prasanna darkb0ts.hashnode.dev·Jul 16, 2024Hunting Bugs with GAU and HTTPX: A Step-by-Step GuideBug bounty hunting is a thrilling field where security enthusiasts and professionals test their skills against live systems, seeking vulnerabilities that can be reported for rewards. In this guide, we'll explore how to use two powerful tools, GAU (Ge...Discussbug bounty
Omrootaccess.hashnode.dev·May 28, 2024How To Stay Ahead of 99% Of Bug Bounty HuntersHello Everyone, We know that bug bounty is growing popular day by day and many people are getting into this field which is great for the community but it also increases competition within the bug bounty hunters, and thus makes it harder to find bugs ...Discuss·2 likeshacking
Sergio Medeirosgrumpz.net·May 4, 2024Finding a Basic RCE Vulnerability on a Prominent News ChannelUsually, when newcomers approach me in the bug bounty field, they often ask about the tools, methods, and any other "secret sauce" I use when searching for vulnerabilities in bug bounty programs. I'm sure many of them might feel I sound arrogant or c...Discuss·12 likes·430 readsMy Security Researchhacking
Natan Hailublog.geezsecurity.com·Mar 15, 2024Welcome 101This is Page where i publish my write-ups and Bug Bounty Reports. Have Fun😊!DiscussCTF
Awais Sajidblackdiamond.hashnode.dev·Jan 12, 2024The World of Google Dorks: Unearthing the Hidden WebHave you ever wondered about the secret side of the internet, the part that’s not indexed by regular search engines? Enter the world of Google Dorks, a fascinating realm where savvy users can uncover hidden information and potential vulnerabilities w...Discuss#cybersecurity
prabhudarshan samalcybercruxprabhu.hashnode.dev·Dec 17, 2023Cross-site scripting(XSS) RemediationApplications of cross-site scripting:- An attacker that uses a cross-site scripting flaw can usually do the following: Assume the identity of the victim user. Execute every action that the user is capable of. Read any data that the user has permissio...DiscussWAPT
Arshan DabirsiaghiforPixee Blogblog.pixee.ai·Sep 19, 2023Breaking down the Node.js sandbox bypass CVE-2023-30587Turns out, a lot of people want to try to safely run untrusted code, and that's hard. Pixee Engineer Matt Austin (@mattaustin) recently found a bypass of the new and experimental Node.js sandbox in versions before 20.3.1, and it just received a $3K a...Discuss·2 likes·657 readsSecurity
Otmane Riadnexteventideas.hashnode.dev·Aug 13, 2021Poly Network Hacker Offered $500,000 To Return Stolen TokensHome/bug bounties_/_Poly Network Hacker Offered $500,000 To Return Stolen Tokens bug bountiesbug bountycryptocurrenciesCryptocurrencyCyberCrimeeCommerceePaymentESETExchangehackerLegalMarketingPoly NetworkRegulationSecuritySecurity Managementwhite hat...DiscussSecurity