Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4👍3
Crafting your bug bounty methodology: A complete guide for beginners
https://blog.intigriti.com/hacking-tools/crafting-your-bug-bounty-methodology-a-complete-guide-for-beginners
🪳 @bugxplorer
https://blog.intigriti.com/hacking-tools/crafting-your-bug-bounty-methodology-a-complete-guide-for-beginners
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6👍3
PimpMyBurp #11 – Master Signed Token Exploits with SignSaboteur
https://www.yeswehack.com/learn-bug-bounty/pimpmyburp-signsaboteur-burpsuite-extension
🪳 @bugxplorer
https://www.yeswehack.com/learn-bug-bounty/pimpmyburp-signsaboteur-burpsuite-extension
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5👍1
URLFinder is a high-speed tool for passively gathering URLs, optimized for efficient web asset discovery without active scanning
https://github.com/projectdiscovery/urlfinder
🪳 @bugxplorer
https://github.com/projectdiscovery/urlfinder
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥10👍9🤮6
Broken authentication: A complete guide to exploiting advanced authentication vulnerabilities
https://blog.intigriti.com/hacking-tools/broken-authentication-a-complete-guide-to-exploiting-advanced-authentication-vulnerabilities
🪳 @bugxplorer
https://blog.intigriti.com/hacking-tools/broken-authentication-a-complete-guide-to-exploiting-advanced-authentication-vulnerabilities
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6👍5
Bypassing WAFs with the phantom $Version cookie
https://portswigger.net/research/bypassing-wafs-with-the-phantom-version-cookie
🪳 @bugxplorer
https://portswigger.net/research/bypassing-wafs-with-the-phantom-version-cookie
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4👍3
CSPT the Eval Villain Way!
https://blog.doyensec.com/2024/12/03/cspt-with-eval-villain.html
🪳 @bugxplorer
https://blog.doyensec.com/2024/12/03/cspt-with-eval-villain.html
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4👍2
Intigriti Bug Bytes #219 - December 2024 🎅
https://blog.intigriti.com/bug-bytes/bug-bytes-219-december-2024
🪳 @bugxplorer
https://blog.intigriti.com/bug-bytes/bug-bytes-219-december-2024
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3👍2
Insecure file uploads: A complete guide to finding advanced file upload vulnerabilities
https://blog.intigriti.com/hacking-tools/insecure-file-uploads-a-complete-guide-to-finding-advanced-file-upload-vulnerabilities
🪳 @bugxplorer
https://blog.intigriti.com/hacking-tools/insecure-file-uploads-a-complete-guide-to-finding-advanced-file-upload-vulnerabilities
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4🔥2
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms.
https://github.com/projectdiscovery/notify
🪳 @bugxplorer
https://github.com/projectdiscovery/notify
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4👍2
It's a series of articles all about web front-end security.
https://aszx87410.github.io/beyond-xss/en/
🪳 @bugxplorer
https://aszx87410.github.io/beyond-xss/en/
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5👍2
Payment Bypass Guide for Bug Bounty | 69 case studies
https://medium.com/@illoyscizceneghposter/payment-bypass-guide-for-bug-bounty-69-case-studies-15379b4f76fa
🪳 @bugxplorer
https://medium.com/@illoyscizceneghposter/payment-bypass-guide-for-bug-bounty-69-case-studies-15379b4f76fa
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥7👍3
ParamScan is a simple browser extension for web security enthusiasts and pen testers. It helps you find URL parameters in a webpage's source code and check if any of them are reflected on the page. This is super useful for spotting potential XSS vulnerabilities and other security issues.
https://github.com/ch1y0w0/ParamScan
🪳 @bugxplorer
https://github.com/ch1y0w0/ParamScan
Please open Telegram to view this post
VIEW IN TELEGRAM
👍10🔥5
Hunting for blind XSS vulnerabilities: A complete guide
https://www.intigriti.com/researchers/blog/hacking-tools/hunting-for-blind-cross-site-scripting-xss-vulnerabilities-a-complete-guide
🪳 @bugxplorer
https://www.intigriti.com/researchers/blog/hacking-tools/hunting-for-blind-cross-site-scripting-xss-vulnerabilities-a-complete-guide
Please open Telegram to view this post
VIEW IN TELEGRAM
4👍6🔥3
Bypassing File Upload Restrictions To Exploit Client-Side Path Traversal
https://blog.doyensec.com/2025/01/09/cspt-file-upload.html
🪳 @bugxplorer
https://blog.doyensec.com/2025/01/09/cspt-file-upload.html
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥8👍1
Intigriti Bug Bytes #220 - January 2025
https://www.intigriti.com/researchers/blog/bug-bytes/bug-bytes-220-january-2025
🪳 @bugxplorer
https://www.intigriti.com/researchers/blog/bug-bytes/bug-bytes-220-january-2025
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6🔥3
The list of the most interesting research of 2024. Read and vote!
https://portswigger.net/polls/top-10-web-hacking-techniques-2024
🪳 @bugxplorer
https://portswigger.net/polls/top-10-web-hacking-techniques-2024
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6👍3
Bug Bounty Recon Series #1: Discover and Map Hidden Endpoints and Parameters
https://www.yeswehack.com/learn-bug-bounty/discover-map-hidden-endpoints-parameters
🪳 @bugxplorer
https://www.yeswehack.com/learn-bug-bounty/discover-map-hidden-endpoints-parameters
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5👍1
Open URL redirects: A complete guide to exploiting open URL redirect vulnerabilities
https://www.intigriti.com/researchers/blog/hacking-tools/open-url-redirects-a-complete-guide-to-exploiting-open-url-redirect-vulnerabilities
🪳 @bugxplorer
https://www.intigriti.com/researchers/blog/hacking-tools/open-url-redirects-a-complete-guide-to-exploiting-open-url-redirect-vulnerabilities
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5👍1