© 2023 Hashnode
#bugbountytips
Note: For maintaining the program's privacy I won't disclose the program. So, a few months back I and Haseeb were hunting on a private program and the program is a services-based company that has paid services only. So the program had very …
In writing a report, a major thing to consider is the security team. Because they will have to verify the findings, therefore they must be detailed and precise. Note: What will show all that you have done in any Cyber security project is th…
Hello 👋 This is my first and last Bug Bounty Writeup this year 😀 I am sharing with you my latest XSS finding, which I’ve found 2 weeks ago. This was the fastest and a bit unusual flow that I normall…
Hello everyone, This story will be about the Privilege escalation vulnerability I found lately. There are 2 roles on this site creator/account owner Account owner user is the management and is able t…
Ignore my butchered English. It’s not my first language. Boring background (My life story) Chūnibyō: A colloquial Japanese term for early teens who have delusions of grandeur. Also a great anime. I wa…
Hi everyone, I am Saajan Bhujel. Student of Bachelor of Commerce(B.Com) and also I am a Bug Bounty Hunter. This is my 2nd blog, if you find any spelling mistakes, so please bear with me for the next f…
Hi everyone, I am Saajan Bhujel. Student of Bachelor of Commerce(B.Com) and also I am a Bug Bounty Hunter. This is my 1st blog, if you find any spelling mistakes, so please bear with me for the next f…