The Bug Bounty Hunter
Happy hunting! thebugbountyhunter.com [email protected]
Mostrar más33 351Suscriptores
+3724 hours
+1947 days
+1 08930 days
- Suscriptores
- Cobertura postal
- ER - ratio de compromiso
Carga de datos en curso...
Tasa de crecimiento de suscriptores
Carga de datos en curso...
Introducing DAST scanning in the Cloud, with Burp Suite Enterprise Edition
https://portswigger.net/blog/introducing-dast-scanning-in-the-cloud-with-burp-suite-enterprise-edition
Introducing DAST scanning in the Cloud, with Burp Suite Enterprise Edition
We’re excited to announce that Burp Suite Enterprise Edition is now available in PortSwigger’s secure cloud. You can now free up testing time with scalable, automated DAST scanning, without the burden
4 bug bounty mistakes and how to avoid them
https://blog.intigriti.com/2024/04/17/4-bug-bounty-mistakes-and-how-to-avoid-them/
❤ 1
HackerOne Company Values Matter: Lead with Integrity
https://www.hackerone.com/culture-and-talent/hackerone-company-values-matter-lead-integrity
HackerOne Company Values Matter: Lead with Integrity
🤔 2👎 1
.NET Remoting, CDN Attack Surface, and Recon vs Main App (Ep. 64)
https://www.youtube.com/watch?v=hWsH_9F8xFo
❤ 4
Hey hacker!
You haven't completed the survey yet?
We want to hear from you!
This is your chance to help us improve the community!
Thank you!
👎 7👍 3❤ 1
Breaking Custom Encryption Using Frida (Mobile Application Pentesting)
https://labs.cognisys.group/posts/Breaking-Custom-Ecryption-Using-Frida-Mobile-Application-pentesting/
Breaking Custom Encryption Using Frida (Mobile Application Pentesting)
Overview
👍 8❤ 3
Introducing read-only user roles
https://blog.intigriti.com/2024/04/17/introducing-read-only-user-roles/
How I approach Account takeover due to no rate limit on OTP
https://medium.com/@jeetpal2007/how-i-approach-account-takeover-due-to-no-rate-limit-on-otp-10a7fe056184
How I approach Account takeover due to no rate limit on OTP
Hi
👍 4
An Obscure Actions Workflow Vulnerability in Google’s Flank
https://adnanthekhan.com/2024/04/15/an-obscure-actions-workflow-vulnerability-in-googles-flank/
An Obscure Actions Workflow Vulnerability in Google’s Flank
Learn about how I used a custom tool to find a Google-owned repository vulnerable to GitHub Actions Poisoned Pipeline Execution Attack and earned a $7,500 bug bounty!
👍 1
How I found a P1 bug in just 40 minutes
https://medium.com/@jeetpal2007/how-i-found-a-p1-bug-in-just-40-minutes-4f3614abe974
How I found a P1 bug in just 40 minutes
Hi
👎 25👍 2🤔 1