Forem

# bugbounty

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Use Burp Suite for Bug Bounty Hunting: A Beginner-Friendly Guide

How to Use Burp Suite for Bug Bounty Hunting: A Beginner-Friendly Guide

Comments
1 min read
Alibaba Cloud OOS Misconfiguration: File Upload via HTTP PUT

Alibaba Cloud OOS Misconfiguration: File Upload via HTTP PUT

Comments
1 min read
How I found my "First Bug" in a public bug bounty program

How I found my "First Bug" in a public bug bounty program

Comments
2 min read
Bug Bounty 2025: The Unfiltered Roadmap to Hunting Success

Bug Bounty 2025: The Unfiltered Roadmap to Hunting Success

Comments
17 min read
Next.js Middleware Broken Access Controls

Next.js Middleware Broken Access Controls

Comments
1 min read
Server-Side Template Injection in Go

Server-Side Template Injection in Go

Comments
1 min read
(Ⅱ) Android Identity Authentication

(Ⅱ) Android Identity Authentication

Comments
2 min read
2FA Bypass via Response Manipulation

2FA Bypass via Response Manipulation

Comments
1 min read
25000$ IDOR: How a Simple ID Enumeration Exposed Private Data

25000$ IDOR: How a Simple ID Enumeration Exposed Private Data

Comments
1 min read
【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

Comments
1 min read
Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param

Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param

Comments
1 min read
Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover

Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover

Comments
2 min read
AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks

AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks

Comments
4 min read
Comprehensive CEH v13 Study Guide

Comprehensive CEH v13 Study Guide

6
Comments
4 min read
Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

6
Comments
3 min read
Easy RCE with LaTeX via file upload

Easy RCE with LaTeX via file upload

Comments
2 min read
Starting Again

Starting Again

Comments
1 min read
Path traversal via alias misconfiguration in Nginx

Path traversal via alias misconfiguration in Nginx

Comments
1 min read
Some handy notes for GCP pentesting

Some handy notes for GCP pentesting

Comments
1 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

6
Comments
4 min read
The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques

The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques

2
Comments
4 min read
Bug bounty hunting with LLMs

Bug bounty hunting with LLMs

40
Comments 1
2 min read
Docker explained for pentesters

Docker explained for pentesters

Comments 1
7 min read
Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers

Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers

1
Comments
2 min read
The Role of Bug Reporting in Software Testing: A Deep Dive

The Role of Bug Reporting in Software Testing: A Deep Dive

3
Comments 1
5 min read
loading...