Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
bugbounty
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
WaspSting - Penetration Testing & Bug Bounty Tool
Bristie
Bristie
Bristie
Follow
Mar 23
WaspSting - Penetration Testing & Bug Bounty Tool
#
bugbounty
#
security
#
python
#
opensource
Comments
Add Comment
9 min read
5 AI Agents vs Tesla: P1 Vulnerability Found in 38 Minutes
Bridge ACE
Bridge ACE
Bridge ACE
Follow
Mar 18
5 AI Agents vs Tesla: P1 Vulnerability Found in 38 Minutes
#
security
#
ai
#
bugbounty
#
tesla
Comments
Add Comment
2 min read
5 AI Agents vs Tesla: How We Found a P1 Vulnerability in 38 Minutes
Bridge ACE
Bridge ACE
Bridge ACE
Follow
Mar 18
5 AI Agents vs Tesla: How We Found a P1 Vulnerability in 38 Minutes
#
security
#
ai
#
bugbounty
#
opensource
Comments
Add Comment
3 min read
I Let AI Agents Run My Bug Bounty Program. Here Is What Happened.
Bridge ACE
Bridge ACE
Bridge ACE
Follow
Mar 18
I Let AI Agents Run My Bug Bounty Program. Here Is What Happened.
#
security
#
ai
#
bugbounty
#
opensource
Comments
Add Comment
2 min read
Passive Recon â How I Map Targets Without Ever Touching Them
Amrit Sinha
Amrit Sinha
Amrit Sinha
Follow
Mar 12
Passive Recon â How I Map Targets Without Ever Touching Them
#
security
#
bugbounty
#
osint
#
cybersecurity
1
 reaction
Comments
Add Comment
4 min read
Your Robot Vacuum Is Watching You: The $30K Hack That Exposed Thousands of Smart Homes
Kunal
Kunal
Kunal
Follow
Mar 7
Your Robot Vacuum Is Watching You: The $30K Hack That Exposed Thousands of Smart Homes
#
cybersecurity
#
iot
#
smarthome
#
bugbounty
1
 reaction
Comments
Add Comment
6 min read
Subdomain Enumeration in 2026: Tools, Techniques, and What Actually Works
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 7
Subdomain Enumeration in 2026: Tools, Techniques, and What Actually Works
#
security
#
bugbounty
#
webdev
#
tutorial
Comments
Add Comment
8 min read
How to Find IDOR Vulnerabilities: The Bug Bounty Hunter's Practical Guide
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 6
How to Find IDOR Vulnerabilities: The Bug Bounty Hunter's Practical Guide
#
security
#
bugbounty
#
webdev
#
tutorial
Comments
Add Comment
6 min read
Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories
Sidhanta Palei
Sidhanta Palei
Sidhanta Palei
Follow
Mar 6
Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories
#
security
#
cybersecurity
#
bugbounty
#
opensource
1
 reaction
Comments
Add Comment
4 min read
DOM XSS: Why Server-Side Sanitization Isn't Enough
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 6
DOM XSS: Why Server-Side Sanitization Isn't Enough
#
security
#
javascript
#
webdev
#
bugbounty
Comments
Add Comment
5 min read
How I Made My First $300 Bug Bounty (Without Finding SQL Injection)
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 6
How I Made My First $300 Bug Bounty (Without Finding SQL Injection)
#
security
#
bugbounty
#
webdev
#
beginners
Comments
Add Comment
6 min read
How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)
Amit Goyal
Amit Goyal
Amit Goyal
Follow
Mar 5
How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)
#
cybersecurity
#
android
#
bluetooth
#
bugbounty
1
 reaction
Comments
Add Comment
3 min read
The XSS Patterns Hackers Use (And How to Spot Them)
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 3
The XSS Patterns Hackers Use (And How to Spot Them)
#
security
#
bugbounty
#
webdev
#
xss
Comments
Add Comment
6 min read
Web Pentesting Beginner Roadmap (2026): From Recon to Server-Side Attacks
itsmegsg
itsmegsg
itsmegsg
Follow
Mar 19
Web Pentesting Beginner Roadmap (2026): From Recon to Server-Side Attacks
#
websecurity
#
bugbounty
#
cybersecurity
#
beginners
2
 reactions
Comments
Add Comment
2 min read
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
Teycir Ben Soltane
Teycir Ben Soltane
Teycir Ben Soltane
Follow
Feb 4
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
#
security
#
bugbounty
#
websecurity
#
waf
Comments
Add Comment
5 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account