thebugbountyhunter | Unsorted

Telegram-канал thebugbountyhunter - The Bug Bounty Hunter

43247

Happy hunting! thebugbountyhunter.com hello@thebugbountyhunter.com

Subscribe to a channel

The Bug Bounty Hunter

Pentesting for iOS Mobile Applications

https://www.hackerone.com/penetration-testing/ios-mobile-applications

Читать полностью…

The Bug Bounty Hunter

Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575

https://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/

Читать полностью…

The Bug Bounty Hunter

Safer with Google: New intelligent, real-time protections on Android to keep you safe

http://security.googleblog.com/2024/11/new-real-time-protections-on-Android.html

Читать полностью…

The Bug Bounty Hunter

Fault Injection - Down the Rabbit Hole - hn security

https://security.humanativaspa.it/fault-injection-down-the-rabbit-hole/

Читать полностью…

The Bug Bounty Hunter

Visionaries Have Democratised Remote Network Access - Citrix Virtual Apps and Desktops (CVE Unknown)

https://labs.watchtowr.com/visionaries-at-citrix-have-democratised-remote-network-access-citrix-virtual-apps-and-desktops-cve-unknown/

Читать полностью…

The Bug Bounty Hunter

How Hai Facilitates Clear and Effective Communication

https://www.hackerone.com/ai/hai-facilitates-effective-communication

Читать полностью…

The Bug Bounty Hunter

Do This For Your First $100,000 in Bounties

https://www.youtube.com/watch?v=QEQ8JENCnNM

Читать полностью…

The Bug Bounty Hunter

Bypass GuardDuty Pentest Findings for the AWS CLI - Hacking The Cloud

https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/

Читать полностью…

The Bug Bounty Hunter

Submission retesting is here

https://blog.intigriti.com/changelog/submission-retesting-is-here

Читать полностью…

The Bug Bounty Hunter

100 Hacking Tools and Resources

https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources

Читать полностью…

The Bug Bounty Hunter

Beyond RCE: Autonomous Code Execution in Agentic AI

https://www.securityrunners.io/post/beyond-rce-autonomous-code-execution-in-agentic-ai

Читать полностью…

The Bug Bounty Hunter

Uphold celebrates four years with Intigriti

https://blog.intigriti.com/intigriti-news/uphold-celebrates-four-years-with-intigriti

Читать полностью…

The Bug Bounty Hunter

12 incident response metrics your business should be tracking

https://blog.intigriti.com/business-insights/12-incident-response-metrics-your-business-should-be-tracking

Читать полностью…

The Bug Bounty Hunter

Want to learn hardware hacking? Try this.

https://www.youtube.com/watch?v=q4_eRiBuSYg

Читать полностью…

The Bug Bounty Hunter

Breaking Down Multipart Parsers: File upload validation bypass

https://blog.sicuranext.com/breaking-down-multipart-parsers-validation-bypass/

Читать полностью…

The Bug Bounty Hunter

When IoT hacking meets Indiana Jones!

https://www.youtube.com/watch?v=0E85Y5_9m4U

Читать полностью…

The Bug Bounty Hunter

The cyber threat landscape part 1: Enhancing cybersecurity strategies

https://blog.intigriti.com/business-insights/the-cyber-threat-landscape-part-1-enhancing-cybersecurity-strategies

Читать полностью…

The Bug Bounty Hunter

The Problem with IoT Cloud-Connectivity and How it Exposed All OvrC Devices to Hijacking

https://claroty.com/team82/research/the-problem-with-iot-cloud-connectivity-and-how-it-exposed-all-ovrc-devices-to-hijacking

Читать полностью…

The Bug Bounty Hunter

Ruby SAML CVE-2024-45409: As bad as it gets and hiding in plain sight — WorkOS

https://workos.com/blog/ruby-saml-cve-2024-45409

Читать полностью…

The Bug Bounty Hunter

Top 4 new attack vectors in web application targets

https://blog.intigriti.com/hacking-tools/top-4-new-attack-vectors-in-web-application-targets

Читать полностью…

The Bug Bounty Hunter

262 - Static Analysis, LLMs, and In-The-Wild Exploit Chains

https://dayzerosec.com/podcast/262.html

Читать полностью…

The Bug Bounty Hunter

Google dorking for beginners: how to find more vulnerabilities using Google search

https://blog.intigriti.com/hacking-tools/google-dorking-for-beginners-how-to-find-more-vulnerabilities-using-google-search

Читать полностью…

The Bug Bounty Hunter

Tales of the Crimson Foes

https://therealunicornsecurity.github.io/CrimsonFoes/

Читать полностью…

The Bug Bounty Hunter

Parrot Anafi Drone Reverse Engineering | HardBreak

https://www.hardbreak.wiki/network-analysis/protocols/application-layer/proprietary-protocols/parrot-anafi-drone-reverse-engineering

Читать полностью…

The Bug Bounty Hunter

7 Ways to achieve remote code execution

https://blog.intigriti.com/hacking-tools/7-ways-to-achieve-remote-code-execution-rce

Читать полностью…

The Bug Bounty Hunter

Talkie Pwnii #1: Exploiting SQL LIKE Operator & Command Injection Regex Bypass

https://www.youtube.com/watch?v=Rw3wWiD5Fto

Читать полностью…

The Bug Bounty Hunter

Apple CarPlay: What's Under the Hood
Slides: https://troopers.de/downloads/troopers24/TR24_Apple_CarPlay-What's_Under_the_Hood_8MCYKG.pdf
Video: https://www.youtube.com/watch?v=cHhxJzavq5I

Читать полностью…

The Bug Bounty Hunter

Retail Under Attack: 6 Learnings from a Retail Customer

https://www.hackerone.com/customer-stories/retail-under-attack

Читать полностью…

The Bug Bounty Hunter

Recon for bug bounty: 8 essential tools for performing effective reconnaissance

https://blog.intigriti.com/hacking-tools/recon-for-bug-bounty-8-essential-tools-for-performing-effective-reconnaissance

Читать полностью…

The Bug Bounty Hunter

Escalating from Reader to Contributor in Azure API Management pt II

https://binarysecurity.no/posts/2024/11/apim-privesc

Читать полностью…
Subscribe to a channel