DEV Community

# bugbounty

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Next.js Middleware Broken Access Controls

Next.js Middleware Broken Access Controls

Comments
1 min read
Server-Side Template Injection in Go

Server-Side Template Injection in Go

Comments
1 min read
(Ⅱ) Android Identity Authentication

(Ⅱ) Android Identity Authentication

Comments
2 min read
2FA Bypass via Response Manipulation

2FA Bypass via Response Manipulation

Comments
1 min read
25000$ IDOR: How a Simple ID Enumeration Exposed Private Data

25000$ IDOR: How a Simple ID Enumeration Exposed Private Data

Comments
1 min read
【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

Comments
1 min read
Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param

Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param

Comments
1 min read
Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover

Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover

Comments
2 min read
AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks

AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks

Comments
4 min read
Comprehensive CEH v13 Study Guide

Comprehensive CEH v13 Study Guide

5
Comments
4 min read
Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

6
Comments
3 min read
Easy RCE with LaTeX via file upload

Easy RCE with LaTeX via file upload

Comments
2 min read
Starting Again

Starting Again

Comments
1 min read
Path traversal via alias misconfiguration in Nginx

Path traversal via alias misconfiguration in Nginx

Comments
1 min read
Some handy notes for GCP pentesting

Some handy notes for GCP pentesting

Comments
1 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

6
Comments
4 min read
The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques

The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques

2
Comments
4 min read
Bug bounty hunting with LLMs

Bug bounty hunting with LLMs

40
Comments 1
2 min read
Docker explained for pentesters

Docker explained for pentesters

Comments 1
7 min read
Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers

Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers

1
Comments
2 min read
The Role of Bug Reporting in Software Testing: A Deep Dive

The Role of Bug Reporting in Software Testing: A Deep Dive

3
Comments 1
5 min read
10 Best Bug Bounty Platforms to Earn Money Online

10 Best Bug Bounty Platforms to Earn Money Online

15
Comments 2
4 min read
How to Get Started with Bug Bounty?

How to Get Started with Bug Bounty?

3
Comments
6 min read
A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters

A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters

5
Comments
3 min read
A Brief Introduction to SAML Security Vector

A Brief Introduction to SAML Security Vector

8
Comments
29 min read
loading...