thebugbountyhunter | Unsorted

Telegram-канал thebugbountyhunter - The Bug Bounty Hunter

43247

Happy hunting! thebugbountyhunter.com hello@thebugbountyhunter.com

Subscribe to a channel

The Bug Bounty Hunter

Disclosure of 7 Android and Google Pixel Vulnerabilities

https://blog.oversecured.com/Disclosure-of-7-Android-and-Google-Pixel-Vulnerabilities/

Читать полностью…

The Bug Bounty Hunter

Latest Nuclei Release v3.3.6!

https://github.com/projectdiscovery/nuclei/releases/tag/v3.3.6

Читать полностью…

The Bug Bounty Hunter

Quantifying the Value of Bug Bounty Programs: ROI, ROM, or Both?

https://www.hackerone.com/vulnerability-management/quantifying-value-bug-bounty-programs-roi-rom-or-both

Читать полностью…

The Bug Bounty Hunter

Is THIS the most underrated skill in bug bounty?

https://www.youtube.com/watch?v=X1zirlaeBd4

Читать полностью…

The Bug Bounty Hunter

From an Android Hook to RCE: $5000 Bounty
https://blog.voorivex.team/from-an-android-hook-to-rce-5000-bounty

Читать полностью…

The Bug Bounty Hunter

Buffer Overflow: Overwriting Stack Variables - "Rigged Slot Machine" [INTIGRITI 1337UP CTF 2024]

https://www.youtube.com/watch?v=ZKtRuZMqo2o

Читать полностью…

The Bug Bounty Hunter

Remediation for CVE-2024-20767 and CVE-2024-21216: Protect Yourself Against Two Recent Critical Bugs Exploitable in the Wild

https://blog.securelayer7.net/coldfusion-path-traversal-and-weblogic-unauthenticated-rce-remediation/

Читать полностью…

The Bug Bounty Hunter

Crushing FUD: Embracing Ethical Hackers to Strengthen Cybersecurity

https://www.hackerone.com/vulnerability-management/crushing-fud

Читать полностью…

The Bug Bounty Hunter

Hacking Unity Games with Cheat Engine and dnSpy - "Bug Squash (part 1)" [INTIGRITI 1337UP CTF 2024]

https://www.youtube.com/watch?v=VoT74JOGWgA

Читать полностью…

The Bug Bounty Hunter

Research Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeovers - Laburity

https://laburity.com/research-npm-account-takeovers/

Читать полностью…

The Bug Bounty Hunter

Exploring the DOMPurify library: Bypasses and Fixes. Tags:Article - Article - Web - mXSS

https://mizu.re/post/exploring-the-dompurify-library-bypasses-and-fixes

Читать полностью…

The Bug Bounty Hunter

How I hacked 100 hackers

corneacristian/how-i-hacked-100-hackers-5c3c313e8a1a" rel="nofollow">https://medium.com/@corneacristian/how-i-hacked-100-hackers-5c3c313e8a1a

Читать полностью…

The Bug Bounty Hunter

These Two Tools Helped Me Earn $40K in Bounties

alwalxed/these-two-tools-helped-me-earn-40k-in-bounties-8c688b9deccd" rel="nofollow">https://medium.com/@alwalxed/these-two-tools-helped-me-earn-40k-in-bounties-8c688b9deccd

Читать полностью…

The Bug Bounty Hunter

Retrofitting spatial safety to hundreds of millions of lines of C++

http://security.googleblog.com/2024/11/retrofitting-spatial-safety-to-hundreds.html

Читать полностью…

The Bug Bounty Hunter

A beginner's roadmap for playing CTFs: 10 practical tips for beginners

https://blog.intigriti.com/hacking-tools/a-beginner-s-roadmap-for-playing-ctfs-10-practical-tips-for-beginners

Читать полностью…

The Bug Bounty Hunter

Wormable XSS www.bing.com

pedbap/wormable-xss-www-bing-com-7d7cb52e7a12" rel="nofollow">https://medium.com/@pedbap/wormable-xss-www-bing-com-7d7cb52e7a12

Читать полностью…

The Bug Bounty Hunter

The cyber threat landscape part 2: Threat actors and their motivations

https://blog.intigriti.com/business-insights/the-cyber-threat-landscape-part-2-threat-actors-and-their-motivations

Читать полностью…

The Bug Bounty Hunter

The $2,200 ATO Most Bug Hunters Overlooked by Closing Intruder Too Soon

mokhansec/the-2-200-ato-most-bug-hunters-overlooked-by-closing-intruder-too-soon-505f21d56732" rel="nofollow">https://medium.com/@mokhansec/the-2-200-ato-most-bug-hunters-overlooked-by-closing-intruder-too-soon-505f21d56732

Читать полностью…

The Bug Bounty Hunter

Bypass Email Verification in Mozilla

0d-amr/bypass-email-verification-in-mozilla-2ab45ac36c42" rel="nofollow">https://medium.com/@0d-amr/bypass-email-verification-in-mozilla-2ab45ac36c42

Читать полностью…

The Bug Bounty Hunter

YesWeHack Hunter Interviews - #11 Pwnii: “Don't forget that a duplicate bug is a valid bug”

https://www.youtube.com/watch?v=cYHqLMgdzAk

Читать полностью…

The Bug Bounty Hunter

Leveling Up Fuzzing: Finding more vulnerabilities with AI

http://security.googleblog.com/2024/11/leveling-up-fuzzing-finding-more.html

Читать полностью…

The Bug Bounty Hunter

Fortune 1000 at risk: How we discovered 100k vulnerabilities

https://escape.tech/blog/fortune-1000-at-risk-30k-exposed-apis-100k-vulnerabilities/

Читать полностью…

The Bug Bounty Hunter

263 - FortiJump Higher, Pishi, and Breaking Control Flow Flattening

https://dayzerosec.com/podcast/263.html

Читать полностью…

The Bug Bounty Hunter

5 Lessons That Made Me $1M Since 2022

https://www.youtube.com/watch?v=AR_FbrSy5hc

Читать полностью…

The Bug Bounty Hunter

HackerOne’s Commitment to Learning and Development

https://www.hackerone.com/culture-and-talent/hackerones-commitment-learning-and-development

Читать полностью…

The Bug Bounty Hunter

AWS Pentesting: IAM Privilege Escalation via Rollback Policy

https://rodelllemit.medium.com/aws-pentesting-iam-privilege-escalation-via-rollback-policy-62bc8ba6be51

Читать полностью…

The Bug Bounty Hunter

Sensitive Data Exposure in a Moodle Config File

mrcix/sensitive-data-exposure-in-a-moodle-config-file-648ca3d54676" rel="nofollow">https://medium.com/@mrcix/sensitive-data-exposure-in-a-moodle-config-file-648ca3d54676

Читать полностью…

The Bug Bounty Hunter

Intigriti CTF 2024 - 1337 UP - Live Hacking Talks [5f336e6a30795f]

https://www.youtube.com/watch?v=BKXfrNwrcqQ

Читать полностью…

The Bug Bounty Hunter

Unpatched Remote Code Execution in Gogs

https://fysac.github.io/posts/2024/11/unpatched-remote-code-execution-in-gogs/

Читать полностью…

The Bug Bounty Hunter

Pentesting for iOS Mobile Applications

https://www.hackerone.com/penetration-testing/ios-mobile-applications

Читать полностью…
Subscribe to a channel