DEV Community

# bugbounty

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Some handy notes for GCP pentesting

Some handy notes for GCP pentesting

Comments
1 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

7
Comments
4 min read
The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques

The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques

2
Comments
4 min read
Bug bounty hunting with LLMs

Bug bounty hunting with LLMs

38
Comments 1
2 min read
Docker explained for pentesters

Docker explained for pentesters

Comments 1
7 min read
Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers

Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers

1
Comments
2 min read
10 Best Bug Bounty Platforms to Earn Money Online

10 Best Bug Bounty Platforms to Earn Money Online

8
Comments 2
4 min read
How to Get Started with Bug Bounty?

How to Get Started with Bug Bounty?

3
Comments
6 min read
$350 XSS in 15 minutes

$350 XSS in 15 minutes

4
Comments
3 min read
A Brief Introduction to SAML Security Vector

A Brief Introduction to SAML Security Vector

8
Comments
29 min read
A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters

A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters

5
Comments
3 min read
An Open Source apps Leads to XSS to RCE Vulnerability Flaws

An Open Source apps Leads to XSS to RCE Vulnerability Flaws

3
Comments
6 min read
How To Exploit PHP Remotely To Bypass Filters & WAF Rules

How To Exploit PHP Remotely To Bypass Filters & WAF Rules

5
Comments
6 min read
The Various Utilization Methods of PHP Serialization & Deserialization

The Various Utilization Methods of PHP Serialization & Deserialization

6
Comments
22 min read
From App User to Tenant Admin

From App User to Tenant Admin

1
Comments
3 min read
Commenting == Account Takeover

Commenting == Account Takeover

5
Comments
4 min read
Intercept android app traffic in Burp Suite: From root to hack [ULTIMATE GUIDE for bug hunters]

Intercept android app traffic in Burp Suite: From root to hack [ULTIMATE GUIDE for bug hunters]

8
Comments
4 min read
Setting up reconftw

Setting up reconftw

19
Comments
9 min read
GraphQL : The new REST?

GraphQL : The new REST?

65
Comments 23
3 min read
Bug Bounty: Not always an ideal

Bug Bounty: Not always an ideal

29
Comments 4
2 min read
team up for Bug bounty Hunter

team up for Bug bounty Hunter

6
Comments
1 min read
Failling in Bugbounty's

Failling in Bugbounty's

2
Comments
2 min read
Using extensions for Bug Bounty and Pentesting

Using extensions for Bug Bounty and Pentesting

3
Comments 3
1 min read
Intigriti 1221 - XSS Challenge Writeup

Intigriti 1221 - XSS Challenge Writeup

7
Comments
5 min read
Log4j Vulnerability Cheatsheet

Log4j Vulnerability Cheatsheet

9
Comments
2 min read
Intigriti 1121 - XSS Challenge Writeup

Intigriti 1121 - XSS Challenge Writeup

7
Comments
10 min read
How to install nuclei in any linux ☠️

How to install nuclei in any linux ☠️

15
Comments 3
1 min read
Remote Code Execution on ibm.com subdomain

Remote Code Execution on ibm.com subdomain

6
Comments 2
1 min read
SQL inection on gdclive.nokia.com

SQL inection on gdclive.nokia.com

3
Comments 1
2 min read
Reflected XSS by jsonp on ibm.com subdomain

Reflected XSS by jsonp on ibm.com subdomain

4
Comments
1 min read
Blockchain security analysis layer by layer

Blockchain security analysis layer by layer

15
Comments
13 min read
QUICK TEN STEP GUIDE TO BUG HUNTING

QUICK TEN STEP GUIDE TO BUG HUNTING

17
Comments
3 min read
Can you use Ruby in Bug Bounty?

Can you use Ruby in Bug Bounty?

5
Comments 2
1 min read
Make Money as a Bug Bounty Hunter on these 9 Platforms

Make Money as a Bug Bounty Hunter on these 9 Platforms

19
Comments 1
2 min read
"I never sent that!" An Intro to CSRF (Updated)

"I never sent that!" An Intro to CSRF (Updated)

8
Comments
7 min read
Acknowledgement From Intel

Acknowledgement From Intel

2
Comments
1 min read
Acknowledgement From Microsoft

Acknowledgement From Microsoft

2
Comments
4 min read
Hack more, learn more, earn more and get invited more.

Hack more, learn more, earn more and get invited more.

31
Comments 1
7 min read
OnePlus opens up a bug bounty program called the OnePlus Security Response Center

OnePlus opens up a bug bounty program called the OnePlus Security Response Center

6
Comments
2 min read
loading...