bug-bounty-methodology

3 articles
sort: new top best
clear filter
0 2/10

A guide to White Rabbit Neo, an AI tool designed for security researchers and bug bounty hunters, covering practical setup and usage techniques.

White Rabbit Neo
medium.com · ghostyjoe · 14 hours ago · details
0 7/10

A reflected XSS vulnerability in an OAuth2 redirect_uri parameter was escalated from simple alert injection to account takeover by extracting CSRF tokens from meta tags and automating admin user creation without authentication. The writeup demonstrates a practical methodology for showing XSS impact through functional exploitation rather than simple proof-of-concept.

HackerOne XMLHttpRequest FormData
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 4/10

A complete walkthrough guide covering setup and security testing of a Flask web application with Apache and MySQL on Kali Linux, including HTTPS traffic analysis and bug bounty hunting techniques.

Apache MySQL Flask Kali Linux
medium.com · Hithaishi S P · 1 day ago · details