bug-bounty480
google298
xss277
microsoft249
facebook211
rce159
apple150
exploit136
bragging-post102
account-takeover98
malware94
csrf84
cve79
privilege-escalation74
stored-xss65
authentication-bypass65
writeup61
reflected-xss57
browser54
react53
ssrf51
phishing50
cloudflare50
dos50
access-control49
input-validation49
cross-site-scripting48
node47
aws46
smart-contract45
docker45
sql-injection45
ethereum44
defi43
web-security43
web-application42
supply-chain42
oauth41
web339
burp-suite36
vulnerability-disclosure34
lfi34
idor34
html-injection33
smart-contract-vulnerability32
race-condition32
reverse-engineering31
clickjacking31
csp-bypass30
information-disclosure30
0
6/10
A practical guide to identifying race conditions in web applications using Burp Suite, demonstrating how multiple simultaneous requests can exploit unsynchronized access to shared resources like account balances and vouchers.
race-condition
web-app-security
concurrent-access
synchronization
burp-suite
testing-methodology
money-transfer
voucher-exploit
balance-manipulation
Burp Suite
Egor Homakov
Starbucks
0
4/10
A complete walkthrough guide covering setup and security testing of a Flask web application with Apache and MySQL on Kali Linux, including HTTPS traffic analysis and bug bounty hunting techniques.
tutorial
kali-linux
apache
mysql
flask
https
traffic-analysis
web-app-security
bug-bounty-methodology
Apache
MySQL
Flask
Kali Linux