DEV Community

# bugbounty

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
2FA Bypass via Response Manipulation

2FA Bypass via Response Manipulation

1
Comments
1 min read
Comprehensive CEH v13 Study Guide

Comprehensive CEH v13 Study Guide

7
Comments
4 min read
25000$ IDOR: How a Simple ID Enumeration Exposed Private Data

25000$ IDOR: How a Simple ID Enumeration Exposed Private Data

1
Comments
1 min read
Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

6
Comments
3 min read
Easy RCE with LaTeX via file upload

Easy RCE with LaTeX via file upload

Comments
2 min read
Path traversal via alias misconfiguration in Nginx

Path traversal via alias misconfiguration in Nginx

Comments
1 min read
Some handy notes for GCP pentesting

Some handy notes for GCP pentesting

Comments
1 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

8
Comments
4 min read
The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques

The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques

2
Comments
4 min read
Bug bounty hunting with LLMs

Bug bounty hunting with LLMs

43
Comments 1
2 min read
Docker explained for pentesters

Docker explained for pentesters

Comments 1
7 min read
Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers

Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers

1
Comments
2 min read
The Role of Bug Reporting in Software Testing: A Deep Dive

The Role of Bug Reporting in Software Testing: A Deep Dive

3
Comments 1
5 min read
How to Get Started with Bug Bounty?

How to Get Started with Bug Bounty?

3
Comments
6 min read
A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters

A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters

5
Comments
3 min read
A Brief Introduction to SAML Security Vector

A Brief Introduction to SAML Security Vector

8
Comments
29 min read
An Open Source apps Leads to XSS to RCE Vulnerability Flaws

An Open Source apps Leads to XSS to RCE Vulnerability Flaws

3
Comments
6 min read
How To Exploit PHP Remotely To Bypass Filters & WAF Rules

How To Exploit PHP Remotely To Bypass Filters & WAF Rules

6
Comments
6 min read
The Various Utilization Methods of PHP Serialization & Deserialization

The Various Utilization Methods of PHP Serialization & Deserialization

6
Comments
22 min read
From App User to Tenant Admin

From App User to Tenant Admin

1
Comments
3 min read
Commenting == Account Takeover

Commenting == Account Takeover

5
Comments
4 min read
Intercept android app traffic in Burp Suite: From root to hack [ULTIMATE GUIDE for bug hunters]

Intercept android app traffic in Burp Suite: From root to hack [ULTIMATE GUIDE for bug hunters]

9
Comments
4 min read
Cyber Security resources

Cyber Security resources

5
Comments
1 min read
Setting up reconftw

Setting up reconftw

21
Comments
9 min read
GraphQL : The new REST?

GraphQL : The new REST?

65
Comments 23
3 min read
loading...