Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
bugbounty
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
The Various Utilization Methods of PHP Serialization & Deserialization
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Oct 29 '22
The Various Utilization Methods of PHP Serialization & Deserialization
#
bugbounty
#
penetration
#
php
6
reactions
Comments
Add Comment
22 min read
From App User to Tenant Admin
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 19 '22
From App User to Tenant Admin
#
opensource
#
hacking
#
bugbounty
#
api
1
reaction
Comments
Add Comment
3 min read
Commenting == Account Takeover
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 3 '22
Commenting == Account Takeover
#
hacking
#
security
#
bugbounty
#
lowcode
5
reactions
Comments
Add Comment
4 min read
Intercept android app traffic in Burp Suite: From root to hack [ULTIMATE GUIDE for bug hunters]
Sahil Sharma
Sahil Sharma
Sahil Sharma
Follow
Jul 17 '22
Intercept android app traffic in Burp Suite: From root to hack [ULTIMATE GUIDE for bug hunters]
#
burpsuite
#
sslpinning
#
android
#
bugbounty
8
reactions
Comments
Add Comment
4 min read
Cyber Security resources
Vivek Mishra
Vivek Mishra
Vivek Mishra
Follow
Jun 19 '22
Cyber Security resources
#
oscp
#
ctf
#
bugbounty
#
cybersecurity
5
reactions
Comments
Add Comment
1 min read
Setting up reconftw
darkmage
darkmage
darkmage
Follow
May 19 '22
Setting up reconftw
#
hacking
#
infosec
#
bugbounty
#
linux
20
reactions
Comments
Add Comment
9 min read
GraphQL : The new REST?
Nathan
Nathan
Nathan
Follow
Mar 31 '22
GraphQL : The new REST?
#
bugbounty
#
security
#
apisecurity
#
blst
65
reactions
Comments
23
comments
3 min read
Bug Bounty: Not always an ideal
Nathan
Nathan
Nathan
Follow
Mar 24 '22
Bug Bounty: Not always an ideal
#
bugbounty
#
guzzi
#
security
#
blst
29
reactions
Comments
4
comments
2 min read
team up for Bug bounty Hunter
silent
silent
silent
Follow
Mar 24 '22
team up for Bug bounty Hunter
#
python
#
linux
#
cryptography
#
bugbounty
6
reactions
Comments
Add Comment
1 min read
Failling in Bugbounty's
kumaran
kumaran
kumaran
Follow
Mar 18 '22
Failling in Bugbounty's
#
bugbounty
#
cybersecurity
2
reactions
Comments
Add Comment
2 min read
Using extensions for Bug Bounty and Pentesting
Tj
Tj
Tj
Follow
Jan 23 '22
Using extensions for Bug Bounty and Pentesting
#
bugbounty
#
pentesting
#
cybersecurity
#
beginners
3
reactions
Comments
3
comments
1 min read
Intigriti 1221 - XSS Challenge Writeup
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Dec 27 '21
Intigriti 1221 - XSS Challenge Writeup
#
security
#
bugbounty
#
javascript
#
hacking
7
reactions
Comments
Add Comment
5 min read
Log4j Vulnerability Cheatsheet
Anton
Anton
Anton
Follow
Dec 14 '21
Log4j Vulnerability Cheatsheet
#
log4j
#
bugbounty
#
cybersecurity
#
java
9
reactions
Comments
Add Comment
2 min read
Intigriti 1121 - XSS Challenge Writeup
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Nov 21 '21
Intigriti 1121 - XSS Challenge Writeup
#
security
#
bugbounty
#
javascript
#
vue
7
reactions
Comments
Add Comment
10 min read
How to install nuclei in any linux ☠️
Kiran Sethumadhavan
Kiran Sethumadhavan
Kiran Sethumadhavan
Follow
Aug 3 '21
How to install nuclei in any linux ☠️
#
kalilinux
#
bugbounty
#
tools
#
ethicalhacking
17
reactions
Comments
3
comments
1 min read
Remote Code Execution on ibm.com subdomain
Khaled Nassar
Khaled Nassar
Khaled Nassar
Follow
Jun 2 '21
Remote Code Execution on ibm.com subdomain
#
security
#
rce
#
bugbounty
#
jenkins
6
reactions
Comments
2
comments
1 min read
SQL inection on gdclive.nokia.com
Khaled Nassar
Khaled Nassar
Khaled Nassar
Follow
Jun 2 '21
SQL inection on gdclive.nokia.com
#
security
#
nokia
#
bugbounty
#
sqli
3
reactions
Comments
1
comment
2 min read
Reflected XSS by jsonp on ibm.com subdomain
Khaled Nassar
Khaled Nassar
Khaled Nassar
Follow
Jun 2 '21
Reflected XSS by jsonp on ibm.com subdomain
#
security
#
jsonp
#
xss
#
bugbounty
4
reactions
Comments
Add Comment
1 min read
Blockchain security analysis layer by layer
Aits
Aits
Aits
Follow
May 6 '21
Blockchain security analysis layer by layer
#
blockchain
#
security
#
bugbounty
15
reactions
Comments
Add Comment
13 min read
QUICK TEN STEP GUIDE TO BUG HUNTING
Watiri Kambo
Watiri Kambo
Watiri Kambo
Follow
Dec 13 '20
QUICK TEN STEP GUIDE TO BUG HUNTING
#
cybersecurity
#
beginners
#
bugbounty
#
gettingstarted
17
reactions
Comments
Add Comment
3 min read
Can you use Ruby in Bug Bounty?
Khalil
Khalil
Khalil
Follow
Sep 25 '20
Can you use Ruby in Bug Bounty?
#
bugbounty
#
ruby
#
security
#
automation
5
reactions
Comments
2
comments
1 min read
Make Money as a Bug Bounty Hunter on these 9 Platforms
Denise Hilton
Denise Hilton
Denise Hilton
Follow
Sep 18 '20
Make Money as a Bug Bounty Hunter on these 9 Platforms
#
bugbounty
#
ethicalhacking
20
reactions
Comments
1
comment
2 min read
"I never sent that!" An Intro to CSRF (Updated)
DaNeil C
DaNeil C
DaNeil C
Follow
Nov 13 '19
"I never sent that!" An Intro to CSRF (Updated)
#
codenewbie
#
csrf
#
security
#
bugbounty
8
reactions
Comments
Add Comment
7 min read
Acknowledgement From Intel
Muhaddis
Muhaddis
Muhaddis
Follow
Aug 3 '20
Acknowledgement From Intel
#
security
#
bugbounty
#
bughunting
#
cybersecurity
2
reactions
Comments
Add Comment
1 min read
Acknowledgement From Microsoft
Muhaddis
Muhaddis
Muhaddis
Follow
Aug 3 '20
Acknowledgement From Microsoft
#
security
#
bugbounty
#
bughunting
#
cybersecurity
2
reactions
Comments
Add Comment
4 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account