thebugbountyhunter | Unsorted

Telegram-канал thebugbountyhunter - The Bug Bounty Hunter

43962

Happy hunting! thebugbountyhunter.com hello@thebugbountyhunter.com

Subscribe to a channel

The Bug Bounty Hunter

We hardened zizmor

https://blog.trailofbits.com/2026/05/22/we-hardened-zizmors-github-actions-static-analyzer/

Читать полностью…

The Bug Bounty Hunter

Red-Teaming Cloud Infrastructure with Neo — ProjectDiscovery Blog

https://projectdiscovery.io/blog/red-teaming-cloud-infrastructure-with-neo

Читать полностью…

The Bug Bounty Hunter

Reverse engineering Android malware with Claude Code
https://zanestjohn.com/blog/reing-with-claude-code

Читать полностью…

The Bug Bounty Hunter

Hi! I’m a former H1 Triager - AMA!

https://www.reddit.com/r/bugbounty/comments/1tes86p/hi_im_a_former_h1_triager_ama/

Читать полностью…

The Bug Bounty Hunter

CEO insights: beyond the AI model card

https://www.intigriti.com/blog/business-insights/ceo-insights-beyond-the-ai-model-card

Читать полностью…

The Bug Bounty Hunter

Android Zero‑Click RCE via Wireless Debugging (CVE‑2026‑0073) + demos
Blog: https://www.mobile-hacker.com/2026/05/12/android-rce-via-wireless-debugging-from-network-access-to-shell/
Video: https://youtu.be/ihEIr0wWklk

Читать полностью…

The Bug Bounty Hunter

Nuclei Templates - April 2026 — ProjectDiscovery Blog

https://projectdiscovery.io/blog/nuclei-templates-april-2026

Читать полностью…

The Bug Bounty Hunter

RCE in VSCode Copilot Chat

https://www.hacktron.ai/blog/rce-in-vscode-copilot

Читать полностью…

The Bug Bounty Hunter

NIS2 compliance beyond the April 2026 deadline

https://www.intigriti.com/blog/business-insights/nis2-compliance-beyond-the-april-2026-deadline

Читать полностью…

The Bug Bounty Hunter

New Android interception tool for component communication (IPC) mapping called #noxen for pentesters and bug bounty hunters
Test: https://youtube.com/shorts/JitFuNRCOJ8
Download: https://github.com/frankheat/noxen

Читать полностью…

The Bug Bounty Hunter

CEO insights: holding the human layer sacred in the AI era

https://www.intigriti.com/blog/business-insights/ceo-insights-holding-the-human-layer-sacred-in-the-ai-era

Читать полностью…

The Bug Bounty Hunter

C/C++ checklist challenges, solved

https://blog.trailofbits.com/2026/05/05/c/c-checklist-challenges-solved/

Читать полностью…

The Bug Bounty Hunter

$170k in Bypasses: The Vercel React2Shell Challenge

https://www.hacktron.ai/blog/react2shell-vercel-waf-bypass

Читать полностью…

The Bug Bounty Hunter

ImagePanick: From SVG to RCE Chaining Weak Policies and Bugs in ImageMagick and Ghostscript

https://blog.deephacking.tech/en/posts/imagepanick-from-svg-to-rce-imagemagick-ghostscript/

Читать полностью…

The Bug Bounty Hunter

Exploiting SQL injection vulnerabilities

https://www.intigriti.com/researchers/blog/hacking-tools/exploiting-sql-injection-sqli-vulnerabilities

Читать полностью…

The Bug Bounty Hunter

How Triage Assist is raising the bar in crowdsourced security

https://www.intigriti.com/blog/product-updates/how-triage-assist-is-raising-the-bar-in-crowdsourced-security

Читать полностью…

The Bug Bounty Hunter

npx Used Confusion and It’s Super Effective

https://www.landh.tech//blog/20260521-npx-used-confusion-and-its-super-effective

Читать полностью…

The Bug Bounty Hunter

When Filenames Become Attack Surfaces: Weaponizing NASA's CFITSIO Extended Filename Syntax · Doyensec's Blog

https://blog.doyensec.com/2026/05/19/cfitsio-weaponized-filenames.html

Читать полностью…

The Bug Bounty Hunter

The down fall of bug bounties

https://shubs.io/the-down-fall-of-bug-bounties/

Читать полностью…

The Bug Bounty Hunter

First public macOS kernel memory corruption exploit on Apple M5

https://blog.calif.io/p/first-public-kernel-memory-corruption

Читать полностью…

The Bug Bounty Hunter

The beast needs a cage: What's next for AppSec post-Mythos

https://portswigger.net/blog/the-beast-needs-a-cage-whats-next-for-appsec-post-mythos

Читать полностью…

The Bug Bounty Hunter

Dead.Letter (CVE-2026-45185) How XBOW Found an Unauthenticated RCE on Exim

https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim

Читать полностью…

The Bug Bounty Hunter

Go fuzzing was missing half the toolkit. We forked the toolchain to fix it.

https://blog.trailofbits.com/2026/05/12/go-fuzzing-was-missing-half-the-toolkit.-we-forked-the-toolchain-to-fix-it./

Читать полностью…

The Bug Bounty Hunter

Oh MyAudi!
https://decoder.cloud/2026/05/08/oh-myaudi/

Читать полностью…

The Bug Bounty Hunter

Jenny was a Friend of Mine - MCPs and Friends
Alt title: Bullying LLMs into submission to find 0days at scale

https://blog.zsec.uk/bullyingllms/

Читать полностью…

The Bug Bounty Hunter

The AI impact. A triager's perspective

https://www.intigriti.com/blog/business-insights/the-ai-impact-a-triagers-perspective

Читать полностью…

The Bug Bounty Hunter

The Danger of Multi-SSO AWS Cognito User Pools · Doyensec's Blog

https://blog.doyensec.com/2026/05/05/cloudsectidbits-masso-cognito-sso.html

Читать полностью…

The Bug Bounty Hunter

Release v3.8.0 · projectdiscovery/nuclei

https://github.com/projectdiscovery/nuclei/releases/tag/v3.8.0

Читать полностью…

The Bug Bounty Hunter

3 ways custom scan checks turn practitioner knowledge into scalable automation

https://portswigger.net/blog/3-ways-custom-scan-checks-turn-practitioner-knowledge-into-scalable-automation

Читать полностью…

The Bug Bounty Hunter

Claude Security is now in public beta

https://claude.com/product/claude-security#public-beta

Читать полностью…
Subscribe to a channel