DEV Community 👩‍💻👨‍💻

# bugbounty

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
From App User to Tenant Admin

From App User to Tenant Admin

Comments
3 min read
Commenting == Account Takeover

Commenting == Account Takeover

Reactions 5 Comments
4 min read
Intercept android app traffic in Burp Suite: From root to hack [ULTIMATE GUIDE for bug hunters]

Intercept android app traffic in Burp Suite: From root to hack [ULTIMATE GUIDE for bug hunters]

Reactions 6 Comments
4 min read
Cyber Security resources

Cyber Security resources

Reactions 4 Comments
1 min read
Setting up reconftw

Setting up reconftw

Reactions 12 Comments
9 min read
GraphQL : The new REST?

GraphQL : The new REST?

Reactions 65 Comments 23
3 min read
Bug Bounty: Not always an ideal

Bug Bounty: Not always an ideal

Reactions 29 Comments 4
2 min read
team up for Bug bounty Hunter

team up for Bug bounty Hunter

Reactions 5 Comments
1 min read
Failling in Bugbounty's

Failling in Bugbounty's

Reactions 2 Comments
2 min read
Using extensions for Bug Bounty and Pentesting

Using extensions for Bug Bounty and Pentesting

Reactions 3 Comments 3
1 min read
Intigriti 1221 - XSS Challenge Writeup

Intigriti 1221 - XSS Challenge Writeup

Reactions 6 Comments
5 min read
Log4j Vulnerability Cheatsheet

Log4j Vulnerability Cheatsheet

Reactions 7 Comments
2 min read
Intigriti 1121 - XSS Challenge Writeup

Intigriti 1121 - XSS Challenge Writeup

Reactions 7 Comments
10 min read
How to install nuclei in any linux ☠️

How to install nuclei in any linux ☠️

Reactions 5 Comments
1 min read
Remote Code Execution on ibm.com subdomain

Remote Code Execution on ibm.com subdomain

Reactions 5 Comments 2
1 min read
SQL inection on gdclive.nokia.com

SQL inection on gdclive.nokia.com

Reactions 3 Comments 1
2 min read
Reflected XSS by jsonp on ibm.com subdomain

Reflected XSS by jsonp on ibm.com subdomain

Reactions 4 Comments
1 min read
Blockchain security analysis layer by layer

Blockchain security analysis layer by layer

Reactions 14 Comments
13 min read
QUICK TEN STEP GUIDE TO BUG HUNTING

QUICK TEN STEP GUIDE TO BUG HUNTING

Reactions 15 Comments
3 min read
Can you use Ruby in Bug Bounty?

Can you use Ruby in Bug Bounty?

Reactions 5 Comments 2
1 min read
Make Money as a Bug Bounty Hunter on these 9 Platforms

Make Money as a Bug Bounty Hunter on these 9 Platforms

Reactions 15 Comments 1
2 min read
"I never sent that!" An Intro to CSRF (Updated)

"I never sent that!" An Intro to CSRF (Updated)

Reactions 8 Comments
7 min read
Hack more, learn more, earn more and get invited more.

Hack more, learn more, earn more and get invited more.

Reactions 31 Comments 1
7 min read
Acknowledgement From Intel

Acknowledgement From Intel

Reactions 2 Comments
1 min read
Acknowledgement From Microsoft

Acknowledgement From Microsoft

Reactions 2 Comments
4 min read
OnePlus opens up a bug bounty program called the OnePlus Security Response Center

OnePlus opens up a bug bounty program called the OnePlus Security Response Center

Reactions 6 Comments
2 min read
loading...