"Hard times give birth to strong people, strong people create easy times. Easy times give birth to weak people. Weak people create hard times.
👍2
https://portswigger.net/research/top-10-web-hacking-techniques-of-2024
Please open Telegram to view this post
VIEW IN TELEGRAM
PortSwigger Research
Top 10 web hacking techniques of 2024
Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
👍3❤1
Recon Skills and Tips.pptx.pdf
825.4 KB
Please open Telegram to view this post
VIEW IN TELEGRAM
Common OAuth Vulnerabilities · Doyensec's Blog
https://blog.doyensec.com/2025/01/30/oauth-common-vulnerabilities.html
https://blog.doyensec.com/2025/01/30/oauth-common-vulnerabilities.html
👍1
Python libraries every Hacker should know: https://infosecwriteups.com/python-libraries-every-hacker-should-know-97fb5dae2efd?source=rss------bug_bounty-5
Medium
Exploring Python’s Best Libraries for Ethical Hacking
Manually enumerating targets can be a nightmare; Python automates enumeration using these libraries, which are mostly used by pentesters…
Mastering 403 Bypass Techniques: A Penetration Tester’s Guide: https://bitpanic.medium.com/mastering-403-bypass-techniques-a-penetration-testers-guide-f3a1cb16b9a3?source=rss------bug_bounty-5
Medium
Mastering 403 Bypass Techniques: A Penetration Tester’s Guide
Exploring Methods to Bypass Forbidden Access Restrictions in Web Applications
How I Found an Open AWS S3 Bucket and Used It to Take Over a Subdomain: https://medium.com/@bochamekh21/how-i-found-an-open-aws-s3-bucket-and-used-it-to-take-over-a-subdomain-75736e90c945?source=rss------bug_bounty-5
Medium
How I Found an Open AWS S3 Bucket and Used It to Take Over a Subdomain
Greetings, fellow hackers!
Find XSS Vulnerabilities in Minutes: https://medium.com/@phirojshah20/find-xss-vulnerabilities-in-minutes-912d02d2b848?source=rss------bug_bounty-5
Medium
Find XSS Vulnerabilities in Minutes
Cross-Site Scripting (XSS) remains one of the most prevalent vulnerabilities in web applications. As a red teamer or a bug bounty hunter…
How I Exposed IDOR and Path Traversal Vulnerabilities in a Parking Portal: https://medium.com/@br3ss/how-i-exposed-idor-and-path-traversal-vulnerabilities-in-a-parking-portal-0ae8e4940306?source=rss------bug_bounty-5
Medium
How I Exposed IDOR and Path Traversal Vulnerabilities in a Parking Portal
As a curious penetration tester with a knack for finding bugs where they least expect it, I recently stumbled upon a vulnerability that…
Bug Bounty Hunting Prerequisites: https://it4chis3c.medium.com/bug-bounty-hunting-prerequisites-964560919547?source=rss------bug_bounty-5
Medium
Bug Bounty Hunting Prerequisites
Before moving on to the actual BBH series, I will be writing 2–3 blogs related to Prerequisites, Roadmap (followed by me & professionals as…
My Journey to Finding Two XSS Vulnerabilities on a Bug Bounty Website: https://medium.com/@mickaelbenlolo/my-journey-to-finding-two-xss-vulnerabilities-on-a-bug-bounty-website-b6a1e38425df?source=rss------bug_bounty-5
Medium
My Journey to Finding Two XSS Vulnerabilities on a Bug Bounty Website
Introduction
Humorous XSS Vulnerabilities in a Movie Website: https://medium.com/meetcyber/humorous-xss-vulnerabilities-in-a-movie-website-3600d7828661?source=rss------bug_bounty-5
Medium
Humorous XSS Vulnerabilities in a Movie Website
Here’s another follow-up article. I’ll be sharing more vulnerabilities I discovered on a popular Turkish movie website, which I mentioned…
User information disclosed via API endpoint: https://mknayek101.medium.com/user-information-disclosed-via-api-endpoint-80a1b82e3f3a?source=rss------bug_bounty-5
Medium
User information disclosed via API endpoint
Summary:
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3
# Path Traversal
payloads :- https://gist.github.com/SleepyLctl/63a2da730a3d5abce5013f0f510b1fe2
cheat sheet :- https://github.com/JahTheTrueGod/Directory-Traversal-Cheat-Sheet
OWASP :- https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/05-Authorization_Testing/01-Testing_Directory_Traversal_File_Include
payloads :- https://gist.github.com/SleepyLctl/63a2da730a3d5abce5013f0f510b1fe2
cheat sheet :- https://github.com/JahTheTrueGod/Directory-Traversal-Cheat-Sheet
OWASP :- https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/05-Authorization_Testing/01-Testing_Directory_Traversal_File_Include
Gist
Linux Path Traversal Cheatsheet
GitHub Gist: instantly share code, notes, and snippets.