Talk and help about bugbounty
Yeah
Dig deeper and know what the key is used for...
And am seein it for first time. I havent seen a report or writeup on it
Читать полностью…You cant be sure
i had found /.well-known/jwks sometime last year... where the private key for a jwk with HS256 algorithm was exposed...
i could sign tokens and impersonate any user
Anybody know good resource where i can find all ip ranges that belong to specific company?
Читать полностью…Can cyber security be done with a gaming laptop?
Читать полностью…try it. create /tmp/h4k , and do a hard symlink?
Читать полностью…Goldman Sachs is eligible for bounty with 50 in-scope (sub)domains. That's not big scope.
Читать полностью…Well they asked for more information about the vulnerability
Читать полностью…report it
the worst that could happen is that it gets closed as informative
hey peeps I found a url for .well-known/apple-developer-merchantid-domain-association ? idk if it's a bug or not as it disclosed a key
Читать полностью…https://youtu.be/rdY5vH-7vxE?si=hTnAf70M7_UGMbHs
Bug bounty pocs
RUBEN VARDANYAN HƏBS EDİLDİ TƏCİLİ BU KANALDA @azecyberforces
Читать полностью…what is internet explorer++?
I didn't buy xss survival course still.
I want that course. (Now for free)
Anyone did the xss rat's course 'xss survivor'? Should I buy it?
Читать полностью…I found a system process which deletes a directory controlled by an unprivileged user, can this be exploited using symlink ?
Читать полностью…Hi , what are the public programms have a big scope ?
IBM AND AT&T a lot of hackers scan it