thebugbountyhunter | Unsorted

Telegram-канал thebugbountyhunter - The Bug Bounty Hunter

43247

Happy hunting! thebugbountyhunter.com hello@thebugbountyhunter.com

Subscribe to a channel

The Bug Bounty Hunter

260 - Hardwear.IO NL, DEF CON 32, and Filesystem Exploitation

https://dayzerosec.com/podcast/260.html

Читать полностью…

The Bug Bounty Hunter

Hello everyone,

I’m looking for a talented individual with full-stack expertise to join our team. Currently, I only have the frontend developed, so this role will be essential for leading the technical aspects of our project.

I'm building a new community and need someone who’s passionate about creating something impactful from the ground up. We'll work closely as a team, and we can discuss the benefits of this collaboration.

“If you want to go fast, go alone; if you want to go far, go together.”

As always, we’re open to hearing from advisors, business angels, or companies interested in collaborating with us.

Looking forward to connecting!

hello@thebugbountyhunter.com
#bugbounty #community #fullstack #startups #business

Читать полностью…

The Bug Bounty Hunter

Anatomy of an LLM RCE

https://www.cyberark.com/resources/threat-research-blog/anatomy-of-an-llm-rce

Читать полностью…

The Bug Bounty Hunter

Vulnerabilities of Realtek SD card reader driver, part 1

https://zwclose.github.io/2024/10/14/rtsper1.html

Читать полностью…

The Bug Bounty Hunter

Anthropic Expands Their Model Safety Bug Bounty Program

https://www.hackerone.com/customer-stories/anthropic-expands-bug-bounty-program

Читать полностью…

The Bug Bounty Hunter

AWS CDK Risk: Exploiting a Missing S3 Bucket Allowed Account Takeover

https://www.aquasec.com/blog/aws-cdk-risk-exploiting-a-missing-s3-bucket-allowed-account-takeover/

Читать полностью…

The Bug Bounty Hunter

Intigriti CTF 2024 - 1337 UP - Live Hacking Talks

https://www.youtube.com/watch?v=BKXfrNwrcqQ

Читать полностью…

The Bug Bounty Hunter

Authenticated Remote Code Execution in multiple Xerox printers

https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-in-multiple-xerox-printers/

Читать полностью…

The Bug Bounty Hunter

5 new protections on Google Messages to help keep you safe

http://security.googleblog.com/2024/10/5-new-protections-on-google-messages.html

Читать полностью…

The Bug Bounty Hunter

October is Cybersecurity Month. We're removing the install count and time since the last update limits for massive cleanup 🚀

Also, If we hit 1K valid reports, we're adding an extra $100 for anyone who submits 10 reports with a 6.5+ CVSS score 🔥

Join us https://patchstack.com/bug-bounty/

Читать полностью…

The Bug Bounty Hunter

Latest Nuclei Release v3.3.5!

https://github.com/projectdiscovery/nuclei/releases/tag/v3.3.5

Читать полностью…

The Bug Bounty Hunter

Tips for Parents Working from Home from HackerOne Employees

https://www.hackerone.com/culture-and-talent/tips-parents-working-home-hackerone-employees

Читать полностью…

The Bug Bounty Hunter

Latest Nuclei Release v3.3.5!

https://github.com/projectdiscovery/nuclei/releases/tag/v3.3.5

Читать полностью…

The Bug Bounty Hunter

Security Page Updates: Boosting Consistency & Transparency for Security Researchers and Customers

https://www.hackerone.com/security-page-updates

Читать полностью…

The Bug Bounty Hunter

Find XSS on the Fly 🔥( Full guide )

zack0x01_/find-xss-on-the-fly-full-guide-300f07fb86ae" rel="nofollow">https://medium.com/@zack0x01_/find-xss-on-the-fly-full-guide-300f07fb86ae

Читать полностью…

The Bug Bounty Hunter

How To Scan The Entire Cloud

https://www.youtube.com/watch?v=IKefdmXFa3U

Читать полностью…

The Bug Bounty Hunter

$150,000 Evmos Vulnerability Through Reading Documentation

jjordanjjordan/150-000-evmos-vulnerability-through-reading-documentation-d26328590a7a" rel="nofollow">https://medium.com/@jjordanjjordan/150-000-evmos-vulnerability-through-reading-documentation-d26328590a7a

Читать полностью…

The Bug Bounty Hunter

How Hai’s Report Summarization Turns Complex Data Into Actionable Insights

https://www.hackerone.com/ai/hai-report-summarization

Читать полностью…

The Bug Bounty Hunter

Concealing payloads in URL credentials

https://portswigger.net/research/concealing-payloads-in-url-credentials

Читать полностью…

The Bug Bounty Hunter

Zero to LHE in 9 Months (feat gr3pme) (Ep. 91)

https://www.youtube.com/watch?v=5WIRyMA0FfM

Читать полностью…

The Bug Bounty Hunter

YesWeHack Hunter Interviews - #10 Blaklis: “I'm still a bit of a Cro-Magnon in the way I hack”

https://www.youtube.com/watch?v=D132QBUJMVQ

Читать полностью…

The Bug Bounty Hunter

Using Nix to Fuzz Test a PDF Parser (Part One)

https://mtlynch.io/nix-fuzz-testing-1/

Читать полностью…

The Bug Bounty Hunter

A Visual Guide to Bug Bounty Success

https://www.hackerone.com/application-security/visual-guide-bug-bounty-success

Читать полностью…

The Bug Bounty Hunter

SQL Injection Polyglots / nastystereo.com

https://nastystereo.com/security/sqli-polyglots.html

Читать полностью…

The Bug Bounty Hunter

Is This The Best Recon Framework?

https://www.youtube.com/watch?v=GOwq95QMv_g

Читать полностью…

The Bug Bounty Hunter

Attacking APIs using JSON Injection

https://danaepp.com/attacking-apis-using-json-injection

Читать полностью…

The Bug Bounty Hunter

How to build a secure recon network using Tailscale | @Bugcrowd

https://www.bugcrowd.com/blog/how-to-build-a-secure-recon-network-using-tailscale/

Читать полностью…

The Bug Bounty Hunter

Use Case: Bypassing In-App Purchase By Payment Client-Side Validation
https://secfathy0x1.medium.com/use-case-bypassing-in-app-purchase-by-payment-client-side-validation-e87e2c775a9c

Читать полностью…

The Bug Bounty Hunter

259 - Zendesk’s Email Fiasco and Rooting Linux with a Lighter

https://dayzerosec.com/podcast/259.html

Читать полностью…

The Bug Bounty Hunter

5k Clickjacking, Encryption Oracles, and Cursor for PoCs (Ep. 90)

https://www.youtube.com/watch?v=S8qzaXhWHyw

Читать полностью…
Subscribe to a channel