Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
bugbounty
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
Teycir Ben Soltane
Teycir Ben Soltane
Teycir Ben Soltane
Follow
Feb 4
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
#
security
#
bugbounty
#
websecurity
#
waf
Comments
Add Comment
5 min read
Why BOLA Is #1 in OWASP API Top 10
YogSec
YogSec
YogSec
Follow
Feb 3
Why BOLA Is #1 in OWASP API Top 10
#
bugbounty
#
cybersecurity
#
bola
#
owasp
Comments
Add Comment
3 min read
Understanding APIs Beyond the Textbook: A Bug Hunterâs Perspective
YogSec
YogSec
YogSec
Follow
Feb 2
Understanding APIs Beyond the Textbook: A Bug Hunterâs Perspective
#
apisecurity
#
bugbounty
#
webdev
#
pentesting
Comments
Add Comment
2 min read
Meet ReVex: The Cyberpunk HTTP Repeater that lives in your DevTools â ď¸
Mohamed
Mohamed
Mohamed
Follow
Feb 1
Meet ReVex: The Cyberpunk HTTP Repeater that lives in your DevTools â ď¸
#
cybersecurity
#
webdev
#
bugbounty
#
programming
Comments
Add Comment
2 min read
Day 1 - Learning Bug Bounty
Arun kumar G
Arun kumar G
Arun kumar G
Follow
Jan 21
Day 1 - Learning Bug Bounty
#
bugbounty
#
cybersecurity
#
ethicalhacking
#
hacker
Comments
Add Comment
1 min read
Bug Bounty Hunting in 2026
krlz
krlz
krlz
Follow
Jan 11
Bug Bounty Hunting in 2026
#
security
#
bugbounty
#
tutorial
#
beginners
2
 reactions
Comments
Add Comment
4 min read
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it
is*hosting
is*hosting
is*hosting
Follow
Nov 18 '25
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it
#
bugbounty
#
hackerone
#
cybersecurity
#
infosec
Comments
Add Comment
3 min read
Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis
omar nasser
omar nasser
omar nasser
Follow
Nov 12 '25
Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis
#
cybersecurity
#
security
#
testing
#
bugbounty
Comments
Add Comment
1 min read
Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired
Nimesh Thakur
Nimesh Thakur
Nimesh Thakur
Follow
Dec 6 '25
Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired
#
bugbounty
#
opensource
#
node
#
infosec
5
 reactions
Comments
Add Comment
3 min read
How to Install DVWS (Damn Vulnerable Web Services) on Nginx
Zaenal Arifin
Zaenal Arifin
Zaenal Arifin
Follow
Nov 1 '25
How to Install DVWS (Damn Vulnerable Web Services) on Nginx
#
dvws
#
bugbounty
#
security
#
nginx
1
 reaction
Comments
Add Comment
5 min read
404ping v2 â The API Testing CLI That Went From Side-Project to Beast Mode đĽ
Nimesh Thakur
Nimesh Thakur
Nimesh Thakur
Follow
Nov 29 '25
404ping v2 â The API Testing CLI That Went From Side-Project to Beast Mode đĽ
#
webdev
#
opensource
#
bugbounty
#
javascript
12
 reactions
Comments
4
 comments
3 min read
Bug Bounty Hunting for GenAI
ToxSec
ToxSec
ToxSec
Follow
Oct 6 '25
Bug Bounty Hunting for GenAI
#
bugbounty
#
cybersecurity
#
infosec
#
reporting
Comments
Add Comment
8 min read
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public
BobDaHacker
BobDaHacker
BobDaHacker
Follow
Jul 31 '25
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public
#
security
#
bugbounty
#
infosec
#
webdev
5
 reactions
Comments
Add Comment
1 min read
My 100 Hour Rule for Bug Bounty !
Dev Programming
Dev Programming
Dev Programming
Follow
Aug 21 '25
My 100 Hour Rule for Bug Bounty !
#
productivity
#
bugbounty
#
programming
#
beginners
1
 reaction
Comments
Add Comment
8 min read
Is Legally Non-Compliant Behavior a Security Vulnerability?
IRORI
IRORI
IRORI
Follow
Jul 11 '25
Is Legally Non-Compliant Behavior a Security Vulnerability?
#
security
#
bugbounty
#
iso27001
#
privacy
Comments
Add Comment
2 min read
Monitor HTTP Response Headers Like a Pro: Introducing Header Change Notifier for Burp Suite
Mohamed Essam
Mohamed Essam
Mohamed Essam
Follow
Aug 9 '25
Monitor HTTP Response Headers Like a Pro: Introducing Header Change Notifier for Burp Suite
#
webdev
#
cybersecurity
#
security
#
bugbounty
Comments
Add Comment
2 min read
How to Deploy SafeLine WAF on a CyberPanel VPS
Carrie
Carrie
Carrie
Follow
Jul 4 '25
How to Deploy SafeLine WAF on a CyberPanel VPS
#
cyberpanel
#
vulnerabilities
#
bugbounty
#
waf
5
 reactions
Comments
Add Comment
2 min read
My Journey: Discovering the Relationship Between Kali Linux and Black Arch
K Dev
K Dev
K Dev
Follow
Jul 17 '25
My Journey: Discovering the Relationship Between Kali Linux and Black Arch
#
archlinux
#
kalilinux
#
hacking
#
bugbounty
7
 reactions
Comments
Add Comment
8 min read
Day 1 of My Bug Bounty Journeyâ-âStarting from Zero
Manju Varma M
Manju Varma M
Manju Varma M
Follow
Jul 15 '25
Day 1 of My Bug Bounty Journeyâ-âStarting from Zero
#
bug
#
bugbounty
#
learning
#
cybersecurity
1
 reaction
Comments
Add Comment
1 min read
đ§ Selecting the Right Bug Bounty Targets & Reconnaissance
Trumpiter
Trumpiter
Trumpiter
Follow
Jun 2 '25
đ§ Selecting the Right Bug Bounty Targets & Reconnaissance
#
bugbounty
#
security
Comments
Add Comment
24 min read
Final Tale: Part 3 - The Gateways We Left Open
Peter Davis
Peter Davis
Peter Davis
Follow
May 30 '25
Final Tale: Part 3 - The Gateways We Left Open
#
infosec
#
git
#
bitbucket
#
bugbounty
5
 reactions
Comments
Add Comment
5 min read
đ Introducing Astra v1.1 â Local, Powerful, and Now Even More Flexible
Bhawesh Chaudhary
Bhawesh Chaudhary
Bhawesh Chaudhary
Follow
May 18 '25
đ Introducing Astra v1.1 â Local, Powerful, and Now Even More Flexible
#
cybersecurity
#
astra
#
bugbounty
#
recon
Comments
Add Comment
2 min read
đ Comprehensive Bug Bounty Hunting Methodology
Trumpiter
Trumpiter
Trumpiter
Follow
Jun 2 '25
đ Comprehensive Bug Bounty Hunting Methodology
#
bugbounty
#
security
1
 reaction
Comments
Add Comment
32 min read
Git Tales: Secrets in the Shadows
Peter Davis
Peter Davis
Peter Davis
Follow
Apr 29 '25
Git Tales: Secrets in the Shadows
#
bugbounty
#
infosec
#
pentest
#
sourcecodereview
2
 reactions
Comments
Add Comment
3 min read
How I found my "First Bug" in a public bug bounty program
Blue Byte
Blue Byte
Blue Byte
Follow
Apr 18 '25
How I found my "First Bug" in a public bug bounty program
#
bugbounty
#
jwt
#
hashcat
#
firstbug
Comments
Add Comment
2 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account