bug-bounty

549 articles
sort: new top best
clear filter
0
infosecwriteups.com · Krishna Kumar · 1 day ago · details
0 2/10

Author argues for using MiniMax 2.5 LLM instead of Claude for building autonomous pentesting and bug bounty agents, citing unspecified advantages.

Claude MiniMax MiniMax 2.5
infosecwriteups.com · Krishna Kumar · 1 day ago · details
0
medium.com · Mehedi Hasan Rafid · 1 day ago · details
0
medium.com · Mehedi Hasan Rafid · 1 day ago · details
0 2/10

Part 168 of a bug bounty hunting guide covering the Sec-Browsing-Topics header, a specialized request header from Google's Privacy Sandbox Topics API implementation.

Google Topics API Privacy Sandbox Sec-Browsing-Topics
medium.com · Mehedi Hasan Rafid · 1 day ago · details
0 2/10

A personal account from a bug bounty hunter describing a 30-day investigation into a $40,000 bounty with lessons learned, but the snippet provides no technical details about the vulnerability or exploitation methodology.

medium.com · Hacker MD · 1 day ago · details
0 2/10

The author claims to have discovered an account takeover vulnerability via OTP bypass on day 1 of bug bounty hunting, but provides no technical details, exploitation methodology, or root cause analysis in the provided text excerpt.

medium.com · Deepanshu Deep · 1 day ago · details
0 2/10

A listicle covering the top 10 OWASP ZAP add-ons designed to enhance bug bounty hunting workflows and security testing capabilities.

OWASP ZAP
medium.com · ghostyjoe · 1 day ago · details
0
infosecwriteups.com · Vipul Sonule · 1 day ago · details
0 5/10

Article discussing techniques for finding vulnerabilities and exposed secrets in public GitHub repositories as part of bug bounty hunting reconnaissance.

Vipul TheHackersLog
infosecwriteups.com · Vipul Sonule · 1 day ago · details
0 5/10

A comprehensive guide covering SQL injection fundamentals, exploitation strategies, WAF evasion methods, and payload techniques for bug bounty hunting.

medium.com · JPablo13 · 1 day ago · details
0
medium.com · the_air_cyborg · 1 day ago · details
0 5/10

A security researcher discovered a critical SQL injection vulnerability in an abandoned/legacy website by exploiting a chain of vulnerabilities. The article describes the exploitation methodology leveraging the outdated infrastructure to gain database access.

infosecwriteups.com · Eduardo F · 1 day ago · details
0
pritessh.medium.com · Pritesh Mistry · 1 day ago · details
0
infosecwriteups.com · RivuDon · 1 day ago · details
0 2/10

A bug bounty hunter describes discovering a vulnerability at a UEFA Champions League football club's website that earned them a Hall of Fame recognition, though technical details are not provided in the snippet.

infosecwriteups.com · RivuDon · 1 day ago · details
0
medium.com · 0 day exploit · 1 day ago · details
0 2/10

An article describing the discovery of a zero-day vulnerability in an Electron-based email viewer application, challenging common assumptions about where critical bugs are typically found.

medium.com · 0 day exploit · 1 day ago · details
0
medium.com · Ankit Rathva aka Gujarati Hacker · 1 day ago · details
0 2/10

A writeup about the author's first bug bounty finding involving an email verification bypass, but the provided excerpt contains no technical details, methodology, or substantive content.

medium.com · Ankit Rathva aka Gujarati Hacker · 1 day ago · details
0
medium.com · Configx · 1 day ago · details
0
more →