Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
bugbounty
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How I found my "First Bug" in a public bug bounty program
Blue Byte
Blue Byte
Blue Byte
Follow
Apr 18 '25
How I found my "First Bug" in a public bug bounty program
#
bugbounty
#
jwt
#
hashcat
#
firstbug
Comments
Add Comment
2 min read
Web Cache Deception Attacks
Blue Byte
Blue Byte
Blue Byte
Follow
May 9 '25
Web Cache Deception Attacks
#
hacking
#
pentest
#
bugbounty
#
cybersecurity
Comments
Add Comment
2 min read
Git Tales: Part 2 - Demons in the Cloud
Peter Davis
Peter Davis
Peter Davis
Follow
May 9 '25
Git Tales: Part 2 - Demons in the Cloud
#
bugbounty
#
infosec
#
cloudsecurity
#
pentest
3
reactions
Comments
Add Comment
5 min read
Credential Dumping Applications: What They Are, How They Work, and How to Defend Against Them
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Jun 5 '25
Credential Dumping Applications: What They Are, How They Work, and How to Defend Against Them
#
cybersecurity
#
security
#
bugbounty
5
reactions
Comments
2
comments
1 min read
(Ⅱ) Android Identity Authentication
TECNO Security
TECNO Security
TECNO Security
Follow
Mar 26 '25
(Ⅱ) Android Identity Authentication
#
security
#
cybersecurity
#
bugbounty
#
development
Comments
Add Comment
2 min read
How to Use Burp Suite for Bug Bounty Hunting: A Beginner-Friendly Guide
Sampa Kundu
Sampa Kundu
Sampa Kundu
Follow
Apr 22 '25
How to Use Burp Suite for Bug Bounty Hunting: A Beginner-Friendly Guide
#
burpsuite
#
bugbounty
#
cybersecurity
Comments
Add Comment
1 min read
Bug Bounty 2025: The Unfiltered Roadmap to Hunting Success
linuxmobile ( リナックス )
linuxmobile ( リナックス )
linuxmobile ( リナックス )
Follow
Mar 30 '25
Bug Bounty 2025: The Unfiltered Roadmap to Hunting Success
#
programming
#
bountyhunter
#
bugbounty
#
webdev
8
reactions
Comments
1
comment
17 min read
Next.js Middleware Broken Access Controls
Blue Byte
Blue Byte
Blue Byte
Follow
Mar 27 '25
Next.js Middleware Broken Access Controls
#
nextjs
#
bugbounty
#
pentest
#
hacking
1
reaction
Comments
Add Comment
1 min read
Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover
Blue Byte
Blue Byte
Blue Byte
Follow
Feb 17 '25
Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover
#
aws
#
cognito
#
cloud
#
bugbounty
Comments
Add Comment
2 min read
AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks
Aditya Tripathi
Aditya Tripathi
Aditya Tripathi
Follow
Feb 1 '25
AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks
#
cybersecurity
#
ransomware
#
ethicalhacking
#
bugbounty
Comments
Add Comment
4 min read
2FA Bypass via Response Manipulation
Blue Byte
Blue Byte
Blue Byte
Follow
Feb 24 '25
2FA Bypass via Response Manipulation
#
bugbounty
#
pentest
#
2fa
#
mfa
1
reaction
Comments
Add Comment
1 min read
Comprehensive CEH v13 Study Guide
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Feb 23 '25
Comprehensive CEH v13 Study Guide
#
cybersecurity
#
bugbounty
7
reactions
Comments
Add Comment
4 min read
25000$ IDOR: How a Simple ID Enumeration Exposed Private Data
Karthikeyan Nagaraj
Karthikeyan Nagaraj
Karthikeyan Nagaraj
Follow
Feb 22 '25
25000$ IDOR: How a Simple ID Enumeration Exposed Private Data
#
webdev
#
bugbounty
#
cybersecurity
1
reaction
Comments
Add Comment
1 min read
Top 7 Payloads lists Every Bug Bounty Hunter Need To Know
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Feb 18 '25
Top 7 Payloads lists Every Bug Bounty Hunter Need To Know
#
bugbounty
#
cybersecurity
6
reactions
Comments
Add Comment
3 min read
Easy RCE with LaTeX via file upload
Blue Byte
Blue Byte
Blue Byte
Follow
Feb 13 '25
Easy RCE with LaTeX via file upload
#
bugbounty
#
latex
#
rce
#
swagger
Comments
Add Comment
2 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account