Best Quality
0 6/10

Researcher discovered RCE via exposed Rails secret token leaked through Rack's ShowExceptions error page enabled on production. By fuzzing the filename parameter with %0d to trigger an exception, they obtained the secret_token used to sign cookies, which they then exploited to achieve remote code execution across two in-scope assets.

Rack Rails ShowExceptions action_dispatch.secret_token
sites.google.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

A DevOps engineer discovered unauthenticated RCE as root on publicly exposed Marathon container orchestration instances by leveraging the task scheduling API to execute arbitrary commands without authentication, discovered via Shodan reconnaissance.

Marathon Mesos DC/OS Shodan netcat curl
omespino.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

A union-based SQL injection vulnerability was discovered in the University of Cambridge's Fitzwilliam Museum search application, allowing enumeration of database version, user credentials, and database name through manipulated query parameters.

University of Cambridge Adesh Kolte Fitzwilliam Museum MySQL 5.1.39
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

An IDOR vulnerability in Facebook Analytics allows users with analyst roles to access private dashboard charts by manipulating the 'chartID' parameter in a GraphQL request, disclosing chart names and data that should only be visible to the dashboard owner.

Facebook Analytics Sarmad Hassan CVE not assigned
bugreader.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

A walkthrough of exploiting a boolean-based SQL injection vulnerability via the User-Agent HTTP header to enumerate database version, table names, and columns, culminating in credential extraction from a MariaDB 10.1.21 instance.

MariaDB MySQL Oracle MicrosoftSQL fr0stNuLL
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10
vulnerability

An application-level denial-of-service vulnerability exploitable by sending excessively long strings (100,000+ characters) to input fields, causing CPU and memory exhaustion through vulnerable string hashing implementations. The technique can be applied to password fields, usernames, email addresses, and other text inputs across authentication and search functions.

Jerry Shah HackerOne Freedium
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

Researchers identified and documented a method to discover and exploit over 55,000 subdomain takeover vulnerabilities on Shopify by analyzing FDNS datasets for CNAMEs pointing to Shopify infrastructure, then claiming unclaimed shop names to hijack subdomains. They developed a script with improved false-positive detection using page error messages, CNAME verification, and REST API checks.

Shopify FDNS dataset Project Sonar buckhacker HackerOne
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

SQL injection vulnerability discovered in a forget password function via time-based exploitation. The author enumerated the backend technology (ASP.NET/MSSQL), broke the SQL query with single quotes, injected a WAITFOR DELAY payload to confirm the vulnerability, and used SQLMap to automate database extraction.

SQLMap Burp Suite ASP.NET MSSQL khaled gaber
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

A bug bounty hunter demonstrates a union-based SQL injection attack against a private company's web application, using order-by enumeration to identify 11 vulnerable columns, extracting database version, user, OS details, and dumping table schemas via information_schema queries with encoding bypasses.

Nur A Alam Dipu
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

Researcher discovered multiple DoS vulnerabilities across Facebook endpoints caused by lack of parameter length validation, allowing attackers to crash Messenger and break Facebook Pages for administrators through large payload injection via the appointments feature.

Facebook Max Pasqua Kassem Burp Suite
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

Researcher demonstrates a subdomain takeover vulnerability on Starbucks by exploiting an unclaimed Azure Traffic Manager endpoint. The vulnerable subdomain had a CNAME pointing to a non-existent trafficmanager.net domain that could be registered without domain ownership verification, allowing complete control of the subdomain.

Starbucks Microsoft Azure Azure Traffic Manager wfmnarptpc.starbucks.com s00149tmppcrpt.trafficmanager.net Patrik Hudak
0xpatrik.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

A blind time-based SQL injection vulnerability was discovered in a file upload parameter where the application stored the filename directly in the database without proper sanitization. The vulnerability was exploited by injecting SQL sleep commands into the PDF filename and confirming exploitation through response time analysis after bypassing a Cloudflare WAF misconfiguration.

Synack HackerOne Cloudflare Burp Scanner reefbr marcioalm joaomatosf CVE-2019-2725
jspin.re · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

A security researcher bypassed 2FA/OTP on an Indian travel service provider by brute-forcing a 4-digit OTP without rate limiting, using Burp Suite's intruder to test all 10,000 possible combinations and obtain a valid login token.

Akash Agrawal Burp Suite
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

A subdomain takeover of ping.ubnt.com via unclaimed Amazon Cloudfront distribution, combined with shared session cookies across *.ubnt.com subdomains, allowed complete authentication bypass of Ubiquity's SSO system. The vulnerability was responsibly disclosed through HackerOne.

Ubiquity HackerOne Amazon Cloudfront ping.ubnt.com sso.ubnt.com Arne Swinnen
arneswinnen.net · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 6/10

Comprehensive CTI research on Handala Hack Group (linked to Iranian MOIS via Void Manticore cluster), a politically-motivated hack-and-leak threat actor targeting Israeli organizations through phishing, social engineering, and wiper malware, combining technical compromise with information operations for amplified impact. The report provides cluster-level attribution convergence across five vendors, TTPs mapping, IOCs, and SOC-ready defensive playbooks including wiper-resilience and incident communications guidance.

Handala Hack Group Handala Hack Team Void Manticore Storm-0842 Storm-842 BANISHED KITTEN Dune COBALT MYSTIQUE MOIS Check Point Microsoft Sophos CrowdStrike Recorded Future Andrey Pautov
infosecwriteups.com · Andrey Pautov · 9 hours ago · details
0 6/10

This article explains how inline assembly semantics fit into the Rust Abstract Machine by proposing a "storytelling" approach: every inline assembly block must have a corresponding Rust code equivalent that describes its observable behavior, allowing the compiler to reason about soundness and apply optimizations correctly. The author demonstrates why inline assembly cannot arbitrarily violate Abstract Machine constraints like aliasing rules, even though assembly itself doesn't have these concepts.

Rust Tree Borrows Stacked Borrows Miri rustc
ralfj.de · ingve · 18 hours ago · details · hn
0 6/10

Article demonstrates how formal verification can detect subtle bugs in code that pass testing and code review, using a banking application example with three classes of defects: fee calculation errors violating invariants, money conservation violations in transfers, and integer overflow edge cases that break properties for all possible inputs.

Predictable Machines Francisco Alonso Java
predictablemachines.com · jorgegalindo · 18 hours ago · details · hn
0 6/10

A former backend lead at Manus proposes replacing traditional function-calling in LLM agents with a single Unix-style run(command="...") tool that leverages pipes and shell operators, arguing that LLMs are naturally aligned with CLI patterns they've seen extensively in training data and that this approach reduces cognitive load on tool selection while enabling composition.

Manus Meta Pinix agent-clip LocalLLaMA MorroHsu
old.reddit.com · drtse4 · 20 hours ago · details · hn
0 6/10

Walkthrough of exploiting three common API vulnerabilities—BOLA (Broken Object-Level Authorization), Broken Authentication, and BOPLA (Broken Object Property-Level Authorization)—in the Damn Vulnerable Bank deliberately vulnerable application using Burp Suite.

Burp Suite Damn Vulnerable Bank Adeola Odunlade
adeolaodunlade.medium.com · Odunlade Adeola · 21 hours ago · details
0 6/10

An educational murder mystery game that teaches core dump debugging and reverse engineering through a sci-fi airlock controller scenario. Players must analyze a core dump to uncover how a buffer overflow exploit was used to trigger a fatal airlock malfunction.

Robopenguins Jonathan Return of the Obra Dinn The Case of the Golden Idol Deadlock Empire
robopenguins.com · pabs3 · 21 hours ago · details · hn
0 6/10

This lab exercise demonstrates a reflected XSS vulnerability in an HTML context where standard HTML tags are blocked but custom tags are allowed, requiring attackers to find alternative vectors to achieve code execution.

medium.com · mayhack · 23 hours ago · details
0 6/10

An AI-generated Slack integration solution triggered the API's 1-request-per-second global rate limit by making hundreds of sequential close calls, cascading to break all application endpoints. The assistant's attempted fix using blocking sleep() worsened the problem by further blocking concurrent operations, demonstrating AI's failure to consider distributed system constraints.

Slack API conversations.close endpoint slack-sup2 Async::Task socketry/async Daniel Doubrovskine
code.dblock.org · dblock · 1 day ago · details · hn
0 6/10

A practical guide combining AI image analysis with ImageMagick command-line blurring to automatically detect and redact sensitive data (credentials, emails, tokens) from screenshots. The workflow uses AI models to identify sensitive regions by coordinates, then applies Gaussian blur or solid fill redaction via ImageMagick's -region flag.

ImageMagick Claude Code Codex Cursor Windsurf Jamdesk Vercel
jamdesk.com · gbourne1 · 1 day ago · details · hn
0 6/10

Technical taxonomy of GraphQL attack classes including schema enumeration, batch query abuse, and resolver explosion attacks that are commonly missed by security tools.

medium.com · Ommkoli · 1 day ago · details
0 6/10
technical-analysis

A detailed technical comparison of compression algorithms (gzip, zstd, xz, brotli, lzip, bzip2, bzip3) for optimizing code size in resource-constrained environments, demonstrating that bzip/bzip2 achieves superior compression ratios for text-like data through Burrows-Wheeler Transform rather than LZ77, while maintaining a smaller decoder footprint.

bzip2 bzip3 LibDeflate ComputerCraft zstd xz gzip brotli lzip purplesyringa
purplesyringa.moe · enz · 1 day ago · details · hn
0 6/10

A technical guide to setting up Pocket ID, a lightweight OIDC identity provider focused on passkey-based authentication, as a simpler alternative to Keycloak for self-hosted services. The author covers installation, client configuration patterns, and integration with multiple self-hosted applications including Gitea, Argo CD, Grist, Sentry, n8n, and WordPress.

Pocket ID Keycloak Gitea Argo CD Grist Sentry n8n WordPress YubiKey Jonathan Daggerhart Cameron Eagans oauth2-proxy siemens/sentry-auth-oidc openid-connect-generic
cweagans.net · cweagans · 1 day ago · details · hn
0 6/10

Article explores API design principles optimized for AI agents (agent experience/AX) alongside human developers, emphasizing that good OpenAPI documentation, clear error messages with guidance, and semantic descriptions are critical for autonomous agent routing and error recovery in fintech and accounting integrations.

Apideck Cloudflare Stripe Cursor Claude ChatGPT Postman Portman
apideck.com · mooreds · 1 day ago · details · hn
0 6/10

PHP-rnet is a PHP extension that bypasses bot detection by impersonating real browser TLS fingerprints and HTTP/2 behavior, using Rust-based networking libraries and BoringSSL to avoid the telltale libcurl fingerprint that standard PHP HTTP clients expose.

php-rnet Chrome Firefox Safari Edge OkHttp libcurl wreq BoringSSL takielias
takielias · 1 day ago · details · hn
0 5/10

A comprehensive guide covering SQL injection fundamentals, exploitation strategies, payload techniques, and WAF evasion methods for bug bounty hunters.

medium.com · JPablo13 · 3 hours ago · details
0 5/10

An IDOR vulnerability in an e-commerce site's address management API exposed customer addresses and mobile numbers. Although direct address retrieval was protected by session validation, the attacker discovered that a POST request to set a default address with sequential address_id parameters returned HTTP 200 responses, and subsequent checkout page requests displayed other users' full addresses regardless of session context.

Rahul Varale PortSwigger
rahulvarale.medium.com · kh4sh3i/bug-bounty-writeups · 3 hours ago · details
more →