Bhuwan BhetwalforBhuwan Bhetwal's HandBookblog.bhuwanbhetwal.com.np·Nov 16, 2024Connecting android/emulator to your Burp suite via OpenVPNThis is a simple blog for connecting the Genymotion and the Burpsuite for Android Pentesing using OpenVPN. I use Genymotion (Google Pixel 3 — Android Version 9) and Kali Linux Let’s start the configuration. Make sure you save this two scripts. Githu...DiscussBurpsuite
Yash Shirsathyashashirsath.hashnode.dev·Nov 9, 2024A Bug Hunter's Journey - Discovering and Reporting Bugs on an E-commerce PlatformToday, I’m sharing my experience with bug hunting on a demo e-commerce site (LINK). As a Data and Business Analyst, I’m venturing into Quality Assurance (QA) and software testing for the first time, using tools like BrowserStack to test cross-browser...Discuss·1 likeBugs and Errors
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Oct 17, 2024Protecting Your Systems: A Guide to XML External Entity AttacksWhat is XML External Entity (XXE)? Before diving into XXE attacks, let’s first understand XML (Extensible Markup Language). XML is a markup language that structures and stores data in a format readable by both humans and machines. Originally develope...DiscussFortify and Defend: Navigating the Cybersecurity Landscapexml external entity
Xotl Mistxotlmist.hashnode.dev·Sep 23, 2024Getting into Cyber Security with Bug bounty | Day ZerØThere are many ways to get into the security realm, the traditional degree and certification pathway is one of them, but we’re going to talk about more accessible ways to get into security, sometimes you can’t afford a degree, which could be in terms...Discuss·2 likesbug bounty
prasanna darkb0ts.hashnode.dev·Jul 16, 2024Hunting Bugs with GAU and HTTPX: A Step-by-Step GuideBug bounty hunting is a thrilling field where security enthusiasts and professionals test their skills against live systems, seeking vulnerabilities that can be reported for rewards. In this guide, we'll explore how to use two powerful tools, GAU (Ge...Discussbug bounty
Omrootaccess.hashnode.dev·May 28, 2024How To Stay Ahead of 99% Of Bug Bounty HuntersHello Everyone, We know that bug bounty is growing popular day by day and many people are getting into this field which is great for the community but it also increases competition within the bug bounty hunters, and thus makes it harder to find bugs ...Discuss·3 likeshacking
Sergio Medeirosgrumpz.net·May 4, 2024Finding a Basic RCE Vulnerability on a Prominent News ChannelUsually, when newcomers approach me in the bug bounty field, they often ask about the tools, methods, and any other "secret sauce" I use when searching for vulnerabilities in bug bounty programs. I'm sure many of them might feel I sound arrogant or c...Discuss·13 likes·496 readsMy Security Researchhacking
Natan Hailuhnathan26.hashnode.dev·Mar 15, 2024Welcome 101This is Page where i publish my write-ups and Bug Bounty Reports. Have Fun😊!DiscussCTF
Awais Sajidblackdiamond.hashnode.dev·Jan 12, 2024The World of Google Dorks: Unearthing the Hidden WebHave you ever wondered about the secret side of the internet, the part that’s not indexed by regular search engines? Enter the world of Google Dorks, a fascinating realm where savvy users can uncover hidden information and potential vulnerabilities w...Discuss#cybersecurity
prabhudarshan samalcybercruxprabhu.hashnode.dev·Dec 17, 2023Cross-site scripting(XSS) RemediationApplications of cross-site scripting:- An attacker that uses a cross-site scripting flaw can usually do the following: Assume the identity of the victim user. Execute every action that the user is capable of. Read any data that the user has permissio...DiscussWAPT