Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
bugbounty
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
I Saw Someone Build an AI-Powered Kali Lab at BSides San Diego. Then I Built My Own.
spac3gh0st
spac3gh0st
spac3gh0st
Follow
Apr 13
I Saw Someone Build an AI-Powered Kali Lab at BSides San Diego. Then I Built My Own.
#
security
#
ai
#
docker
#
bugbounty
Comments
Add Comment
6 min read
How I found an XXE in a multi-tenant cloud platform through a translation file upload
Simon Köck
Simon Köck
Simon Köck
Follow
Apr 8
How I found an XXE in a multi-tenant cloud platform through a translation file upload
#
security
#
xxe
#
java
#
bugbounty
Comments
Add Comment
1 min read
WaspSting - Penetration Testing & Bug Bounty Tool
Bristie
Bristie
Bristie
Follow
Mar 23
WaspSting - Penetration Testing & Bug Bounty Tool
#
bugbounty
#
security
#
python
#
opensource
Comments
Add Comment
9 min read
Bug Bounty Automation: Building Security Workflows That Scale
Chudi Nnorukam
Chudi Nnorukam
Chudi Nnorukam
Follow
Apr 10
Bug Bounty Automation: Building Security Workflows That Scale
#
bugbounty
#
automation
#
multiagent
#
security
Comments
Add Comment
6 min read
5 AI Agents vs Tesla: P1 Vulnerability Found in 38 Minutes
Bridge ACE
Bridge ACE
Bridge ACE
Follow
Mar 18
5 AI Agents vs Tesla: P1 Vulnerability Found in 38 Minutes
#
security
#
ai
#
bugbounty
#
tesla
Comments
Add Comment
2 min read
5 AI Agents vs Tesla: How We Found a P1 Vulnerability in 38 Minutes
Bridge ACE
Bridge ACE
Bridge ACE
Follow
Mar 18
5 AI Agents vs Tesla: How We Found a P1 Vulnerability in 38 Minutes
#
security
#
ai
#
bugbounty
#
opensource
Comments
Add Comment
3 min read
I Let AI Agents Run My Bug Bounty Program. Here Is What Happened.
Bridge ACE
Bridge ACE
Bridge ACE
Follow
Mar 18
I Let AI Agents Run My Bug Bounty Program. Here Is What Happened.
#
security
#
ai
#
bugbounty
#
opensource
Comments
Add Comment
2 min read
Passive Recon â How I Map Targets Without Ever Touching Them
Amrit Sinha
Amrit Sinha
Amrit Sinha
Follow
Mar 12
Passive Recon â How I Map Targets Without Ever Touching Them
#
security
#
bugbounty
#
osint
#
cybersecurity
1
 reaction
Comments
Add Comment
4 min read
Your Robot Vacuum Is Watching You: The $30K Hack That Exposed Thousands of Smart Homes
Kunal
Kunal
Kunal
Follow
Mar 7
Your Robot Vacuum Is Watching You: The $30K Hack That Exposed Thousands of Smart Homes
#
cybersecurity
#
iot
#
smarthome
#
bugbounty
1
 reaction
Comments
Add Comment
6 min read
Subdomain Enumeration in 2026: Tools, Techniques, and What Actually Works
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 7
Subdomain Enumeration in 2026: Tools, Techniques, and What Actually Works
#
security
#
bugbounty
#
webdev
#
tutorial
Comments
Add Comment
8 min read
Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories
Sidhanta Palei
Sidhanta Palei
Sidhanta Palei
Follow
Mar 6
Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories
#
security
#
cybersecurity
#
bugbounty
#
opensource
1
 reaction
Comments
Add Comment
4 min read
DOM XSS: Why Server-Side Sanitization Isn't Enough
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 6
DOM XSS: Why Server-Side Sanitization Isn't Enough
#
security
#
javascript
#
webdev
#
bugbounty
Comments
Add Comment
5 min read
How I Made My First $300 Bug Bounty (Without Finding SQL Injection)
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 6
How I Made My First $300 Bug Bounty (Without Finding SQL Injection)
#
security
#
bugbounty
#
webdev
#
beginners
Comments
Add Comment
6 min read
How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)
Amit Goyal
Amit Goyal
Amit Goyal
Follow
Mar 5
How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)
#
cybersecurity
#
android
#
bluetooth
#
bugbounty
1
 reaction
Comments
Add Comment
3 min read
The XSS Patterns Hackers Use (And How to Spot Them)
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 3
The XSS Patterns Hackers Use (And How to Spot Them)
#
security
#
bugbounty
#
webdev
#
xss
Comments
Add Comment
6 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account