thebugbountyhunter | Unsorted

Telegram-канал thebugbountyhunter - The Bug Bounty Hunter

43247

Happy hunting! thebugbountyhunter.com hello@thebugbountyhunter.com

Subscribe to a channel

The Bug Bounty Hunter

OAuth Labs: OAuth 2.0 Vulnerabilites

https://cyllective.com/blog/posts/oauth-labs

Читать полностью…

The Bug Bounty Hunter

Broken authentication: A complete guide to exploiting advanced authentication vulnerabilities

https://blog.intigriti.com/hacking-tools/broken-authentication-a-complete-guide-to-exploiting-advanced-authentication-vulnerabilities

Читать полностью…

The Bug Bounty Hunter

265 - A Windows Keyhole and Buggy OAuth

https://dayzerosec.com/podcast/265.html

Читать полностью…

The Bug Bounty Hunter

Autonomous Discovery of Critical Zero-Days - ZeroPath Blog

https://zeropath.com/blog/0day-discoveries

Читать полностью…

The Bug Bounty Hunter

Latest Nuclei Release v3.3.7!

https://github.com/projectdiscovery/nuclei/releases/tag/v3.3.7

Читать полностью…

The Bug Bounty Hunter

Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice

https://www.hackerone.com/ai/hai-plays

Читать полностью…

The Bug Bounty Hunter

OSINT: Following the Breadcrumbs - "No Comment" [INTIGRITI 1337UP CTF 2024]

https://www.youtube.com/watch?v=uzwKwI72FDQ

Читать полностью…

The Bug Bounty Hunter

The cyber threat landscape part 4: Emerging technologies and their security implications

https://blog.intigriti.com/business-insights/the-cyber-threat-landscape-part-4-emerging-technologies-and-their-security-implic

Читать полностью…

The Bug Bounty Hunter

Android's CVE-2020-0238 (AccountTypePreferenceLoader)

https://pwner.gg/blog/Android's-CVE-2020-0238

Читать полностью…

The Bug Bounty Hunter

Introduction to Fuzzing Android Native Components

https://blog.convisoappsec.com/en/introduction-to-fuzzing-android-native-components/

Читать полностью…

The Bug Bounty Hunter

DEF CON 32 - Gotta Cache ‘em all bending the rules of web cache exploitation - Martin Doyhenard
https://m.youtube.com/watch?v=70yyOMFylUA

Читать полностью…

The Bug Bounty Hunter

Brainstorm Tool Release: Optimizing Web Fuzzing With Local LLMs

https://www.invicti.com/blog/security-labs/brainstorm-tool-release-optimizing-web-fuzzing-with-local-llms/

Читать полностью…

The Bug Bounty Hunter

Brainstorm Tool Release: Optimizing Web Fuzzing With Local LLMs

https://www.invicti.com/blog/security-labs/brainstorm-tool-release-optimizing-web-fuzzing-with-local-llms/

Читать полностью…

The Bug Bounty Hunter

Capital One Launches Public Bug Bounty Program with HackerOne

https://www.hackerone.com/customer-stories/capital-one-public-bug-bounty

Читать полностью…

The Bug Bounty Hunter

At Patchstack we launched a Black Friday special #bounty event 🛒

📅 When: 26 Nov to 08 Dev

🛍️ What: WooCommerce and alternatives, payment gateways, and plugins extending eCommerce functionality

🔒 CVSS: 6.4+

📈 Installs: 50+ active installs

Learn more patchstack.com/bug-bounty/

Читать полностью…

The Bug Bounty Hunter

CSPT the Eval Villain Way! · Doyensec's Blog

https://blog.doyensec.com/2024/12/03/cspt-with-eval-villain.html

Читать полностью…

The Bug Bounty Hunter

The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security

https://www.hackerone.com/vulnerability-management/bug-bounty-s-1-filings

Читать полностью…

The Bug Bounty Hunter

From File Upload To LFI: A Journey To Exploitation

red.whisperer/from-file-upload-to-lfi-a-journey-to-exploitation-02ab5e1a7d0a" rel="nofollow">https://medium.com/@red.whisperer/from-file-upload-to-lfi-a-journey-to-exploitation-02ab5e1a7d0a

Читать полностью…

The Bug Bounty Hunter

How To Write A Pentest Report That Gets Your Findings Fixed

https://www.youtube.com/watch?v=oBtJ7bryKII

Читать полностью…

The Bug Bounty Hunter

Pentesting Salesforce Communities

https://0xbro.red/writeups/web-hacking/salesforce-hacking/

Читать полностью…

The Bug Bounty Hunter

MSSQL Identified as Vulnerable to Emoji String Exploitation

https://decrypt.lol/posts/2024/11/29/mssql-identified-as-vulnerable-to-emoji-string-exploitation/

Читать полностью…

The Bug Bounty Hunter

⏳ Time is ticking! Black Friday is your chance to get Burp Bounty Pro for just €79/year – save €40.

🎯Advanced customization, faster audits, and the power to detect vulnerabilities with less effort.

🔗Don’t wait! https://bountysecurity.ai/pages/burp-bounty

Читать полностью…

The Bug Bounty Hunter

Hack My Career: Harley Kimball’s Journey to DEFCON

https://www.hackerone.com/culture-and-talent/hack-my-career-harley-kimballs-journey-defcon

Читать полностью…

The Bug Bounty Hunter

How the Great Firewall of China Uses DNS Poisoning

https://www.youtube.com/watch?v=BUbCkUVaFFY

Читать полностью…

The Bug Bounty Hunter

SSD Advisory - ksthunk.sys Integer Overflow (PE) - SSD Secure Disclosure

https://ssd-disclosure.com/ssd-advisory-ksthunk-sys-integer-overflow-pe/

Читать полностью…

The Bug Bounty Hunter

Crafting your bug bounty methodology: A complete guide for beginners

https://blog.intigriti.com/hacking-tools/crafting-your-bug-bounty-methodology-a-complete-guide-for-beginners

Читать полностью…

The Bug Bounty Hunter

Extending Burp Suite for fun and profit – The Montoya way – Part 8 - hn security

https://security.humanativaspa.it/extending-burp-suite-for-fun-and-profit-the-montoya-way-part-8/

Читать полностью…

The Bug Bounty Hunter

REverse Tactics

https://www.reversetactics.com/publications/2024_conf_grehack_virtualbox/

Читать полностью…

The Bug Bounty Hunter

264 - Linux Is Still a Mess and Vaultwarden Auth Issues

https://dayzerosec.com/podcast/264.html

Читать полностью…

The Bug Bounty Hunter

Reversing an Insecure 2FA Generation Algorithm - "Secure Bank" [INTIGRITI 1337UP CTF 2024]

https://www.youtube.com/watch?v=d7fdWoYOGaw

Читать полностью…
Subscribe to a channel