Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
bugbounty
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Path traversal via alias misconfiguration in Nginx
Blue Byte
Blue Byte
Blue Byte
Follow
Jan 19 '25
Path traversal via alias misconfiguration in Nginx
#
nginx
#
hacking
#
bugbounty
#
reverseproxy
Comments
Add Comment
1 min read
Some handy notes for GCP pentesting
Bruno
Bruno
Bruno
Follow
Nov 19 '24
Some handy notes for GCP pentesting
#
security
#
infosec
#
bugbounty
Comments
Add Comment
1 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon
Genius_InTrouble
Genius_InTrouble
Genius_InTrouble
Follow
Nov 6 '24
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon
#
webdev
#
security
#
beginners
#
bugbounty
8
reactions
Comments
Add Comment
4 min read
The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques
Genius_InTrouble
Genius_InTrouble
Genius_InTrouble
Follow
Oct 29 '24
The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques
#
bugbounty
#
webdev
#
beginners
#
testing
2
reactions
Comments
Add Comment
4 min read
Bug bounty hunting with LLMs
vkili
vkili
vkili
Follow
Aug 16 '24
Bug bounty hunting with LLMs
#
bugbounty
#
security
#
ai
#
programming
43
reactions
Comments
1
comment
2 min read
Docker explained for pentesters
Grzegorz Piechnik
Grzegorz Piechnik
Grzegorz Piechnik
Follow
Nov 29 '23
Docker explained for pentesters
#
docker
#
pentesting
#
bugbounty
#
hacking
Comments
1
comment
7 min read
The Role of Bug Reporting in Software Testing: A Deep Dive
Requestly
Requestly
Requestly
Follow
Sep 25 '23
The Role of Bug Reporting in Software Testing: A Deep Dive
#
bugbounty
#
softwaretesting
#
jira
#
bugtracking
3
reactions
Comments
1
comment
5 min read
How to Get Started with Bug Bounty?
Muhammed Batuhan Aydın
Muhammed Batuhan Aydın
Muhammed Batuhan Aydın
Follow
Apr 4 '23
How to Get Started with Bug Bounty?
#
bugbounty
#
cybersecurity
#
security
#
career
3
reactions
Comments
Add Comment
6 min read
A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Nov 16 '22
A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters
#
bugbounty
#
cybersecurity
#
saml
#
infose
5
reactions
Comments
Add Comment
3 min read
A Brief Introduction to SAML Security Vector
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Nov 16 '22
A Brief Introduction to SAML Security Vector
#
saml
#
bugbounty
#
cybersecurity
#
infosec
8
reactions
Comments
Add Comment
29 min read
An Open Source apps Leads to XSS to RCE Vulnerability Flaws
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Oct 29 '22
An Open Source apps Leads to XSS to RCE Vulnerability Flaws
#
bugbounty
#
penetration
#
poc
3
reactions
Comments
Add Comment
6 min read
How To Exploit PHP Remotely To Bypass Filters & WAF Rules
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Oct 29 '22
How To Exploit PHP Remotely To Bypass Filters & WAF Rules
#
bugbounty
#
penetration
#
php
9
reactions
Comments
Add Comment
6 min read
The Various Utilization Methods of PHP Serialization & Deserialization
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Oct 29 '22
The Various Utilization Methods of PHP Serialization & Deserialization
#
bugbounty
#
penetration
#
php
6
reactions
Comments
Add Comment
22 min read
From App User to Tenant Admin
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 19 '22
From App User to Tenant Admin
#
opensource
#
hacking
#
bugbounty
#
api
1
reaction
Comments
Add Comment
3 min read
Commenting == Account Takeover
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 3 '22
Commenting == Account Takeover
#
hacking
#
security
#
bugbounty
#
lowcode
5
reactions
Comments
Add Comment
4 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account