Talk and help about bugbounty
Assume i have a bug in a program and it is on multi subdomains and also other domains which all in Scope
Читать полностью…Really coz this name was put like 3 year back havent changed it lol
Читать полностью…Well they asked for more information about the vulnerability
Читать полностью…report it
the worst that could happen is that it gets closed as informative
hey peeps I found a url for .well-known/apple-developer-merchantid-domain-association ? idk if it's a bug or not as it disclosed a key
Читать полностью…https://youtu.be/rdY5vH-7vxE?si=hTnAf70M7_UGMbHs
Bug bounty pocs
RUBEN VARDANYAN HƏBS EDİLDİ TƏCİLİ BU KANALDA @azecyberforces
Читать полностью…what is internet explorer++?
I didn't buy xss survival course still.
I want that course. (Now for free)
Anyone did the xss rat's course 'xss survivor'? Should I buy it?
Читать полностью…this is p4 bug. i dont know if bugcrowd accept this type of bug😅
Читать полностью…Yea sure lemme try coz I have jeard its been used for apple payment or smthn
Читать полностью…Yeah
Dig deeper and know what the key is used for...
And am seein it for first time. I havent seen a report or writeup on it
Читать полностью…You cant be sure
i had found /.well-known/jwks sometime last year... where the private key for a jwk with HS256 algorithm was exposed...
i could sign tokens and impersonate any user
Anybody know good resource where i can find all ip ranges that belong to specific company?
Читать полностью…Can cyber security be done with a gaming laptop?
Читать полностью…try it. create /tmp/h4k , and do a hard symlink?
Читать полностью…