DEV Community

# bugbounty

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
2FA Bypass via Response Manipulation

2FA Bypass via Response Manipulation

Comments
1 min read
25000$ IDOR: How a Simple ID Enumeration Exposed Private Data

25000$ IDOR: How a Simple ID Enumeration Exposed Private Data

Comments
1 min read
【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

Comments
1 min read
Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param

Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param

Comments
1 min read
Comprehensive CEH v13 Study Guide

Comprehensive CEH v13 Study Guide

5
Comments
4 min read
Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

5
Comments
3 min read
Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover

Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover

Comments
2 min read
Starting Again

Starting Again

Comments
1 min read
AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks

AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks

Comments
4 min read
Easy RCE with LaTeX via file upload

Easy RCE with LaTeX via file upload

Comments
2 min read
Path traversal via alias misconfiguration in Nginx

Path traversal via alias misconfiguration in Nginx

Comments
1 min read
Some handy notes for GCP pentesting

Some handy notes for GCP pentesting

Comments
1 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

6
Comments
4 min read
The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques

The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques

2
Comments
4 min read
Bug bounty hunting with LLMs

Bug bounty hunting with LLMs

38
Comments 1
2 min read
Docker explained for pentesters

Docker explained for pentesters

Comments 1
7 min read
Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers

Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers

1
Comments
2 min read
10 Best Bug Bounty Platforms to Earn Money Online

10 Best Bug Bounty Platforms to Earn Money Online

12
Comments 2
4 min read
How to Get Started with Bug Bounty?

How to Get Started with Bug Bounty?

3
Comments
6 min read
$350 XSS in 15 minutes

$350 XSS in 15 minutes

4
Comments
3 min read
A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters

A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters

5
Comments
3 min read
A Brief Introduction to SAML Security Vector

A Brief Introduction to SAML Security Vector

8
Comments
29 min read
An Open Source apps Leads to XSS to RCE Vulnerability Flaws

An Open Source apps Leads to XSS to RCE Vulnerability Flaws

3
Comments
6 min read
How To Exploit PHP Remotely To Bypass Filters & WAF Rules

How To Exploit PHP Remotely To Bypass Filters & WAF Rules

5
Comments
6 min read
The Various Utilization Methods of PHP Serialization & Deserialization

The Various Utilization Methods of PHP Serialization & Deserialization

6
Comments
22 min read
loading...