thebugbountyhunter | Unsorted

Telegram-канал thebugbountyhunter - The Bug Bounty Hunter

43961

Happy hunting! thebugbountyhunter.com hello@thebugbountyhunter.com

Subscribe to a channel

The Bug Bounty Hunter

Getting Started with Exploit Development

https://dayzerosec.com/blog/2024/07/11/getting-started-2024.html

Читать полностью…

The Bug Bounty Hunter

A Race to the Bottom - Database Transactions Undermining Your AppSec · Doyensec's Blog



https://blog.doyensec.com/2024/07/11/database-race-conditions.html

Читать полностью…

The Bug Bounty Hunter

How a Single Vulnerability Can Bring Down the JavaScript Ecosystem - Lupin & Holmes

https://www.landh.tech/blog/20240603-npm-cache-poisoning/

Читать полностью…

The Bug Bounty Hunter

Enhancing Asset Discovery: ProjectDiscovery Cloud Platform v0.8.8

https://blog.projectdiscovery.io/pdcp-0-8-8/

Читать полностью…

The Bug Bounty Hunter

Live Recon: Hacking With STOK

https://www.youtube.com/watch?v=-U1yTtCsnZY

Читать полностью…

The Bug Bounty Hunter

HackerOne Company Values Matter: Win as a Team

https://www.hackerone.com/culture-and-talent/hackerone-company-values-matter-win-team

Читать полностью…

The Bug Bounty Hunter

Live Recon: Hacking Tinder's Bug Bounty Program (with @Rhynorater)

https://www.youtube.com/watch?v=IWIchfPJUGo

Читать полностью…

The Bug Bounty Hunter

Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough | Oligo Security

https://www.oligo.security/blog/shelltorch-explained-multiple-vulnerabilities-in-pytorch-model-server

Читать полностью…

The Bug Bounty Hunter

Why I Keep a Brag Document — and How It Can Help You

https://www.hackerone.com/engineering/brag-document

Читать полностью…

The Bug Bounty Hunter

Just a moment...

gguzelkokar.mdbf15/from-long-term-hacking-to-instant-rewards-finding-sqli-in-3-minutes-worth-3125-ac36c6e950bf" rel="nofollow">https://medium.com/@gguzelkokar.mdbf15/from-long-term-hacking-to-instant-rewards-finding-sqli-in-3-minutes-worth-3125-ac36c6e950bf

Читать полностью…

The Bug Bounty Hunter

*Rerun* of The OG Bug Bounty King - Frans Rosen (Ep. 75)

https://www.youtube.com/watch?v=Idx2Fy2GTjE

Читать полностью…

The Bug Bounty Hunter

Just a moment...

kf106/the-problem-with-bug-bounties-0c5d956411d8" rel="nofollow">https://medium.com/@kf106/the-problem-with-bug-bounties-0c5d956411d8

Читать полностью…

The Bug Bounty Hunter

Hello community! 👋

🚀 We are creating something new. We are looking for a full-stack or backend developer to join the team.

💎We want you to be the technical person of the team, able to develop the new ideas and integrations we need.

Currently, we don't have a big budget. We offer to be part of the team and share the profits.

📧 More info DM or hello@thebugbountyhunter.com

Thank you!

Читать полностью…

The Bug Bounty Hunter

On Listening

https://www.hackerone.com/engineering/on-listening

Читать полностью…

The Bug Bounty Hunter

Exploiting Client-Side Path Traversal to Perform Cross-Site Request Forgery - Introducing CSPT2CSRF · Doyensec's Blog



https://blog.doyensec.com/2024/07/02/cspt2csrf.html

Читать полностью…

The Bug Bounty Hunter

NPX Package Manager Confusion with Lupin!

https://www.youtube.com/watch?v=uUcSCA2q9OA

Читать полностью…

The Bug Bounty Hunter

[For beginners] Introduction to Android Pentesting
https://owlhacku.com/introduction-to-android-pentesting/

Читать полностью…

The Bug Bounty Hunter

Chaining Three Bugs to Access All Your ServiceNow Data

https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data

Читать полностью…

The Bug Bounty Hunter

plORMbing your Prisma ORM with Time-based Attacks

https://www.elttam.com/blog/plorming-your-primsa-orm/

Читать полностью…

The Bug Bounty Hunter

Fickle PDFs: exploiting browser rendering discrepancies

https://portswigger.net/research/fickle-pdfs-exploiting-browser-rendering-discrepancies

Читать полностью…

The Bug Bounty Hunter

Pwn2Own: WAN-to-LAN Exploit Showcase

https://claroty.com/team82/research/pwn2own-wan-to-lan-exploit-showcase

Читать полностью…

The Bug Bounty Hunter

GitHub - PhonePe/mantis: Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.

https://github.com/PhonePe/mantis

Читать полностью…

The Bug Bounty Hunter

Live Recon: Hacking Dell's Bug Bounty Program

https://www.youtube.com/watch?v=9mdLNRD0IEI

Читать полностью…

The Bug Bounty Hunter

Just a moment...

zack0x01_/how-ive-found-idor-xss-all-users-account-takeover-a49d59cf5108" rel="nofollow">https://medium.com/@zack0x01_/how-ive-found-idor-xss-all-users-account-takeover-a49d59cf5108

Читать полностью…

The Bug Bounty Hunter

I Suggest You Take a Nap

https://www.hackerone.com/engineering/take-a-nap

Читать полностью…

The Bug Bounty Hunter

Cross Site Scripting in TCL website

https://pankajupadhyay.in/2024/07/04/addressing-xss-vulnerabilities-a-case-study-with-tcl/

Читать полностью…

The Bug Bounty Hunter

Hunting Bugs for RE Hunter 350 worth $2850


https://vijetareigns.medium.com/hunting-bugs-for-re-hunter-350-81338c4ebf20

Читать полностью…

The Bug Bounty Hunter

A hacking hat-trick: previewing three PortSwigger Research publications coming to DEF CON & Black Hat USA

https://portswigger.net/research/a-hacking-hat-trick-previewing-three-portswigger-research-publications-coming-to-def-con-amp-black-hat-usa

Читать полностью…

The Bug Bounty Hunter

June 2024 Newsletter

https://blog.projectdiscovery.io/newsletter-june-2024/

Читать полностью…

The Bug Bounty Hunter

You can’t always win racing the (key)cloak

https://www.cyberark.com/resources/threat-research-blog/you-cant-always-win-racing-the-keycloak

Читать полностью…
Subscribe to a channel