL injection with time delays | 2023 | https://cyberw1ng.medium.com/1-10-lab-blind-sql-injection-with-time-delays-2023-a95a3b8557ec?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | penetration-testing, bug-bounty, hacking, cybersecurity, careers | 29-Nov-2023 |
IWCON 2023 CTF Registrations Now Open | https://infosecwriteups.com/iwcon-2023-ctf-registrations-now-open-46c2611714f0?source=rss------bug_bounty-5 | InfoSec Write-ups | ctf, conference, infosec, hacking, bug-bounty | 29-Nov-2023 |
Top 25 Advanced Google Dorks for Uncovering Sensitive Documents | https://osintteam.blog/top-25-advanced-google-dorks-for-uncovering-sensitive-documents-a9705e05353d?source=rss------bug_bounty-5 | as-squirrel | osint, cybersecurity, hacking, google-dork, bug-bounty | 29-Nov-2023 |
Fat GET Authorization Bypass | https://medium.com/techiepedia/fat-get-authorization-bypass-521a1ca37b6e?source=rss------bug_bounty-5 | Jess | programming, hackerone, security, bug-bounty, bug-bounty-tips | 29-Nov-2023 |
HackTheBox — Web Attacks: Error Based XXE to exfiltrate data | https://medium.com/@harry.hphu/hackthebox-web-attacks-error-based-xxe-to-exfiltrate-data-3f577eef18c7?source=rss------bug_bounty-5 | Huy Phu | owasp-top-10, web-security, hackthebox, xxe-attack, bug-bounty | 28-Nov-2023 |
HackTheBox — Web Attacks: XXE with Blind Exfiltration Data | https://medium.com/@harry.hphu/hackthebox-web-attacks-xxe-with-blind-exfiltration-data-123d4be1245e?source=rss------bug_bounty-5 | Huy Phu | bug-bounty, owasp-top-10, web-security, xxe-attack, hackthebox | 28-Nov-2023 |
Catching C2s with Regex Signatures, TLS Certificates, and OSINT | https://medium.com/@paritoshblogs/catching-c2s-with-regex-signatures-tls-certificates-and-osint-8871d9a46602?source=rss------bug_bounty-5 | Paritosh | bug-bounty, information-security, cybersecurity, command-and-control, hacking | 28-Nov-2023 |
Apple security research. | https://medium.com/@abhay2432455/apple-security-research-8780372757be?source=rss------bug_bounty-5 | Abhay Kailasia | google, apple, cybersecurity, bug-bounty, bug-bounty-writeup | 28-Nov-2023 |
XSS - Weaponization ATO | https://p4n7h3rx.medium.com/xss-weaponization-ato-1de0ee30526b?source=rss------bug_bounty-5 | p4n7h3rx | penetration-testing, cybersecurity, infosec, bug-bounty-tips, bug-bounty | 28-Nov-2023 |
1.9 Lab: Visible error-based SQL injection | 2023 | https://cyberw1ng.medium.com/1-9-lab-visible-error-based-sql-injection-2023-771157e90ad8?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | hacking, cybersecurity, bug-bounty, careers, penetration-testing | 28-Nov-2023 |
VulnLab — SQLi Injection series — Bypass Login | https://medium.com/@deandradarra05/vulnlab-sqli-injection-series-bypass-login-0d6af43a395d?source=rss------bug_bounty-5 | Deandradarra | penetration-testing, cybersecurity, bug-bounty, sqli | 28-Nov-2023 |
The Bug Hunter’s Methodology Live Course Review | https://medium.com/@cybersekler/the-bug-hunters-methodology-live-course-review-4261a7a9121e?source=rss------bug_bounty-5 | Cyber Sekler | hacking, red-team, reconnaissance, bug-bounty, application-security | 28-Nov-2023 |
Hall of Fame at NASA | https://medium.com/@bijoy.redteamacademy/hall-of-fame-at-nasa-91539af7826c?source=rss------bug_bounty-5 | BIJOY B | google-ads, hacker-news, google, nasa, bug-bounty | 28-Nov-2023 |
Understanding and Mitigating Insecure Direct Object References (IDOR) Vulnerabilities | https://medium.com/@harry.hphu/understanding-and-mitigating-insecure-direct-object-references-idor-vulnerabilities-b27047015e15?source=rss------bug_bounty-5 | Huy Phu | idor-vulnerability, bug-bounty, web-security, owasp-top-10, hackthebox | 27-Nov-2023 |
Burpsuite Custom Scan Profiles | https://mrrootsec.medium.com/burpsuite-custom-scan-profiles-12a9df9e36bd?source=rss------bug_bounty-5 | mrrootsec | owasp-top-10, bug-bounty, application-security-test | 27-Nov-2023 |
Understanding XML External Entity (XXE) Vulnerabilities | https://medium.com/@harry.hphu/understanding-xml-external-entity-xxe-vulnerabilities-e8b64c2c2b3c?source=rss------bug_bounty-5 | Huy Phu | bug-bounty, owasp-top-10, xml-injection, hackthebox, web-security | 27-Nov-2023 |
Confounding Adversaries Through the Art of Illusion | https://medium.com/@paritoshblogs/confounding-adversaries-through-the-art-of-illusion-5cc56090d93a?source=rss------bug_bounty-5 | Paritosh | bug-bounty, information-technology, information-security, cybersecurity, hacking | 27-Nov-2023 |
Unveiling Critical Bug Using Directory Search — Bug Bounty Tip! | https://medium.com/@learningstuff110/unveiling-critical-bug-using-directory-search-bug-bounty-tip-330d4d9900ee?source=rss------bug_bounty-5 | Fahad Hasan | web-app-development, vulnerability, bug-bounty, cybersecurity, penetration-testing | 27-Nov-2023 |
Confounding Adversaries Through the Art of Illusion | https://osintteam.blog/confounding-adversaries-through-the-art-of-illusion-5cc56090d93a?source=rss------bug_bounty-5 | Paritosh | bug-bounty, information-technology, information-security, cybersecurity, hacking | 27-Nov-2023 |
Ruby One — Bug Bounty Program & Claim Your $RUBY | https://rubyprotocol.medium.com/ruby-one-bug-bounty-program-claim-your-ruby-848c81c4b164?source=rss------bug_bounty-5 | Ruby Protocol | blockchain, cryptocurrency, bug-bounty, crypto, ethereum | 27-Nov-2023 |
HTTP/2 Request Smuggling | https://medium.com/@kerstanhgnhzhw/http-2-request-smuggling-eb56cfd84a37?source=rss------bug_bounty-5 | kerstan | web-security, bug-bounty, security, request-smuggling, pentesting | 27-Nov-2023 |
Kaynak kodu ile XSS’i nasıl buldum ? | https://medium.com/@el-cezeri/kaynak-kodu-ile-xssi-nas%C4%B1l-buldum-9cf2632f4717?source=rss------bug_bounty-5 | Samet Yiğit | xss-attack, bug-bounty-tips, ödülavcılığı, bug-bounty | 27-Nov-2023 |
Website Scanner… | https://medium.com/@psychomong/website-scanner-4856d77bc600?source=rss------bug_bounty-5 | psychomong | hacking, gui, scanner, bug-bounty, web | 27-Nov-2023 |
@pdiscoveryio’s Katana for Bug Bounty. | https://medium.com/@BrownBearSec/pdiscoveryios-katana-for-bug-bounty-1aee11cfae14?source=rss------bug_bounty-5 | BrownBearSec | bug-bounty, cybersecurity, bug-bounty-tips, red-team, infosec | 27-Nov-2023 |
1.8 Lab: Blind SQL injection with conditional errors | 2023 | https://cyberw1ng.medium.com/1-8-lab-blind-sql-injection-with-conditional-errors-2023-da84a7836bcd?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | penetration-testing, hacking, careers, cybersecurity, bug-bounty | 27-Nov-2023 |
My bug bounty journey: #1 Linux | https://medium.com/@VDMoscar/my-bug-bounty-journey-1-linux-176d3b4f4065?source=rss------bug_bounty-5 | Oscar Vandermeulen | bug-bounty, hacking | 27-Nov-2023 |
Code4rena Audit | https://medium.com/@panoptic_xyz/code4rena-audit-96902468eece?source=rss------bug_bounty-5 | Panoptic | panoptic, audit, bug-bounty, perpetual-options | 27-Nov-2023 |
“Navigating Risks: Vulnerability Stemming from a Third-Party Integration” | https://shubhdeepp.medium.com/navigating-risks-vulnerability-stemming-from-a-third-party-integration-c877d15977d8?source=rss------bug_bounty-5 | shubhdeep | vulnerability-assessment, vulnerability, cybersecurity, bug-bounty, supply-chain-management | 27-Nov-2023 |
HackTheBox — Web Attacks: From XXE Injection to Advanced Local File Disclosure | https://medium.com/@harry.hphu/hackthebox-web-attacks-from-xxe-injection-to-advanced-local-file-disclosure-64d1bf5acdca?source=rss------bug_bounty-5 | Huy Phu | web-security, owasp-top-10, bug-bounty, xxe-attack, hackthebox | 27-Nov-2023 |
HackTheBox — Web Attacks: Mass IDOR enumeration | https://medium.com/@harry.hphu/hackthebox-web-attacks-mass-idor-enumeration-dc12da1f6333?source=rss------bug_bounty-5 | Huy Phu | hackthebox, owasp-top-10, bug-bounty, web-attack, mass-idor-enumeration | 26-Nov-2023 |
Bug Zero at a Glance [01–18 November] | https://blog.bugzero.io/bug-zero-at-a-glance-01-18-november-1cfce20b881c?source=rss------bug_bounty-5 | Januka Dharmapriya | bug-zero, cybersecurity, bug-bounty, sri-lanka, newsletter | 26-Nov-2023 |
HackTheBox — Web Attacks — IDOR: Bypassing Encoded References | https://medium.com/@harry.hphu/hackthebox-web-attacks-idor-bypassing-encoded-references-4e28008120fc?source=rss------bug_bounty-5 | Huy Phu | idor-vulnerability, web-security, bug-bounty, hackthebox-writeup, owasp-top-10 | 26-Nov-2023 |
Waybackurls leads to pwned Admin Panel | https://medium.com/@cybersolution2172/waybackurls-leads-to-pwned-admin-panel-ac3f728b87ac?source=rss------bug_bounty-5 | Satyam Singh | infosec, bug-bounty, bug-bounty-tips, hacking, vulnerability | 26-Nov-2023 |
A Thrilling Expedition into AWS Security | https://medium.com/@paritoshblogs/a-thrilling-expedition-into-aws-security-bbce85cd1eed?source=rss------bug_bounty-5 | Paritosh | aws-security, aws, bug-bounty, information-security, cybersecurity | 26-Nov-2023 |
Story of Http password reset link for $$$ | https://devanshchauhan4565.medium.com/story-of-http-password-reset-link-for-15b583519e03?source=rss------bug_bounty-5 | Devansh chauhan | writing-tips, bug-bounty, bug-bounty-tips | 26-Nov-2023 |
HackTheBox — Web Attacks: IDOR in Insecure APIs Write up | https://medium.com/@harry.hphu/hackthebox-web-attacks-idor-in-insecure-apis-write-up-7adcf4e68968?source=rss------bug_bounty-5 | Huy Phu | hackthebox, owasp-top-10, idor-vulnerability, bug-bounty, api-security | 26-Nov-2023 |
CSRF Bug Hunting Methodology: Intermediate | https://medium.com/@drthkol478/csrf-bug-hunting-methodology-intermediate-4d0df3b63b59?source=rss------bug_bounty-5 | Mikołaj Prus ( nullorx ) | network, web-app-security, bug-bounty, csrf, application-security | 26-Nov-2023 |
Explorando redes com ESP32 WIFI. | https://higordiego.medium.com/explorando-redes-com-esp32-wifi-5b15d48d0880?source=rss------bug_bounty-5 | Higor Diego | bug-bounty, pentesting, wifi, tutorial, iot | 26-Nov-2023 |
1.7 Lab: Blind SQL injection with conditional responses | 2023 | https://cyberw1ng.medium.com/1-7-lab-blind-sql-injection-with-conditional-responses-2023-db2102f1ce44?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | penetration-testing, careers, bug-bounty, hacking, cybersecurity | 26-Nov-2023 |
Exploring Networks with ESP32 WIFI. | https://higordiego.medium.com/exploring-networks-with-esp32-wifi-778a8d42b7f1?source=rss------bug_bounty-5 | Higor Diego | network-security, pentesting, iot-security, osint, bug-bounty | 26-Nov-2023 |
Mastering the Art of Bug Bounty Reconnaissance | https://medium.com/@faizankhaliq26/mastering-the-art-of-bug-bounty-reconnaissance-5e1ec42fc405?source=rss------bug_bounty-5 | MUHAMMAD FAIZAN KHAN | web-application-testing, recon, information-gathering, web-application-security, bug-bounty | 26-Nov-2023 |
Writeup Bugcrowd — Private program — QR codes | https://medium.com/@embossdotar/writeup-bugcrowd-private-program-qr-codes-fa338161175a?source=rss------bug_bounty-5 | embossdotar | bugcrowd, writeup, bug-bounty, it-security, cybersecurity | 26-Nov-2023 |
How I Made $$$ Using Open-Redirect | https://medium.com/@rahulnakum/how-i-made-using-open-redirect-799f9ab14bda?source=rss------bug_bounty-5 | Rahul Nakum | bug-bounty | 25-Nov-2023 |
What Happens When Hackers Gain Local Account Access !! | https://medium.com/@paritoshblogs/what-happens-when-hackers-gain-local-account-access-64fc39ed25f5?source=rss------bug_bounty-5 | Paritosh | pentesting, bug-bounty, programming, cybersecurity, hacking | 25-Nov-2023 |
First massive bug: Noise’s AWS Bucket Misconfiguration | https://anshjain-napster.medium.com/first-massive-bug-noises-aws-bucket-misconfiguration-802821ed98b6?source=rss------bug_bounty-5 | Napster_Ansh | vulnerability, bug-bounty, aws-s3, cybersecurity, security | 25-Nov-2023 |
how to install waybackurls on parrot OS in 3 simple steps | https://medium.com/@diy_tech_genuis/how-to-install-waybackurls-on-parrot-os-in-3-simple-steps-fb4746302647?source=rss------bug_bounty-5 | diy_tech_genuis | hacking, diytechgenius, waybackurls, bug-bounty, parrotos | 25-Nov-2023 |
1.6 Lab: SQL injection UNION attack, retrieving multiple values in a single column | 2023 | https://cyberw1ng.medium.com/1-6-lab-sql-injection-union-attack-retrieving-multiple-values-in-a-single-column-2023-6fb957198939?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | careers, penetration-testing, cybersecurity, bug-bounty, hacking | 25-Nov-2023 |
Detecting and Confirming Exfiltration Activity Through Endpoint Detection and Response (EDR) | https://medium.com/@paritoshblogs/detecting-and-confirming-exfiltration-activity-through-endpoint-detection-and-response-edr-6ff4c89e9847?source=rss------bug_bounty-5 | Paritosh | hacking, cybersecurity, bug-bounty, information-security, edr | 25-Nov-2023 |
5 thing most new bug bounty hunters do wrong | https://medium.com/@diy_tech_genuis/5-thing-most-new-bug-bounty-hunters-do-wrong-321cb152363c?source=rss------bug_bounty-5 | diy_tech_genuis | diytechgenius, hacking, help, tips, bug-bounty | 25-Nov-2023 |
$20,000 Paid For A Bug That No One Has Ever Expected | https://siddardajagabathina.medium.com/20-000-paid-for-a-bug-that-no-one-has-ever-expected-5a4778620999?source=rss------bug_bounty-5 | SIDDARDA GOWTHAM JAGABATHINA | hackerone, bug-bounty, bugs, cybersecurity, cybersecurity-awareness | 25-Nov-2023 |
Critical misconfiguration in Firebase-Bug bounty | https://medium.com/@facu.tha/critical-misconfiguration-in-firebase-e682ec4239d6?source=rss------bug_bounty-5 | Facundo Fernandez | hacking, bug-bounty, penetration-testing, cybersecurity, bug-bounty-tips | 25-Nov-2023 |
Introduction to Cybersecurity for Beginners: Understanding the Digital Security World | https://medium.com/@fiqrifirdaus/introduction-to-cybersecurity-for-beginners-understanding-the-digital-security-world-f136896cda85?source=rss------bug_bounty-5 | Aditya Fiqri Firdaus | bug-bounty, cyber, cybersecurity, malware | 25-Nov-2023 |
How i get my first Logic Bug and how to find them | https://medium.com/@zomasec/how-i-get-my-first-logic-bug-and-how-to-find-them-dd5fdf6478ee?source=rss------bug_bounty-5 | Hazem El-Sayed | cybersecurity, web-security, bug-bounty-tips, bug-bounty, bugs | 25-Nov-2023 |
How to Find First Bug (For Beginners) | https://medium.com/@rajput623929/how-to-find-first-bug-for-beginners-f594230f9e36?source=rss------bug_bounty-5 | Mr.Horbio | cybersecurity, penetration-testing, bug-bounty, hacking, tricks | 24-Nov-2023 |
Bash Scripting Logic Section Part 01 | https://medium.com/@Rat_Attack72/bash-scripting-logic-section-part-01-a7424f4dd6c2?source=rss------bug_bounty-5 | Rat_Attack72 | cybersecurity, bash, shell-script, bug-bounty, automation | 24-Nov-2023 |
1.5 Lab: SQL injection UNION attack, retrieving data from other tables | 2023 | https://cyberw1ng.medium.com/1-5-lab-sql-injection-union-attack-retrieving-data-from-other-tables-2023-3e13076915fa?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | bug-bounty, penetration-testing, hacking, careers, cybersecurity | 24-Nov-2023 |
Breaking the HTTPS Barrier: A Hacker’s Guide to Sneaky Link Exploits! | https://medium.com/@mohammedthoufeeq_25137/breaking-the-https-barrier-a-hackers-guide-to-sneaky-link-exploits-622b07710a1c?source=rss------bug_bounty-5 | Mohamed Thoufeeq | cybersecurity, hackthebox, bug-bounty, hacking, programming | 24-Nov-2023 |
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 5 | https://medium.com/@hackersdump0/diving-deep-a-comprehensive-guide-to-android-penetration-testing-part-5-c1343b0f0ef9?source=rss------bug_bounty-5 | Hacker's Dump | hacking, bug-bounty, android, pentesting, penetration-testing | 24-Nov-2023 |
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 4 | https://medium.com/@hackersdump0/diving-deep-a-comprehensive-guide-to-android-penetration-testing-part-4-9bba2880b8cb?source=rss------bug_bounty-5 | Hacker's Dump | bug-bounty, android, hacking, penetration-testing, hacker | 24-Nov-2023 |
Bug Hunter GPT: A Game-Changer in Cybersecurity | https://medium.com/@multiplatform.ai/bug-hunter-gpt-a-game-changer-in-cybersecurity-b25ccbab2f93?source=rss------bug_bounty-5 | Multiplatform.AI | bug-bounty, ai, bughuntergpt, ai-assistant, artificial-intelligence | 24-Nov-2023 |
Cybersecurity Challenges with TryHackMe: A Hands-On Approach | https://medium.com/@paritoshblogs/cybersecurity-challenges-with-tryhackme-a-hands-on-approach-e62f76a50446?source=rss------bug_bounty-5 | Paritosh | tryhackme, programming, hacking, bug-bounty, cybersecurity | 23-Nov-2023 |
Project 2510: Bug Bounty Challenge — Day 17/25 | https://wallotry.medium.com/project-2510-bug-bounty-challenge-day-17-25-f1337a6f4e66?source=rss------bug_bounty-5 | Wallotry | bug-bounty-hunter, bug-bounty, bug-bounty-tips, bug-bounty-hunting | 23-Nov-2023 |
Yet Another Rate Limit. | https://allenlopes23.medium.com/yet-another-rate-limit-71257e7b33a2?source=rss------bug_bounty-5 | Allen Lopes | vulnerability, rate-limiting, bug-bounty | 23-Nov-2023 |
1.4 Lab: SQL injection UNION attack, finding a column containing text | 2023 | https://cyberw1ng.medium.com/1-4-lab-sql-injection-union-attack-finding-a-column-containing-text-2023-94f3ee243db8?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | penetration-testing, bug-bounty, hacking, cybersecurity, careers | 23-Nov-2023 |
bWAPP iFrame Injection | https://medium.com/@yusufbaris/bwapp-iframe-injection-22bee548c30a?source=rss------bug_bounty-5 | Yusuf Barış | cybersecurity, penetration-testing, bug-bounty, web-security, hacking | 23-Nov-2023 |
Project 2510: Bug Bounty Challenge — Day 18/25 | https://wallotry.medium.com/project-2510-bug-bounty-challenge-day-18-25-924740430094?source=rss------bug_bounty-5 | Wallotry | bug-bounty-hunting, bug-bounty-hunter, bug-bounty-tips, bug-bounty | 23-Nov-2023 |
Powershell/JS Payloads: A Closer Look at Malicious Code Delivery | https://medium.com/@paritoshblogs/powershell-js-payloads-a-closer-look-at-malicious-code-delivery-818b0ee743a3?source=rss------bug_bounty-5 | Paritosh | programming, hacking, bug-bounty, information-security, cybersecurity | 22-Nov-2023 |
7 Sneaky Hacks Cybercriminals Use to Outsmart Your Antivirus! | https://medium.com/@paritoshblogs/7-sneaky-hacks-cybercriminals-use-to-outsmart-your-antivirus-66953a606a53?source=rss------bug_bounty-5 | Paritosh | antivirus, cybersecurity, hacking, bug-bounty, darkweb | 22-Nov-2023 |
Apple webserver vulnerable for HTTP request Sumggling attack | https://medium.com/@abdulriyaz1200/apple-webserver-vulnerable-for-http-request-sumggling-attack-cabe1d53dab1?source=rss------bug_bounty-5 | Abdulriyaz | bug-bounty-tips, bug-bounty, bug-bounty-writeup, apple, hall-of-fame | 22-Nov-2023 |
200$ bounty for CRLF injection Attack | https://medium.com/@abdulriyaz1200/200-bounty-for-crlf-injection-attack-39c482bad796?source=rss------bug_bounty-5 | Abdulriyaz | bug-bounty, bug-bounty-tips, hall-of-fame, bugbounty-writeup | 22-Nov-2023 |
Mass Hunting XSS vulnerabilities | https://ott3rly.medium.com/mass-hunting-xss-vulnerabilities-5b53363dd3db?source=rss------bug_bounty-5 | Ott3rly | bug-bounty-tips, bug-bounty, cross-site-scripting, bug-bounty-hunter, xss-vulnerability | 22-Nov-2023 |
Google dorking is one of the best method | Hall of fame from XXX.gov | https://medium.com/@abdulriyaz1200/google-dorking-is-one-of-the-best-method-hall-of-fame-from-xxx-gov-8db6aa3c69f3?source=rss------bug_bounty-5 | Abdulriyaz | bug-bounty, government, bug-bounty-tips | 22-Nov-2023 |
1.3 Lab: SQL injection UNION attack, determining the number of columns returned by the query | 2023 | https://cyberw1ng.medium.com/1-3-lab-sql-injection-union-attack-determining-the-number-of-columns-returned-by-the-query-2023-441930bf38b7?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | bug-bounty, penetration-testing, hacking, careers, cybersecurity | 22-Nov-2023 |
Exploiting Exposed .git File to Access Webmail Credentials | https://medium.com/@tanyago/exploiting-exposed-git-file-to-access-webmail-credentials-4b47a3afff38?source=rss------bug_bounty-5 | Tanya Goyal | bug-bounty, bug-bounty-writeup, bug-bounty-tips, bug-hunting | 22-Nov-2023 |
Mass Hunting XSS vulnerabilities | https://infosecwriteups.com/mass-hunting-xss-vulnerabilities-5b53363dd3db?source=rss------bug_bounty-5 | Ott3rly | bug-bounty-tips, bug-bounty, cross-site-scripting, bug-bounty-hunter, xss-vulnerability | 22-Nov-2023 |
Hoping for a Bug Bounty This Year at AWS re:Invent :^) | https://medium.com/cloud-security/hoping-for-a-bug-bounty-this-year-at-aws-re-invent-5c8a76d09514?source=rss------bug_bounty-5 | Teri Radichel | awswishlist, cloud, aws, bug-bounty, security | 22-Nov-2023 |
Bug Hunter jornal Day #0 | https://medium.com/@joaomaia171820/bug-hunter-jornal-day-0-7a451f0292aa?source=rss------bug_bounty-5 | Jhonny_The_Kid | cybersecurity, bug-bounty-writeup, bug-bounty-program, bug-bounty, hacking | 22-Nov-2023 |
SAML authentication bypass leads to account takeover | https://medium.com/@Xt3sY/saml-authentication-bypass-leads-to-account-takeover-f9aaa37a34fe?source=rss------bug_bounty-5 | Pushkar Bhagat | bugs, bug-bounty, hacking, hackerone | 22-Nov-2023 |
How to earn $DCT on DecentraCredit Testnet V1 on Arbitrum | https://decentracredit.medium.com/how-to-earn-dct-on-decentracredit-testnet-v1-on-arbitrum-915d9995c2e4?source=rss------bug_bounty-5 | Decentra Credit | arbitrum, testnet-airdrop, bug-bounty, ethereum, airdrop | 22-Nov-2023 |
Semi-Automating IDORs: A Practical Approach to Working Smarter, Not Harder | https://mux0xx.medium.com/semi-automating-idors-a-practical-approach-to-working-smarter-not-harder-5b7f1f47b55a?source=rss------bug_bounty-5 | Muhammed K. Sayed | bug-bounty, cybersecurity, hacker, idor, hacking | 22-Nov-2023 |
Embracing the Future: Bug Bounty Hunting as a Lucrative Full-Time Career | https://infosecwriteups.com/embracing-the-future-bug-bounty-hunting-as-a-lucrative-full-time-career-3e4b147923f7?source=rss------bug_bounty-5 | Security Lit Limited | penetration-testing, vulnerability, bug-bounty-tips, bug-bounty, cybersecurity | 22-Nov-2023 |
How i hacked a router (embedded system) | https://medium.com/@Threat_Intelligence/how-i-hacked-a-router-embedded-system-9a5b8139e83e?source=rss------bug_bounty-5 | 127.0.0.1 is safe.⚠️ | cybersecurity, tecnologia, hacking, bug-bounty, red-team | 22-Nov-2023 |
My First IDOR - Hiding in the Header Request | https://medium.com/@hbenja47/my-first-idor-hiding-in-the-header-request-8a03dddc23b5?source=rss------bug_bounty-5 | Benja (bronxi) | hacker, bug-bounty, idor, hacking | 21-Nov-2023 |
Chaining CORS by Reflected XSS to Steal Sensitive Data | https://infosecwriteups.com/chaining-cors-by-reflected-xss-to-steal-sensitive-data-c456e133c10d?source=rss------bug_bounty-5 | Mohammad reza Omrani | cybersecurity, infosec, steal-sensitive-data, cors-misconfiguration, bug-bounty | 21-Nov-2023 |
What is Next-Generation Antivirus (NGAV) ? | https://medium.com/@paritoshblogs/what-is-next-generation-antivirus-ngav-f05267dd2613?source=rss------bug_bounty-5 | Paritosh | bug-bounty, information-security, cybersecurity, hacking, antivirus | 21-Nov-2023 |
Top Recon Tools for Bug Bounty Hunters | https://securitycipher.medium.com/top-recon-tools-for-bug-bounty-hunters-fa655b8caf2e?source=rss------bug_bounty-5 | Piyush Kumawat (securitycipher) | bug-bounty, bug-bounty-tips, programming, cybersecurity, technology | 21-Nov-2023 |
Epic Bug Hunting Failures-2 | https://infosecwriteups.com/epic-bug-hunting-failures-2-fafb2af9b844?source=rss------bug_bounty-5 | Varshini Ramesh | development, hackerone, bug-bounty, cybersecurity, info-sec-writeups | 21-Nov-2023 |
The Crossroads of Code Crafting: A Personal Journey Between Rewriting and Quick Fixes | https://blursdaywtf.medium.com/the-crossroads-of-code-crafting-a-personal-journey-between-rewriting-and-quick-fixes-8ab18e5a9a60?source=rss------bug_bounty-5 | Blursday | coding, tech, bug-bounty, founders, apps | 21-Nov-2023 |
How I Gain $2,000-$3,000 a Month From Bug Bounties With No Code Experience | https://medium.com/@13032765d/how-i-gain-2-000-3-000-a-month-from-bug-bounties-with-no-code-experience-df2e89348fbb?source=rss------bug_bounty-5 | DataPsyLife | money, hacking, side-hustle, bug-bounty, freelancing | 21-Nov-2023 |
Cybersecurity Tools | https://bineshmadharapu.medium.com/cybersecurity-tools-02e85cb3c4ed?source=rss------bug_bounty-5 | Binesh Madharapu | cybersecurity, bug-bounty, network-security, nmap, ethical-hacking | 21-Nov-2023 |
CVE-2023–47837: ARMember ≤= 4.0.10 — Bypass Membership Plan | https://revan-ar.medium.com/cve-2023-47837-armember-4-0-10-bypass-membership-plan-4bc1e63f044c?source=rss------bug_bounty-5 | Revan A | bug-bounty, wordpress, cve, bypass, privilege-escalation | 21-Nov-2023 |
SQL Injection UNION Attacks in Web App Pentesting | 2023 | https://cyberw1ng.medium.com/sql-injection-union-attacks-in-web-app-pentesting-2023-fbd072299b77?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | penetration-testing, hacking, careers, bug-bounty, cybersecurity | 21-Nov-2023 |
How to find sensitive information in an organization | (Como encontrar información sensible en una… | https://medium.com/@l0calh0st/how-to-find-sensitive-information-in-an-organization-como-encontrar-informaci%C3%B3n-sensible-en-una-cb08c5128ab5?source=rss------bug_bounty-5 | 127.0.0.1 is safe.⚠️ | tech, hacking, red-team, bug-bounty, cybersecurity | 21-Nov-2023 |
How I hacked Google’s bug tracking system itself for $15,600 in bounties | https://jamilahmad-dev.medium.com/how-i-hacked-googles-bug-tracking-system-itself-for-15-600-in-bounties-0e9e36b772b9?source=rss------bug_bounty-5 | Jamil Ur Rehman | startup, bug-bounty, security, google, technology | 21-Nov-2023 |
CRITICAL BUG Alert: How I HACKED into a company’s DATABASE | https://jamilahmad-dev.medium.com/critical-bug-alert-how-i-hacked-into-a-companys-database-fc61179f5d5d?source=rss------bug_bounty-5 | Jamil Ur Rehman | hacking, bug-bounty-writeup, bug-bounty-tips, bug-bounty, ethical-hacking | 21-Nov-2023 |
Project 2510: Bug Bounty Challenge — Day 16/25 | https://wallotry.medium.com/project-2510-bug-bounty-challenge-day-16-25-f881c177b749?source=rss------bug_bounty-5 | Wallotry | bug-bounty-hunting, bug-bounty-tips, bug-bounty, bug-bounty-hunter | 21-Nov-2023 |
Detecting and Understanding Cookies in Web Development | https://medium.com/@nirvana.elahi/detecting-and-understanding-cookies-in-web-development-a520b279988b?source=rss------bug_bounty-5 | Nirvana El | owasp-top-10, cybersecurity, bug-bounty, penetration-testing | 21-Nov-2023 |
How to find sensitive information in an organization . | https://medium.com/@Threat_Intelligence/how-to-find-sensitive-information-in-an-organization-como-encontrar-informaci%C3%B3n-sensible-en-una-cb08c5128ab5?source=rss------bug_bounty-5 | 127.0.0.1 is safe.⚠️ | tech, hacking, red-team, bug-bounty, cybersecurity | 21-Nov-2023 |
Step-by-Step guide to writing a Metasploit Script | https://higordiego.medium.com/step-by-step-guide-to-writing-a-metasploit-script-6bacb96363e5?source=rss------bug_bounty-5 | Higor Diego | vulnerability, exploit, bug-bounty, security, osint | 21-Nov-2023 |
Legal and Ethical Dimensions in Malware Analysis (Cybersecurity) | https://medium.com/@paritoshblogs/legal-and-ethical-dimensions-in-malware-analysis-cybersecurity-86accca12049?source=rss------bug_bounty-5 | Paritosh | cybersecurity, bug-bounty, legal, programming, hacking | 20-Nov-2023 |
Improper Input Sanitization Error in Web3 | https://medium.com/@vinaysati/improper-input-sanitization-error-in-web3-f4bd0f6d88cc?source=rss------bug_bounty-5 | Vinaysati | hacking, cryptocurrency, bug-bounty, web3, web3bug | 20-Nov-2023 |
#3 Set-up FoxyProxy in Firefox — Guide for Burp Suite | https://securitycipher.medium.com/3-set-up-foxyproxy-in-firefox-guide-for-burp-suite-ee9627b6f513?source=rss------bug_bounty-5 | Piyush Kumawat (securitycipher) | security, bug-bounty-tips, bug-bounty, penetration-testing, technology | 20-Nov-2023 |
Event Driven Bug Bounty on AWS | https://medium.com/@husein.ayoub/event-driven-bug-bounty-on-aws-d39f75d962a3?source=rss------bug_bounty-5 | Hussein Ayoub | aws, bug-bounty, security | 20-Nov-2023 |
The Story of How I Hacked one of the online payment system website twice | https://christmex.medium.com/the-story-of-how-i-hacked-one-of-the-online-payment-system-website-twice-b0ba48ed13db?source=rss------bug_bounty-5 | Jonathan Christian | bug-bounty-writeup, programming, technology, cybersecurity, bug-bounty | 20-Nov-2023 |
ESSENTIAL HTML FOR HACKERS | https://medium.com/@agapehearts/essential-html-for-hackers-12d329927c9b?source=rss------bug_bounty-5 | Agape HearTs | xss-attack, bug-bounty, html, hacker, pentesting | 20-Nov-2023 |
Writeups of All Apprentice Labs in Portswigger — All Lab’s Solution| Karthikeyan Nagaraj | https://cyberw1ng.medium.com/writeups-of-all-apprentice-labs-in-portswigger-all-labs-solution-karthikeyan-nagaraj-a5f23fd0c87b?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | bug-bounty, cybersecurity, careers, penetration-testing, hacking | 20-Nov-2023 |
Go Beyond with Gretire | https://systemweakness.com/go-beyond-with-gretire-313b7fbe3f47?source=rss------bug_bounty-5 | Whalebone | cybersecurity, bug-bounty, open-source, information-security, hacking | 20-Nov-2023 |
Email address: The Online ID | https://medium.com/@duncanochieng682/email-address-the-online-id-dd0061bf7828?source=rss------bug_bounty-5 | JateloCybersec | infosec, hacking, bug-bounty, ethical-hacking, blackhat | 20-Nov-2023 |
Understanding CVE-2023–46604: A Threat to Apache ActiveMQ | https://infosecwriteups.com/understanding-cve-2023-46604-a-threat-to-apache-activemq-d771eb408eba?source=rss------bug_bounty-5 | Security Lit Limited | bug-bounty, vulnerability, cybersecurity, programming, penetration-testing | 20-Nov-2023 |
Project 2510: Bug Bounty Challenge — Day 15/25 | https://wallotry.medium.com/project-2510-bug-bounty-challenge-day-15-25-27d085f4bf95?source=rss------bug_bounty-5 | Wallotry | bug-bounty-tips, bug-bounty-hunting, bug-bounty-hunter, bug-bounty | 20-Nov-2023 |
Understanding CVE-2023–46604: A Threat to Apache ActiveMQ | https://securitylit.medium.com/understanding-cve-2023-46604-a-threat-to-apache-activemq-d771eb408eba?source=rss------bug_bounty-5 | Security Lit Limited | bug-bounty, vulnerability, cybersecurity, programming, penetration-testing | 20-Nov-2023 |
The Story of How I Hacked one of the online payment system website | https://christmex.medium.com/the-story-of-how-i-hacked-one-of-the-online-payment-system-website-twice-b0ba48ed13db?source=rss------bug_bounty-5 | Jonathan Christian | bug-bounty-writeup, programming, technology, cybersecurity, bug-bounty | 20-Nov-2023 |
GraphQL Misconfiguration Leads to Unlimited Money Transfer (Intigriti CTF — Bug Bank) | https://medium.com/@thewolfsec/graphql-misconfiguration-leads-to-unlimited-money-transfer-intigriti-ctf-bug-bank-48cdeb9c9aec?source=rss------bug_bounty-5 | TheWolf Sec | graphql, intigriti, bug-bounty, ctf | 19-Nov-2023 |
#2 Different Burp Suite Tools — Guide for Burp Suite | https://securitycipher.medium.com/2-different-burp-suite-tools-guide-for-burp-suite-7c5aa2ad05ed?source=rss------bug_bounty-5 | Piyush Kumawat (securitycipher) | penetration-testing, bug-bounty, security, cybersecurity, news | 19-Nov-2023 |
Find Vulnerabilities before other Hackers Exploiting | https://medium.com/@salmanul060/find-vulnerabilities-before-other-hackers-exploiting-a86fe4c3d5eb?source=rss------bug_bounty-5 | Salmanul Faris | web-applications, cybersecurity, bug-bounty, penetrationtestingcompany, penetration-testing | 19-Nov-2023 |
SSTI bypass using CRLF (1337 UP CTF — Smarty Pants) | https://medium.com/@thewolfsec/ssti-bypass-using-crlf-1337-up-ctf-smarty-pants-4ee8e1a72f98?source=rss------bug_bounty-5 | TheWolf Sec | intigriti, ssti, bug-bounty, ctf, php-developers | 19-Nov-2023 |
Privilege Escalation: Unauthorized Low-Privilege Users Creating Feature Bundles | https://medium.com/@a13h1/privilege-escalation-unauthorized-low-privilege-users-creating-feature-bundles-75f6125eec78?source=rss------bug_bounty-5 | Abhi Sharma | bug-bounty, programming, cybersecurity, hacking, api | 19-Nov-2023 |
#2 Different Burp Suite Tools — Guide for Burp Suite | https://infosecwriteups.com/2-different-burp-suite-tools-guide-for-burp-suite-7c5aa2ad05ed?source=rss------bug_bounty-5 | Piyush Kumawat (securitycipher) | penetration-testing, bug-bounty, security, cybersecurity, news | 19-Nov-2023 |
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 3 | https://medium.com/@hackersdump0/diving-deep-a-comprehensive-guide-to-android-penetration-testing-part-3-99e86d021190?source=rss------bug_bounty-5 | Hacker's Dump | android, android-pentesting, penetration-testing, hacking, bug-bounty | 19-Nov-2023 |
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 4 | https://medium.com/@hackersdump0/diving-deep-a-comprehensive-guide-to-android-penetration-testing-part-4-c942fbd9cae5?source=rss------bug_bounty-5 | Hacker's Dump | bug-bounty, hacking, android, penetration-test, penetration-testing | 19-Nov-2023 |
23.6 Lab: Insecure direct object references | 2023 | https://cyberw1ng.medium.com/23-6-lab-insecure-direct-object-references-2023-dfd4a9f3eeb3?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | careers, bug-bounty, cybersecurity, penetration-testing, hacking | 19-Nov-2023 |
A Guide to Indicators of Compromise (IoC) Analysis | https://medium.com/@paritoshblogs/a-guide-to-indicators-of-compromise-ioc-analysis-925708cbf8aa?source=rss------bug_bounty-5 | Paritosh | programming, bug-bounty, ioc, hacking, cybersecurity | 19-Nov-2023 |
ByteGuard: Mastering the Art of Data Security | https://medium.com/@paritoshblogs/byteguard-mastering-the-art-of-data-security-5719be0d1c7c?source=rss------bug_bounty-5 | Paritosh | information-security, data-security, cybersecurity, data, bug-bounty | 18-Nov-2023 |
Securing the Backbone: Supply Chain Security | https://medium.com/@paritoshblogs/securing-the-backbone-supply-chain-security-34282b6b505f?source=rss------bug_bounty-5 | Paritosh | supply-chain, information-security, cybersecurity, supply-chain-attack, bug-bounty | 18-Nov-2023 |
eWPTX Prepare Resources | https://medium.com/@0UN390/ewptx-prepare-resources-a741220cf145?source=rss------bug_bounty-5 | 0UN390 | bug-bounty, cybersecurity, web-security, penetration-testing | 18-Nov-2023 |
AppSec Tales XXIII | XPathI | https://karol-mazurek95.medium.com/appsec-tales-xxiii-xpathi-ca6171826d2a?source=rss------bug_bounty-5 | Karol Mazurek | information-technology, cybersecurity, application-security, bug-bounty, penetration-testing | 18-Nov-2023 |
#Day6 Bug Bounty Recon Part 2: ( Subdomains and S3 buckets ) | https://medium.com/codingninjablogs/day6-bug-bounty-recon-part-2-subdomains-and-s3-buckets-1a01780e6908?source=rss------bug_bounty-5 | OBSIDIAN | programming, technology, bug-bounty, ethical-hacking, cybersecurity | 18-Nov-2023 |
23.5 Lab: User ID controlled by request parameter with password disclosure | 2023 | https://cyberw1ng.medium.com/23-5-lab-user-id-controlled-by-request-parameter-with-password-disclosure-2023-ad748d1daa9e?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | careers, bug-bounty, cybersecurity, hacking, penetration-testing | 18-Nov-2023 |
Hacking Microsoft IIS : Enumerating IIS for V | https://medium.com/@mudasserhussain1111/hacking-microsoft-iis-enumerating-iis-for-v-39de5a27f101?source=rss------bug_bounty-5 | Mudasser Hussain | infosec-write-ups, cybersecurity, hacking, microsoft, bug-bounty | 18-Nov-2023 |
OAuth Misconfiguration Leads To Pre-Account Takeover(snapchat) | https://medium.com/@a7med.ctf/oauth-misconfiguration-leads-to-pre-account-takeover-snapchat-129b118661f6?source=rss------bug_bounty-5 | Ahmed Mahmoued | hacking, bug-bounty-tips, bug-bounty | 18-Nov-2023 |
CVE-2023–36025: An In-Depth Analysis of Circumventing Windows SmartScreen Security | https://infosecwriteups.com/cve-2023-36025-an-in-depth-analysis-of-circumventing-windows-smartscreen-security-6ff05c8b69d0?source=rss------bug_bounty-5 | Security Lit Limited | penetration-testing, threat-intelligence, cybersecurity, microsoft, bug-bounty | 18-Nov-2023 |
Default Credentials, P1 with $$$$ Reward in a Bug Bounty Program | https://medium.com/@jedus0r/default-credentials-p1-with-reward-in-a-bug-bounty-program-1aad9c008619?source=rss------bug_bounty-5 | jedus0r | security-research, bug-bounty, bug-bounty-tips, bug-bounty-writeup, bug-bounty-hunter | 18-Nov-2023 |
CVE-2023–35078 Unveiled: Ethical Vulnerability Discovery and Reporting By Me and My Hunting Buddy… | https://medium.com/@jaini.rutvik/cve-2023-35078-unveiled-ethical-vulnerability-discovery-and-reporting-by-me-and-my-hunting-buddy-507582baf5c3?source=rss------bug_bounty-5 | Rj07 | responsible-disclosure, information-technology, zero-day, bug-bounty, information-security | 18-Nov-2023 |
Project 2510: Bug Bounty Challenge — Day 13/25 | https://wallotry.medium.com/project-2510-bug-bounty-challenge-day-13-25-f6e21379749b?source=rss------bug_bounty-5 | Wallotry | bug-bounty, bug-bounty-hunter, bug-bounty-hunting, bug-bounty-tips | 18-Nov-2023 |
Default Credentials, P1 with $$$$ Reward in a Bug Bounty Program | https://systemweakness.com/default-credentials-p1-with-reward-in-a-bug-bounty-program-1aad9c008619?source=rss------bug_bounty-5 | jedus0r | security-research, bug-bounty, bug-bounty-tips, bug-bounty-writeup, bug-bounty-hunter | 18-Nov-2023 |
The Future of Cybersecurity: The Power of AI-Powered SIEM | https://medium.com/@paritoshblogs/the-future-of-cybersecurity-the-power-of-ai-powered-siem-ae43921e9bce?source=rss------bug_bounty-5 | Paritosh | bug-bounty, information-security, siem, hacking, cybersecurity | 17-Nov-2023 |
3 Command Line Games Which You Must Try | https://medium.com/@rushi.padhiyar098/3-command-line-games-which-you-must-try-fa77c2ff7127?source=rss------bug_bounty-5 | Cyph3r Ryx | games, cybersecurity, hacking, command-line, bug-bounty | 17-Nov-2023 |
Dastardly — Web Application Security Scanner — CI/CD | https://securitycipher.medium.com/dastardly-web-application-security-scanner-ci-cd-3a4eea08719a?source=rss------bug_bounty-5 | Piyush Kumawat (securitycipher) | technology, security, bug-bounty, cybersecurity, penetration-testing | 17-Nov-2023 |
How I Automatically Generate XSS Payload & Automate Reflected XSS | https://ajaksecurity.medium.com/how-i-automatically-generate-xss-payload-automate-reflected-xss-be7c993f90d4?source=rss------bug_bounty-5 | Ajak Cyber security | hacking, cybersecurity, bug-bounty, ethical-hacking, penetration-testing | 17-Nov-2023 |
23.4 Lab: User ID controlled by request parameter with data leakage in redirect | 2023 | https://cyberw1ng.medium.com/23-4-lab-user-id-controlled-by-request-parameter-with-data-leakage-in-redirect-2023-5fa1b18bced1?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | penetration-testing, careers, bug-bounty, cybersecurity, security | 17-Nov-2023 |
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 2 | https://medium.com/@hackersdump0/diving-deep-a-comprehensive-guide-to-android-penetration-testing-part-2-9c33c319a696?source=rss------bug_bounty-5 | Hacker's Dump | android-pentesting, android, penetration-testing, hacking, bug-bounty | 17-Nov-2023 |
How to find vulnerabilities in a web page in 10 minutes | https://medium.com/@l0calh0st/how-to-find-vulnerabilities-in-a-web-page-in-10-minutes-66cd052b4fbc?source=rss------bug_bounty-5 | 127.0.0.1 is safe.⚠️ | red-team, bug-bounty, error-message, cybersecurity, hacking | 17-Nov-2023 |
Access control vulnerabilities | https://medium.com/@abdullahwarsama28/access-control-vulnerabilities-02fe3ea2e17f?source=rss------bug_bounty-5 | Abdullah Warsama | bug-bounty, web-security | 17-Nov-2023 |
JWT Intrigue: Hidden Keys within Web Applications | https://medium.com/@josh.beck2006/jwt-intrigue-hidden-keys-within-web-applications-4b042c80f427?source=rss------bug_bounty-5 | Josh Beck | penetration-testing, bug-bounty, cybersecurity, ctf-writeup, ctf | 16-Nov-2023 |
AuditOne Roundtable with Alexey from Aurora and Guido Vranken | https://medium.com/@auditone.io/auditone-roundtable-with-alexey-from-aurora-and-guido-vranken-3d7c709289c0?source=rss------bug_bounty-5 | AuditOne | bug-bounty, defi, web3, aurora, fuzzing | 16-Nov-2023 |
#1 Introduction to Burp Suite — Guide for Burp Suite | https://securitycipher.medium.com/1-introduction-to-burp-suite-guide-for-burp-suite-4054b64f10a0?source=rss------bug_bounty-5 | Piyush Kumawat (securitycipher) | penetration-testing, bug-bounty, cybersecurity, technology, security | 16-Nov-2023 |
Easy Admin Access — RVDP | https://infosecwriteups.com/easy-admin-access-rvdp-d1eb2c97cb3e?source=rss------bug_bounty-5 | hackerdevil | bug-bounty-tips, web-app-security, bug-bounty, bug-bounty-writeup, vulnerability-assessment | 16-Nov-2023 |
Bug Bounty Programs: Unleashing the Power of Ethical Hacking | https://medium.com/@crawsecurity/bug-bounty-programs-unleashing-the-power-of-ethical-hacking-5da98f820ebb?source=rss------bug_bounty-5 | crawsecurity | bug-bounty-program, bug-bounty, bug-bounty-tips, bugs, bug-bounty-writeup | 16-Nov-2023 |
Exploiting Blind XXE: Going Out of Band | https://medium.com/@mohamedtaha_42562/exploiting-blind-xxe-going-out-of-band-f04e3c1ea7ef?source=rss------bug_bounty-5 | Mohamed Taha | security, penetration-testing, bug-bounty | 16-Nov-2023 |
Introducing Bug Bounty Boosts: Supercharging Security With Timebound Events | https://medium.com/immunefi/introducing-bug-bounty-boosts-supercharging-security-with-timebound-events-51e3a1f208c3?source=rss------bug_bounty-5 | Immunefi Editor | bug-bounty, web3, immunefi, cybersecurity, degate | 16-Nov-2023 |
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1 | https://medium.com/@hackersdump0/diving-deep-a-comprehensive-guide-to-android-penetration-testing-part-1-392cf9abf93f?source=rss------bug_bounty-5 | Hacker's Dump | android-pentesting, hacking, android, penetration-testing, bug-bounty | 16-Nov-2023 |
Malware Analysis: Understanding and Combatting Cyber Threats | https://medium.com/@paritoshblogs/malware-analysis-understanding-and-combatting-cyber-threats-d0db1d56760c?source=rss------bug_bounty-5 | Paritosh | malware-analysis, hacking, bug-bounty, cybersecurity, information-security | 16-Nov-2023 |
How I got a $500 reward for finding an unacclaimed bucket on GitHub | https://medium.com/@andre.pontes7/how-i-got-a-500-reward-for-finding-an-unacclaimed-bucket-on-github-57623c386515?source=rss------bug_bounty-5 | André Pontes | aws-s3, hackerone, bug-bounty, aws | 16-Nov-2023 |
23.3 Lab: User ID controlled by request parameter, with unpredictable user IDs | 2023 | https://cyberw1ng.medium.com/23-3-lab-user-id-controlled-by-request-parameter-with-unpredictable-user-ids-2023-5827f93eca1d?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | penetration-testing, bug-bounty, careers, cybersecurity, hacking | 16-Nov-2023 |
$1000 Bounty: How I scaled a Self-Redirect to an XSS in a web 3.0 system at Hackenproof | https://erickfernandox.medium.com/1000-bounty-how-i-scaled-a-self-redirect-to-an-xss-in-a-web-3-0-system-at-hackenproof-37380f701892?source=rss------bug_bounty-5 | Erick Fernando | bug-bounty, hackenproof, open-redirect, xss-bypass | 16-Nov-2023 |
DNS C2 — When Malware Goes Incognito! | https://medium.com/@paritoshblogs/dns-c2-when-malware-goes-incognito-03fdc2e82057?source=rss------bug_bounty-5 | Paritosh | cybersecurity, bug-bounty, information-security, dns, hacking | 15-Nov-2023 |
HackerOne Surpasses $300 Million in Rewards for Ethical Hackers | https://medium.com/@zerosecurity/hackerone-surpasses-300-million-in-rewards-for-ethical-hackers-eba7be4f106c?source=rss------bug_bounty-5 | ZeroSecurity | bug-bounty | 15-Nov-2023 |
LandRocker Bug Bounty Program | https://landrocker.medium.com/landrocker-bug-bounty-program-aa2f55f47297?source=rss------bug_bounty-5 | LandRocker | bug-bounty, bitcoin, cryptocurrency-investment, token-sale, web3 | 15-Nov-2023 |
23.2 Lab: User ID controlled by request parameter | 2023 | https://cyberw1ng.medium.com/23-2-lab-user-id-controlled-by-request-parameter-2023-74764905c72c?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | penetration-testing, bug-bounty, careers, hacking, cybersecurity | 15-Nov-2023 |
Understanding Post-Exploitation: Cybersecurity | https://medium.com/@paritoshblogs/understanding-post-exploitation-cybersecurity-5c8d11b75812?source=rss------bug_bounty-5 | Paritosh | cybersecurity, programming, information-security, bug-bounty, post-exploitation | 15-Nov-2023 |
Idor That allowed me to get access to sensitive users files and share them -.- | https://hamzadzworm.medium.com/idor-that-allowed-me-to-get-access-to-sensitive-users-files-and-share-them-f7da741e9f63?source=rss------bug_bounty-5 | Hamzadzworm | bugbounty-writeup, bug-bounty-tips, hackerone, bug-bounty, cybersecurity | 15-Nov-2023 |
Unveiling Sensitive Information Exposure: IIS Tilde Enumeration Vulnerability | https://medium.com/@mohammed0anas/unveiling-sensitive-information-exposure-iis-tilde-enumeration-vulnerability-ffe034073288?source=rss------bug_bounty-5 | Nas | bug-bounty, hacking, cybersecurity, bug-bounty-writeup | 15-Nov-2023 |
How I hacked Google’s bug tracking system itself for $15,600 in bounties | https://homosapienimo.medium.com/how-i-hacked-googles-bug-tracking-system-itself-for-15-600-in-bounties-65c5aacaacdf?source=rss------bug_bounty-5 | Homo Sapiens | bug-bounty, startup, google, technology, security | 15-Nov-2023 |
Project 2510: Bug Bounty Challenge — Day 10/25 | https://wallotry.medium.com/project-2510-bug-bounty-challenge-day-10-25-7b9651fb1b26?source=rss------bug_bounty-5 | Wallotry | bug-bounty-hunter, bug-bounty-hunting, bug-bounty, bug-bounty-tips | 15-Nov-2023 |
Exploiting Parallels Plesk Panels With Shodan | https://blog.meese.enterprises/exploiting-parallels-plesk-panels-with-shodan-282248855af2?source=rss------bug_bounty-5 | Aaron Meese | cybersecurity, shodan, osint-investigation, osint, bug-bounty | 15-Nov-2023 |
Detection Engineering: Strengthening Cybersecurity Defense | https://medium.com/@paritoshblogs/detection-engineering-strengthening-cybersecurity-defense-8d31ab7a2d46?source=rss------bug_bounty-5 | Paritosh | bug-bounty, information-security, detection-engineering, hacking, cybersecurity | 14-Nov-2023 |
Hackathon : KPU.GO.ID | https://medium.com/@angryovalegg/hackathon-kpu-go-id-8fb6f3ce0d61?source=rss------bug_bounty-5 | Angry Oval Egg | hackathons, indo-hacker, bug-bounty, kpu, pemilu | 14-Nov-2023 |
How to find probably vulnerable objects in your own surface with Netlas.io? | https://systemweakness.com/how-to-find-probably-vulnerable-objects-in-your-own-surface-with-netlas-io-7f3448363892?source=rss------bug_bounty-5 | Netlas.io | script, automation, bug-bounty, attack-surface, reconnaissance | 14-Nov-2023 |
#4 Session Fixation — Secure Code Explain | https://securitycipher.medium.com/4-session-fixation-secure-code-explain-7d9567f25f38?source=rss------bug_bounty-5 | Piyush Kumawat (securitycipher) | cybersecurity, technology, bug-bounty, vulnerability, coding | 14-Nov-2023 |
Escalating Blind SSRF to a Remote Code Execution | https://mukibas37.medium.com/escalating-blind-ssrf-to-a-remote-code-execution-be65ed9a7d0f?source=rss------bug_bounty-5 | Mukilan Baskaran | infosec, ssrf, cybersecurity, bug-bounty, hacking | 14-Nov-2023 |
23.1 Lab: CORS vulnerability with trusted null origin | 2023 | https://cyberw1ng.medium.com/23-1-lab-cors-vulnerability-with-trusted-null-origin-2023-53d2de3b8e28?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | hacking, bug-bounty, careers, cybersecurity, penetration-testing | 14-Nov-2023 |
Har Har Hijack: The Okta Plunder | https://medium.com/@josh.beck2006/har-har-hijack-the-okta-plunder-8fb36f5c9d45?source=rss------bug_bounty-5 | Josh Beck | penetration-testing, cybersecurity, bug-bounty | 14-Nov-2023 |
bWAPP PHP Code Injection | https://medium.com/@yusufbaris/bwapp-php-code-injection-2b326b831924?source=rss------bug_bounty-5 | Yusuf Barış | cybersecurity, web-security, hacking, bug-bounty, penetration-testing | 14-Nov-2023 |
Project 2510: Bug Bounty Challenge — Day 9/25 | https://wallotry.medium.com/project-2510-bug-bounty-challenge-day-9-25-14cbedbecee2?source=rss------bug_bounty-5 | Wallotry | bug-bounty-tips, bug-bounty-hunter, bug-bounty, bug-bounty-hunting | 14-Nov-2023 |
Introduction to AI in Cybersecurity | https://imran-niaz.medium.com/introduction-to-ai-in-cybersecurity-6d80460d9e37?source=rss------bug_bounty-5 | Imran Niaz | programming, cybersecurity, learning, penetration-testing, bug-bounty | 13-Nov-2023 |
Let's together dive deep into information disclosure | https://medium.com/@parthnarulatech/lets-together-dive-deep-into-information-disclosure-8bdb0b5db728?source=rss------bug_bounty-5 | scriptjacker | bug-bounty-tips, penetration-testing, bug-bounty, cybersecurity, owasp | 13-Nov-2023 |
SSL Search — A tool to identify infrastructure and discover attack surfaces. | https://medium.com/@harsh8v/ssl-search-a-tool-to-identify-infrastructure-and-discover-attack-surfaces-449c83269574?source=rss------bug_bounty-5 | Harsh Varagiya | bug-bounty, gcp, ssl-certificate, aws, internet | 13-Nov-2023 |
Google VRP -[IDOR] Deleted Victim Data & Leaked | https://medium.com/@ggilang1135/google-vrp-idor-deleted-victim-data-leaked-0b3cba8e3f7a?source=rss------bug_bounty-5 | Gilang Romadon | bug-bounty, idor-vulnerability, bug-bounty-tips, ggilangromadon, google-vrp | 13-Nov-2023 |
Announcing IWCON 2023 Speakers Second Batch | https://infosecwriteups.com/announcing-iwcon-2023-speakers-second-batch-26762dc93491?source=rss------bug_bounty-5 | InfoSec Write-ups | infosec, security, bug-bounty, conference, hacking | 13-Nov-2023 |
Cracking the Code, Cobalt Strike — More Than Just a Fancy Pen Test Tool (And Why Cyber Baddies… | https://medium.com/@paritoshblogs/cracking-the-code-cobalt-strike-more-than-just-a-fancy-pen-test-tool-and-why-cyber-baddies-8b5c56ece92c?source=rss------bug_bounty-5 | Paritosh | bug-bounty, pentesting, cybersecurity, hacking, cobalt-strike | 13-Nov-2023 |
22.2 Lab: JWT authentication bypass via flawed signature verification | 2023 | https://cyberw1ng.medium.com/22-2-lab-jwt-authentication-bypass-via-flawed-signature-verification-2023-2a1d63d18ab2?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | hacking, careers, bug-bounty, cybersecurity, penetration-testing | 13-Nov-2023 |
Weirdest API that has been ever found | https://medium.com/@mmaulanaabdullah/weirdest-api-that-has-been-ever-found-9270720d6f02?source=rss------bug_bounty-5 | M Maulana Abdullah | writeup, api, bug-bounty, api-development | 13-Nov-2023 |
Authentication Vulnerabilities- Lab #9 Brute-forcing a stay-logged-in cookie | https://dollarboysushil.medium.com/authentication-vulnerabilities-lab-9-brute-forcing-a-stay-logged-in-cookie-dda91125f5f2?source=rss------bug_bounty-5 | dollarboysushil | cookie-hacking, web-security, cybersecurity, portswigger, bug-bounty | 13-Nov-2023 |
Project 2510: Bug Bounty Challenge — Day 8/25 | https://wallotry.medium.com/project-2510-bug-bounty-challenge-day-8-25-ea9bc1addd63?source=rss------bug_bounty-5 | Wallotry | bug-bounty-hunting, bug-bounty, bug-bounty-hunter, bug-bounty-tips | 13-Nov-2023 |
I created posts on the newsletter page dedicated to the program administrator | https://medium.com/@hossam_hamada/i-created-posts-on-the-newsletter-page-dedicated-to-the-program-administrator-aa271980aa53?source=rss------bug_bounty-5 | Hossam Hamada | bug-bounty, penetration-testing, idor, idor-vulnerability, bug-hunting | 12-Nov-2023 |
1200$ IDOR Flaw: Allow Attacker To Approve Project Time Tracking | https://medium.com/@a13h1/1200-idor-flaw-allow-attacker-to-approve-project-time-tracking-a9f64c06732a?source=rss------bug_bounty-5 | Abhi Sharma | bug-bounty, programming, hacking, information-security, cybersecurity | 12-Nov-2023 |
Crafting XSS (Cross-Site Scripting) payloads | https://infosecwriteups.com/crafting-xss-cross-site-scripting-payloads-919f62171bd0?source=rss------bug_bounty-5 | Security Lit Limited | xss-vulnerability, bug-bounty, xss-attack, technology, cybersecurity | 12-Nov-2023 |
Authentication Vulnerabilities- Lab #8 2FA (Two Factor Authentication) broken logic | https://dollarboysushil.medium.com/authentication-vulnerabilities-lab-8-2fa-two-factor-authentication-broken-logic-b3c6cd8923b9?source=rss------bug_bounty-5 | dollarboysushil | portswigger, cybersecurity, 2fa-hacking, web-security, bug-bounty | 12-Nov-2023 |
22.1 Lab: JWT authentication bypass via unverified signature | 2023 | https://cyberw1ng.medium.com/22-1-lab-jwt-authentication-bypass-via-unverified-signature-2023-4401628467d9?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | hacking, cybersecurity, bug-bounty, penetration-testing, careers | 12-Nov-2023 |
Finding Sneaky Hackers, The Ultimate Way of Stalking Cyber Intruders (Without a Trench Coat) | https://medium.com/@paritoshblogs/finding-sneaky-hackers-the-ultimate-way-of-stalking-cyber-intruders-without-a-trench-coat-8db574697fe7?source=rss------bug_bounty-5 | Paritosh | programming, cybersecurity, lateral-movement, bug-bounty, hacking | 12-Nov-2023 |
Project 2510: Bug Bounty Challenge — Day 7/25 | https://wallotry.medium.com/project-2510-bug-bounty-challenge-day-7-25-a9367edc5864?source=rss------bug_bounty-5 | Wallotry | bug-bounty-hunter, bug-bounty, bug-bounty-tips, bug-bounty-hunting | 12-Nov-2023 |
Introduction to API Hacking: A Free Course to Level Up Your Skills | https://medium.com/@maisamnoyan/introduction-to-api-hacking-a-free-course-to-level-up-your-skills-537bfc70180d?source=rss------bug_bounty-5 | Maisam Noyan | hacking, bug-bounty, free-course, api, course | 11-Nov-2023 |
Authentication Vulnerabilities- Lab #4 Username enumeration via subtly different responses | https://dollarboysushil.medium.com/authentication-vulnerabilities-lab-4-username-enumeration-via-subtly-different-responses-5eb512d899fa?source=rss------bug_bounty-5 | dollarboysushil | web-security, portswigger, bug-bounty, cybersecurity | 11-Nov-2023 |
Attention Cyber Enthusiasts! Exciting News Ahead! ️ | https://cyberconqueror.medium.com/attention-cyber-enthusiasts-exciting-news-ahead-%EF%B8%8F-26399c20b71a?source=rss------bug_bounty-5 | Cyber Conqueror | free-course, information-security, cybersecurity, bug-bounty, free | 11-Nov-2023 |
Authentication Vulnerabilities- Lab #5 Username enumeration via response timing | https://dollarboysushil.medium.com/authentication-vulnerabilities-lab-5-username-enumeration-via-response-timing-16b07552275a?source=rss------bug_bounty-5 | dollarboysushil | portswigger, bug-bounty, cybersecurity, hacking-passwords | 11-Nov-2023 |
AppSec Tales XXII | LDAPI | https://karol-mazurek95.medium.com/appsec-tales-xxii-ldapi-fcef1f40e9b2?source=rss------bug_bounty-5 | Karol Mazurek | information-technology, bug-bounty, cybersecurity, information-security, penetration-testing | 11-Nov-2023 |
JWT attack vulnerabilities in Web App Penetration Testing | 2023 | https://cyberw1ng.medium.com/jwt-attack-vulnerabilities-in-web-app-penetration-testing-2023-4eb8916133dc?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | careers, hacking, penetration-testing, bug-bounty, cybersecurity | 11-Nov-2023 |
Downloading files using POST request (unorthodox method) | https://medium.com/@paritoshblogs/downloading-files-using-post-request-unorthodox-method-d042bb06c1ce?source=rss------bug_bounty-5 | Paritosh | cybersecurity, programming, bug-bounty, hacking, html | 11-Nov-2023 |
Authentication Vulnerabilities- Lab #6 Broken brute-force protection, IP block | https://dollarboysushil.medium.com/authentication-vulnerabilities-lab-6-broken-brute-force-protection-ip-block-b3afca0a2ea7?source=rss------bug_bounty-5 | dollarboysushil | brute-force, web-security, cybersecurity, bug-bounty, portswigger | 11-Nov-2023 |
Reconnaissance Is The Key — Bug Bounty Tip! | https://medium.com/@learningstuff110/reconnaissance-is-the-key-bug-bounty-tip-527f24e56cc5?source=rss------bug_bounty-5 | Fahad Hasan | directory-enumeration, penetration-testing, bug-bounty, waybackurls, reconnaissance | 11-Nov-2023 |
Pentesting: I wanna be a hackerrr… | https://areen-agrawal.medium.com/pentesting-i-wanna-be-a-hackerrr-4dcf9379a6fc?source=rss------bug_bounty-5 | Me, Just a Techie. | bug-bounty, computer-security, red-teaming, technology, pentesting | 11-Nov-2023 |
Project 2510: Bug Bounty Challenge — Day 6/25 | https://wallotry.medium.com/project-2510-bug-bounty-challenge-day-6-25-fe340a54386c?source=rss------bug_bounty-5 | Wallotry | bug-bounty, bug-bounty-hunter, bug-bounty-tips, bug-bounty-hunting | 11-Nov-2023 |
Project 2510: Bug Bounty Challenge — Day 5/25 | https://wallotry.medium.com/project-2510-bug-bounty-challenge-day-5-25-205300a2a65c?source=rss------bug_bounty-5 | Wallotry | bug-bounty, bug-bounty-hunting, bug-bounty-hunter, bug-bounty-tips | 10-Nov-2023 |
Unlocking Cash: Easy P1 Bug in Grafana Dashboard with Default Credentials = €€€€ | https://infosecwriteups.com/unlocking-cash-easy-p1-bug-in-grafana-dashboard-with-default-credentials-fa36ddf271da?source=rss------bug_bounty-5 | Pratik Dabhi | hackerone, bug-bounty, bugcrowd | 10-Nov-2023 |
Authentication Vulnerabilities- Lab #3 Password reset broken logic | https://dollarboysushil.medium.com/authentication-vulnerabilities-lab-3-password-reset-broken-logic-95bc62a7b92a?source=rss------bug_bounty-5 | dollarboysushil | bug-bounty, cybersecurity, portswigger, web-security, password-reset | 10-Nov-2023 |
21.1 Lab: Authentication bypass via OAuth implicit flow | 2023 | https://cyberw1ng.medium.com/21-1-lab-authentication-bypass-via-oauth-implicit-flow-2023-15f819305f73?source=rss------bug_bounty-5 | Karthikeyan Nagaraj | penetration-testing, bug-bounty, careers, cybersecurity, hacking | 10-Nov-2023 |
Authentication Vulnerabilities- Lab #2 2FA simple bypass | https://dollarboysushil.medium.com/authentication-vulnerabilities-lab-2-2fa-simple-bypass-6bd390cf92bc?source=rss------bug_bounty-5 | dollarboysushil | web-security, cybersecurity, bug-bounty, portswigger, two-factor-authentication | 10-Nov-2023 |
Revealing True Industry Potential Through the Ultimate Web3 Security Ecosystem: R.xyz | https://medium.com/coinmonks/revealing-true-industry-potential-through-the-ultimate-web3-security-ecosystem-r-xyz-007acfd25b62?source=rss------bug_bounty-5 | Officer's Notes | blockchain-security, bug-bounty, web3, smart-contract-security, hacking | 10-Nov-2023 |
How I stopped a Wallet Hack and Got Almost Nothing. | https://medium.com/@mahitman1/how-i-stopped-a-wallet-hack-and-got-almost-nothing-68babd824854?source=rss------bug_bounty-5 | Muhammad Abdullah | web3, blockchain, bug-bounty, security | 10-Nov-2023 |