“Undetectable C# & C++ Reverse Shells” by Bank Security https://link.medium.com/kIIc9Ch5b4
  
  Medium
  
  Undetectable C# & C++ Reverse Shells
  Technical overview of different way to spawn a reverse shell on a victim machine
  ■■■□□ From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
  
  https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
Medium
  
  From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
  How I Finally could Got into an Internal Network (and could accessing all of their internal assets) by Using Various Vulnerabilities.
  Source Code + Sensitive Information Disclosure lead to InstaMoney and SendGrind Account Takeover
https://medium.com/@denypradana/source-code-sensitive-information-disclosure-lead-to-instamoney-and-sendgrind-account-takeover-fc9adf7d8501
  https://medium.com/@denypradana/source-code-sensitive-information-disclosure-lead-to-instamoney-and-sendgrind-account-takeover-fc9adf7d8501
Fun with Amazon S3— Leaks and bucket takeover attack
https://medium.com/@woj_ciech/fun-with-amazon-s3-leaks-and-bucket-takeover-attack-ddb17da1c431
  
  https://medium.com/@woj_ciech/fun-with-amazon-s3-leaks-and-bucket-takeover-attack-ddb17da1c431
Medium
  
  Fun with Amazon S3— Leaks and bucket takeover attack
  Amazon S3 joins to the LeakLooker family, now tool looks for exposed buckets and potential takeovers.
  [ Writeup — Bugbounty Facebook ] Disclosure the verified phone number in Checkpoint.
https://medium.com/@tiendat253/writeup-bugbounty-facebook-disclosure-the-verified-phone-number-in-checkpoint-aa652faeaf21
  https://medium.com/@tiendat253/writeup-bugbounty-facebook-disclosure-the-verified-phone-number-in-checkpoint-aa652faeaf21
HOW I BYPASSED 2 FACTOR AUTHENTICATION
https://medium.com/@manralhemant10/how-i-bypassed-2-factor-authentication-899750421331
  
  https://medium.com/@manralhemant10/how-i-bypassed-2-factor-authentication-899750421331
Medium
  
  HOW I BYPASSED 2 FACTOR AUTHENTICATION
  INTRODUCTION:
  “Recon Everything” by SACHIN GROVER https://link.medium.com/ReykAnzk23
  
  Medium
  
  Recon Everything
  Bug Bounty Hunting Tip #1- Always read the Source Code
  ExploitHub pinned «“Recon Everything” by SACHIN GROVER https://link.medium.com/ReykAnzk23»
  Tale of Account Takeovers (Part-1)
https://medium.com/@bathinivijaysimhareddy/tale-of-account-takeovers-part-1-b24e1f3c3187
  
  https://medium.com/@bathinivijaysimhareddy/tale-of-account-takeovers-part-1-b24e1f3c3187
Medium
  
  Tale of Account Takeovers (Part-1)
  Hello guys, I’m here with a new blog post on account takeover vulnerabilities which have been reported by me. I’ve started bug bounty in…
  FinDir is Directory brutefocer which can be used to run 24/7 againts target and will provide you the notification on Telegram once it finds any open directory
https://github.com/m4xx101/FinDir
  
  https://github.com/m4xx101/FinDir
GitHub
  
  GitHub - m4xx101/FinDir
  Contribute to m4xx101/FinDir development by creating an account on GitHub.
  From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
  
  https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
Medium
  
  From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
  How I Finally could Got into an Internal Network (and could accessing all of their internal assets) by Using Various Vulnerabilities.