Bug Bounty Findings: 10 Major Vulnerabilities Exposed in Cloverleaf’s Application - Open Redirect …: https://medium.com/@maakthon/bug-bounty-findings-10-major-vulnerabilities-exposed-in-cloverleafs-web-application-part-1-95f659ff7d0a?source=rss------bug_bounty-5
Medium
Bug Bounty Insights: 10 Key Findings - Open Redirect - Part 1
This article explores 10 security vulnerabilities found in a web application, called app.target.me for privacy. Each issue is described along with its impact and suggested fixes. The vulnerabilities…
How to Find and Identify Race Condition Vulnerabilities as a Penetration Tester: https://cyberw1ng.medium.com/how-to-find-and-identify-race-condition-vulnerabilities-as-a-penetration-tester-9d9ecce6ed56?source=rss------bug_bounty-5
Medium
How to Find and Identify Race Condition Vulnerabilities as a Penetration Tester
Understand the Basics of Race Conditon
Critical Alert: Hackers Exploit Hunk Companion WordPress Plugin!: https://medium.com/@wiretor/critical-alert-hackers-exploit-hunk-companion-wordpress-plugin-50fcf5834f84?source=rss------bug_bounty-5
Medium
🚨 Critical Alert: Hackers Exploit Hunk Companion WordPress Plugin! 🚨
WIRE TOR — The Ethical Hacking Services
Hack The Box Academy — File Inclusion — Skills Assessment: https://medium.com/@d4nglz17/hack-the-box-academy-file-inclusion-skills-assessment-1ca0283a9a06?source=rss------bug_bounty-5
Medium
Hack The Box Academy — File Inclusion — Skills Assessment
Ok, time to check them skillz on File Inclusion — We’re presented with an IP and Port to test and just one question:
How a Race Condition Became an Account Takeover Vulnerability: https://medium.com/@mrasg/how-a-race-condition-became-an-account-takeover-vulnerability-756f14990f38?source=rss------bug_bounty-5
Medium
How a Race Condition Became an Account Takeover Vulnerability
I’m excited to share a unique vulnerability journey with you — a race condition that transformed into an Account Takeover (ATO) exploit
Simplifying Reconnaissance: Building a Custom Bug Hunting Discord Bot: https://medium.com/@najeebkm010/simplifying-reconnaissance-building-a-custom-bug-hunting-discord-bot-6792ab4249bf?source=rss------bug_bounty-5
Medium
Simplifying Reconnaissance: Building a Custom Bug Hunting Discord Bot
In the ever-evolving landscape of cybersecurity, efficiency and automation are key to successful reconnaissance and vulnerability…
Exploiting API Rate Limiting: Bypassing Restrictions: https://medium.com/@bootstrapsecurity/exploiting-api-rate-limiting-bypassing-restrictions-c89a1bd61aee?source=rss------bug_bounty-5
Medium
Exploiting API Rate Limiting: Bypassing Restrictions
APIs control how users interact with applications. Rate limiting stops users from sending too many requests in a short time. It’s a way to…
❤1
Ultimate Django Vulnerability Checklist: https://bitpanic.medium.com/ultimate-django-vulnerability-checklist-ceb7f428c45f?source=rss------bug_bounty-5
Medium
1. Debug Mode Exposure
A Guide To Testing
2FA Testing Tips for Bug Bounty Hunters: https://bevijaygupta.medium.com/2fa-testing-tips-for-bug-bounty-hunters-d6d77322e1b4?source=rss------bug_bounty-5
Medium
2FA Testing Tips for Bug Bounty Hunters
Two-factor authentication (2FA) is a cornerstone of modern account security, adding an extra layer of protection by requiring users to…
Wordlists Every Pentester Must Have !!: https://theartificialthinker.medium.com/wordlists-every-pentester-must-have-7ad4c1e46ce5?source=rss------bug_bounty-5
Medium
Wordlists Every Pentester Must Have !!
Essential wordlists and tools that power password cracking, brute force attacks, and directory enumeration
❤1
Uncovering Vulnerabilities Through Swagger UI Directory Enumeration: https://hackersatty.medium.com/uncovering-vulnerabilities-through-swagger-ui-directory-enumeration-49e6b43558cd?source=rss------bug_bounty-5
Medium
Uncovering Vulnerabilities Through Swagger UI Directory Enumeration
About Me
❤1
Easy 100$ in public Hackerone program under 3 minutes: https://medium.com/@loayahmed686/easy-100-in-public-hackerone-program-under-3-minutes-69b20e185d3b?source=rss------bug_bounty-5
Medium
Easy 100$ in public Hackerone program under 3 minutes
بسم الله الرحمن الرحيم
❤1
403 Bypass changing http method only: https://rahman0x01.medium.com/403-bypass-changing-http-method-only-f0a32b43a3c8?source=rss------bug_bounty-5
Medium
403 Bypass changing http method only
rahman0x01
❤1
Successfully Gained Full Admin Access and Changed the Password Through Token Manipulation ⚔️: https://medium.com/@momenrezkk90/successfully-gained-full-admin-access-and-changed-the-password-through-token-manipulation-%EF%B8%8F-fe91fc0d9a0f?source=rss------bug_bounty-5
Medium
TAHNK YOU 🫡
https://www.linkedin.com/posts/momen-rezk_full-admin-access-through-token-manipulation-activity-7254084044886331393-_kmU?utm_source=share&ut…
❤1
Useful Wordlists for Bug Bounty Hunters: https://medium.com/@iamshafayat/useful-wordlists-for-bug-bounty-hunters-09f9b3cd2344?source=rss------bug_bounty-5
Medium
Useful Wordlists for Bug Bounty Hunters
Bug bounty hunting requires skill, patience, and the right tools. One of the essential elements of a successful bug bounty journey is using…
❤1
Best python scripts for cybersecurity analyst: https://medium.com/@paritoshblogs/best-python-scripts-for-cybersecurity-analyst-d5ebc91b4cdb?source=rss------bug_bounty-5
Medium
Best python scripts for cybersecurity analyst
When looking for the best Python scripts for a cybersecurity analyst, it’s important to consider scripts that cover a broad range of tasks…
❤1👍1