thebugbountyhunter | Unsorted

Telegram-канал thebugbountyhunter - The Bug Bounty Hunter

43247

Happy hunting! thebugbountyhunter.com hello@thebugbountyhunter.com

Subscribe to a channel

The Bug Bounty Hunter

NIS2 Directive: The complete guide for in-scope entities

https://blog.intigriti.com/business-insights/the-nis2-directive

Читать полностью…

The Bug Bounty Hunter

261 - Attacking Browser Extensions and CyberPanel

https://dayzerosec.com/podcast/261.html

Читать полностью…

The Bug Bounty Hunter

Meet Reaper: Open-Source Application Security Testing Built for AI

https://www.youtube.com/watch?v=ULpCO1-oDFI

Читать полностью…

The Bug Bounty Hunter

The OAuth Oversight: When Configuration Errors Turn into Account Hijacks

nightcoders0/the-oauth-oversight-when-configuration-errors-turn-into-account-hijacks-5ed1f9c83d16" rel="nofollow">https://medium.com/@nightcoders0/the-oauth-oversight-when-configuration-errors-turn-into-account-hijacks-5ed1f9c83d16

Читать полностью…

The Bug Bounty Hunter

7 Tips for bug bounty beginners

https://blog.intigriti.com/hacking-tools/7-tips-for-bug-bounty-beginners

Читать полностью…

The Bug Bounty Hunter

IDOR Exploit: Gaining Unauthorized Control Over Users’ Shopping Baskets

0xmatrix/idor-exploit-gaining-unauthorized-control-over-users-shopping-baskets-122650091cf5" rel="nofollow">https://medium.com/@0xmatrix/idor-exploit-gaining-unauthorized-control-over-users-shopping-baskets-122650091cf5

Читать полностью…

The Bug Bounty Hunter

Template Engines Injection 101

0xAwali/template-engines-injection-101-4f2fe59e5756" rel="nofollow">https://medium.com/@0xAwali/template-engines-injection-101-4f2fe59e5756

Читать полностью…

The Bug Bounty Hunter

Discovering Hidden Vulnerabilities in Portainer with CodeQL

https://www.cyberark.com/resources/threat-research-blog/discovering-hidden-vulnerabilities-in-portainer-with-codeql

Читать полностью…

The Bug Bounty Hunter

Autonomous Discovery of Critical Zero-Days - ZeroPath Blog

https://zeropath.com/blog/0day-discoveries

Читать полностью…

The Bug Bounty Hunter

PHP stripslashes() DOESN'T strip slashes!?

https://www.youtube.com/watch?v=ZIrxb48LoUc

Читать полностью…

The Bug Bounty Hunter

GitHub - Escape-Technologies/graphinder: 🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️

https://github.com/Escape-Technologies/graphinder

Читать полностью…

The Bug Bounty Hunter

Paranoids’ Vulnerability Research: NetIQ iManager Security Alerts | Paranoids | Yahoo Inc.

https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-netiq-imanager-security-alerts

Читать полностью…

The Bug Bounty Hunter

Using AFL++ on bug bounty programs: an example with Gnome libsoup - Almond Offensive Security Blog

https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html

Читать полностью…

The Bug Bounty Hunter

Take control of your security posture: The Burp Suite Enterprise Edition winter update

https://portswigger.net/blog/take-control-of-your-security-posture-the-burp-suite-enterprise-edition-winter-update

Читать полностью…

The Bug Bounty Hunter

Hack My Career: Meet Alek Relyea

https://www.hackerone.com/culture-and-talent/hack-my-career-meet-alek-relyea

Читать полностью…

The Bug Bounty Hunter

Hack My Career: Meet Bertijn Eldering

https://www.hackerone.com/culture-and-talent/hack-my-career-meet-bertijn-eldering

Читать полностью…

The Bug Bounty Hunter

YesWeHack Customer Story: L'Oréal, world’s largest cosmetics and personal care brand

https://www.youtube.com/watch?v=fObtShgP9U8

Читать полностью…

The Bug Bounty Hunter

Justifying cybersecurity budgets: The power of cyber threat analysis

https://blog.intigriti.com/business-insights/justifying-cybersecurity-budgets-cyber-threat-analysis

Читать полностью…

The Bug Bounty Hunter

32 vulnerabilities in IBM Security Verify Access - IT Security Research by Pierre

https://pierrekim.github.io/blog/2024-11-01-ibm-security-verify-access-32-vulnerabilities.html

Читать полностью…

The Bug Bounty Hunter

Takeaways from the Dismissal of Most of the Government’s Case Against the SolarWinds CISO

https://www.hackerone.com/public-policy/solarwinds-case-dismissal

Читать полностью…

The Bug Bounty Hunter

Taming Post Claps

https://medium.com/medium-eng/taming-post-claps-273d97ce1ced

Читать полностью…

The Bug Bounty Hunter

Looking into the Nintendo Alarmo

https://garyodernichts.blogspot.com/2024/10/looking-into-nintendo-alarmo.html

Читать полностью…

The Bug Bounty Hunter

5 Questions to Assess Your Organization’s Bug Bounty Readiness

https://www.hackerone.com/vulnerability-management/bug-bounty-readiness-questions

Читать полностью…

The Bug Bounty Hunter

October 2024 Newsletter

https://blog.projectdiscovery.io/october-2024-newsletter/

Читать полностью…

The Bug Bounty Hunter

Exploiting Fortune 500 Through Hidden Supply Chain Links - Lupin & Holmes

https://www.landh.tech/blog/20241028-hidden-supply-chain-links/

Читать полностью…

The Bug Bounty Hunter

More Models, More ProbLLMs: New Vulnerabilities in Ollama | Oligo Security

https://www.oligo.security/blog/more-models-more-probllms

Читать полностью…

The Bug Bounty Hunter

How I Accessed Microsoft’s ServiceNow — Exposing ALL Microsoft Employee emails, Chat Support Transcripts & Attachments

moblig/how-i-accessed-microsofts-servicenow-exposing-all-microsoft-employee-emails-chat-support-5f8d535eb63b" rel="nofollow">https://medium.com/@moblig/how-i-accessed-microsofts-servicenow-exposing-all-microsoft-employee-emails-chat-support-5f8d535eb63b

Читать полностью…

The Bug Bounty Hunter

New crazy payloads in the URL Validation Bypass Cheat Sheet

https://portswigger.net/research/new-crazy-payloads-in-the-url-validation-bypass-cheat-sheet

Читать полностью…

The Bug Bounty Hunter

Nine writeup for some Android specific chromium behavior vulnerabilities
1) intent:// restrictions bypassed via firebase dynamic links (Fixed, Awarded $3000)
2) Bypass to issue 40060327 via market:// URL (Fixed, Awarded $2250)
3) Add to home screen spoof (Fixed, Awarded $1125)
4) Iframe sandbox allow-popups-to-escape-sandbox bypass via intent (Asked, Not fixed)
5) Controlling Google assistant (Asked, Not fixed)
6) Controlling Clock (Accepted, Not fixed)
7) URL Spoof via intent (Fixed, Awarded $3133.70)
8) BROWSABLE intent:// bypass (Fixed, Duplicate)
9) BROWSABLE intent:// bypass (Fixed, Awarded $4500.00)
https://ndevtk.github.io/writeups/2024/08/01/awas/

Читать полностью…

The Bug Bounty Hunter

260 - Hardwear.IO NL, DEF CON 32, and Filesystem Exploitation

https://dayzerosec.com/podcast/260.html

Читать полностью…
Subscribe to a channel