thebugbountyhunter | Unsorted

Telegram-канал thebugbountyhunter - The Bug Bounty Hunter

43247

Happy hunting! thebugbountyhunter.com hello@thebugbountyhunter.com

Subscribe to a channel

The Bug Bounty Hunter

Bounty Security Releases GBounty: Our Web Scanning Tools Are Now Open Source

https://bountysecurity.ai/blogs/news/bounty-security-releases-gbounty-our-web-scanning-tools-are-now-open-source

Читать полностью…

The Bug Bounty Hunter

Pixel's Proactive Approach to Security: Addressing Vulnerabilities in Cellular Modems

http://security.googleblog.com/2024/10/pixel-proactive-security-cellular-modems.html

Читать полностью…

The Bug Bounty Hunter

Exploiting Visual Studio via dump files - CVE-2024-30052

https://ynwarcs.github.io/exploiting-vs-dump-files

Читать полностью…

The Bug Bounty Hunter

Evaluating Mitigations & Vulnerabilities in Chrome

http://security.googleblog.com/2024/10/evaluating-mitigations-vulnerabilities.html

Читать полностью…

The Bug Bounty Hunter

How to dump /etc/passwd with "%3F" 🤯

https://www.youtube.com/watch?v=Z9B5mCHJ6hw

Читать полностью…

The Bug Bounty Hunter

Class Pollution in Ruby: A Deep Dive into Exploiting Recursive Merges · Doyensec's Blog



https://blog.doyensec.com/2024/10/02/class-pollution-ruby.html

Читать полностью…

The Bug Bounty Hunter

My theory on how the webp 0day was discovered (BLASTPASS)

https://www.youtube.com/watch?v=_ACCK0AUQ8Q

Читать полностью…

The Bug Bounty Hunter

Streamline Report Management with Custom Inboxes: Reducing Delays and Security Risks

https://www.hackerone.com/vulnerability-management/custom-inbox-enhancements

Читать полностью…

The Bug Bounty Hunter

Eliminating Memory Safety Vulnerabilities at the Source

http://security.googleblog.com/2024/09/eliminating-memory-safety-vulnerabilities-Android.html

Читать полностью…

The Bug Bounty Hunter

September 2024 Newsletter

https://blog.projectdiscovery.io/september-2024-newsletter/

Читать полностью…

The Bug Bounty Hunter

Hacking Websites With A Zip File (Zip Slip)

https://www.youtube.com/watch?v=4sKlbMiGWAw

Читать полностью…

The Bug Bounty Hunter

XSS + OAuth Misconfigs = Token Theft and ATO

7odamoo/xss-oauth-misconfigs-token-theft-and-ato-d0837c44cd31" rel="nofollow">https://medium.com/@7odamoo/xss-oauth-misconfigs-token-theft-and-ato-d0837c44cd31

Читать полностью…

The Bug Bounty Hunter

Spot an exploit, stop the attacker, secure the assets. TL;DR: It works! - Bitfinding - Blockchain Offensive Security For The Good

https://bitfinding.com/blog/54k-rescue-on-arbitrum-network

Читать полностью…

The Bug Bounty Hunter

Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 3)

https://www.ambionics.io/blog/iconv-cve-2024-2961-p3

Читать полностью…

The Bug Bounty Hunter

Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)

https://www.ambionics.io/blog/iconv-cve-2024-2961-p1

Читать полностью…

The Bug Bounty Hunter

Bounty Security Releases GBounty: Our Web Scanning Tools Are Now Open Source

https://bountysecurity.ai/blogs/news/bounty-security-releases-gbounty-our-web-scanning-tools-are-now-open-source

Читать полностью…

The Bug Bounty Hunter

Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409)

https://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass/

Читать полностью…

The Bug Bounty Hunter

Hack My Career: Meet Naz Bozdemir

https://www.hackerone.com/culture-and-talent/hack-my-career-meet-naz-bozdemir

Читать полностью…

The Bug Bounty Hunter

Pwning LLaMA.cpp RPC Server

https://pwner.gg/2024/10/03/llama-cpp-cves/

Читать полностью…

The Bug Bounty Hunter

Reverse Engineering and Dismantling Kekz Headphones

https://nv1t.github.io/blog/kekz-headphones/

Читать полностью…

The Bug Bounty Hunter

GitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty

https://github.com/RevoltSecurities/Subdominator

Читать полностью…

The Bug Bounty Hunter

HTTP Parameter Pollution in 2024 !

0xAwali/http-parameter-pollution-in-2024-32ec1b810f89" rel="nofollow">https://medium.com/@0xAwali/http-parameter-pollution-in-2024-32ec1b810f89

Читать полностью…

The Bug Bounty Hunter

PentesterLab Blog: Hiring Your First AppSec Engineer: The Technical Interview

https://pentesterlab.com/blog/technical-interview-for-your-first-appsec-engineer

Читать полностью…

The Bug Bounty Hunter

257 - Attack of the CUPS and Exploiting Web Views via HSTS

https://dayzerosec.com/podcast/257.html

Читать полностью…

The Bug Bounty Hunter

Zimbra - Remote Command Execution (CVE-2024-45519)

https://blog.projectdiscovery.io/zimbra-remote-code-execution/

Читать полностью…

The Bug Bounty Hunter

Announcing Pioneers, ProjectDiscovery's Ambassador Program

https://blog.projectdiscovery.io/announcing-pioneers-projectdiscoverys-ambassador-program/

Читать полностью…

The Bug Bounty Hunter

GitHub - saw-your-packet/CloudShovel: A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs.

https://github.com/saw-your-packet/CloudShovel

Читать полностью…

The Bug Bounty Hunter

Finding classes for exploiting Unsafe Reflection / Unchecked Class Instantiation vulnerabilities in Java with Joern

https://blog.convisoappsec.com/en/finding-classes-to-exploit-insecure-unchecked-vulnerabilities-in-java-with-joern/

Читать полностью…

The Bug Bounty Hunter

Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 2)

https://www.ambionics.io/blog/iconv-cve-2024-2961-p2

Читать полностью…

The Bug Bounty Hunter

How HackerOne Organizes a Remote Hack Week

https://www.hackerone.com/culture-and-talent/how-hackerone-organizes-remote-hack-week

Читать полностью…
Subscribe to a channel