InInfoSec Write-upsbyRivuDonHow to Find P1 Bugs using Google in your Target — (Part-1)Earn rewards with this simple method.15h agoA response icon615h agoA response icon6
Ln0ragA Critical Bug Let Me Become an Admin on an External Bug Bounty ProgramIntroduction5d agoA response icon35d agoA response icon3
Marx Chryz Del MundoEscalating an HTML Injection into 1-Click Account TakeoverHello everyone, I am Marx Chryz and I’m a HTB CWEE, CPTS, and CBBH passer. I will show you a write up about a vulnerability I found…1d agoA response icon31d agoA response icon3
John CruiseHow I Found a $3,000 Bug Using Just ReconHow I Found a $3,000 Bug Using Just ReconJul 26A response icon14Jul 26A response icon14
Dipu BasakBug Bounty Diaries: How a Leaked appsettings.json Became a High-Impact FindEvery bug bounty hunter dreams of that perfect Remote Code Execution or a critical SQL Injection. But often, the path to a high-impact…2d agoA response icon12d agoA response icon1
Vedavyasan S (@ved4vyasan)My $$$$$ Blind Xss Tips.🧿This tips are from my blind xss journey. Sep 21A response icon1Sep 21A response icon1
Iski💉 SSRF on Steroids: How I Turned a PDF Generator Into a Cloud Data FirehoseHey there!😁1d agoA response icon11d agoA response icon1
InSystem WeaknessbyAppsec.ptHow I found my first Critical SSRF (and how you can too)SSRF (Server Side Request Forgery) is a web vulnerability that allows an attacker to cause the server to send requests to a malicious…Jul 21A response icon1Jul 21A response icon1
Abhishek sharmaExtending Free Trials with Just a Clock Change: A Subscription Bypass StoryA Subscription Bypass Story2d ago2d ago
HBlack GhostPrivilege Escalation: Member Role Can Change Organization Name and Photoلَقَدْ مَنَنَّا عَلَيْكَ مَرَّةً أُخْرَىٰٓ4d agoA response icon34d agoA response icon3