Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
Forem
Close
#
bugbounty
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
My Journey: Discovering the Relationship Between Kali Linux and Black Arch
K Dev
K Dev
K Dev
Follow
Jul 17
My Journey: Discovering the Relationship Between Kali Linux and Black Arch
#
archlinux
#
kalilinux
#
hacking
#
bugbounty
5
 reactions
Comments
Add Comment
8 min read
đĄď¸ Ethical Hacking on HackerOne: The Legal Path to Bug Bounties đ°đľď¸
hmza
hmza
hmza
Follow
Jul 17
đĄď¸ Ethical Hacking on HackerOne: The Legal Path to Bug Bounties đ°đľď¸
#
hackerone
#
programming
#
bugbounty
#
ctf
5
 reactions
Comments
Add Comment
2 min read
Day 1 of My Bug Bounty Journeyâ-âStarting from Zero
Manju Varma M
Manju Varma M
Manju Varma M
Follow
Jul 15
Day 1 of My Bug Bounty Journeyâ-âStarting from Zero
#
bug
#
bugbounty
#
learning
#
cybersecurity
Comments
Add Comment
1 min read
Is Legally Non-Compliant Behavior a Security Vulnerability?
IRORI
IRORI
IRORI
Follow
Jul 11
Is Legally Non-Compliant Behavior a Security Vulnerability?
#
security
#
bugbounty
#
iso27001
#
privacy
Comments
Add Comment
2 min read
How to Deploy SafeLine WAF on a CyberPanel VPS
Carrie
Carrie
Carrie
Follow
Jul 4
How to Deploy SafeLine WAF on a CyberPanel VPS
#
cyberpanel
#
vulnerabilities
#
bugbounty
#
waf
5
 reactions
Comments
Add Comment
2 min read
đ§ Selecting the Right Bug Bounty Targets & Reconnaissance
Trumpiter
Trumpiter
Trumpiter
Follow
Jun 2
đ§ Selecting the Right Bug Bounty Targets & Reconnaissance
#
bugbounty
#
security
Comments
Add Comment
24 min read
Final Tale: Part 3 - The Gateways We Left Open
Peter Davis
Peter Davis
Peter Davis
Follow
May 30
Final Tale: Part 3 - The Gateways We Left Open
#
infosec
#
git
#
bitbucket
#
bugbounty
5
 reactions
Comments
Add Comment
5 min read
đ Introducing Astra v1.1 â Local, Powerful, and Now Even More Flexible
Bhawesh Chaudhary
Bhawesh Chaudhary
Bhawesh Chaudhary
Follow
May 18
đ Introducing Astra v1.1 â Local, Powerful, and Now Even More Flexible
#
cybersecurity
#
astra
#
bugbounty
#
recon
Comments
Add Comment
2 min read
đ Comprehensive Bug Bounty Hunting Methodology
Trumpiter
Trumpiter
Trumpiter
Follow
Jun 2
đ Comprehensive Bug Bounty Hunting Methodology
#
bugbounty
#
security
1
 reaction
Comments
Add Comment
32 min read
Git Tales: Secrets in the Shadows
Peter Davis
Peter Davis
Peter Davis
Follow
Apr 29
Git Tales: Secrets in the Shadows
#
bugbounty
#
infosec
#
pentest
#
sourcecodereview
2
 reactions
Comments
Add Comment
3 min read
How I found my "First Bug" in a public bug bounty program
Blue Byte
Blue Byte
Blue Byte
Follow
Apr 18
How I found my "First Bug" in a public bug bounty program
#
bugbounty
#
jwt
#
hashcat
#
firstbug
Comments
Add Comment
2 min read
Web Cache Deception Attacks
Blue Byte
Blue Byte
Blue Byte
Follow
May 9
Web Cache Deception Attacks
#
hacking
#
pentest
#
bugbounty
#
cybersecurity
Comments
Add Comment
2 min read
Git Tales: Part 2 - Demons in the Cloud
Peter Davis
Peter Davis
Peter Davis
Follow
May 9
Git Tales: Part 2 - Demons in the Cloud
#
bugbounty
#
infosec
#
cloudsecurity
#
pentest
3
 reactions
Comments
Add Comment
5 min read
Credential Dumping Applications: What They Are, How They Work, and How to Defend Against Them
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Jun 5
Credential Dumping Applications: What They Are, How They Work, and How to Defend Against Them
#
cybersecurity
#
security
#
bugbounty
5
 reactions
Comments
2
 comments
1 min read
(â Ą) Android Identity Authentication
TECNO Security
TECNO Security
TECNO Security
Follow
Mar 26
(â Ą) Android Identity Authentication
#
security
#
cybersecurity
#
bugbounty
#
development
Comments
Add Comment
2 min read
How to Use Burp Suite for Bug Bounty Hunting: A Beginner-Friendly Guide
Sampa Kundu
Sampa Kundu
Sampa Kundu
Follow
Apr 22
How to Use Burp Suite for Bug Bounty Hunting: A Beginner-Friendly Guide
#
burpsuite
#
bugbounty
#
cybersecurity
Comments
Add Comment
1 min read
Bug Bounty 2025: The Unfiltered Roadmap to Hunting Success
linuxmobile ( ăŞăăăŻăš )
linuxmobile ( ăŞăăăŻăš )
linuxmobile ( ăŞăăăŻăš )
Follow
Mar 30
Bug Bounty 2025: The Unfiltered Roadmap to Hunting Success
#
programming
#
bountyhunter
#
bugbounty
#
webdev
3
 reactions
Comments
Add Comment
17 min read
2FA Bypass via Response Manipulation
Blue Byte
Blue Byte
Blue Byte
Follow
Feb 24
2FA Bypass via Response Manipulation
#
bugbounty
#
pentest
#
2fa
#
mfa
Comments
Add Comment
1 min read
Next.js Middleware Broken Access Controls
Blue Byte
Blue Byte
Blue Byte
Follow
Mar 27
Next.js Middleware Broken Access Controls
#
nextjs
#
bugbounty
#
pentest
#
hacking
1
 reaction
Comments
Add Comment
1 min read
ăRecognitionăExcellent Security Researcher in January 2025 iiiiiinv
TECNO Security
TECNO Security
TECNO Security
Follow
Feb 21
ăRecognitionăExcellent Security Researcher in January 2025 iiiiiinv
#
security
#
cybersecurity
#
bugbounty
Comments
Add Comment
1 min read
Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param
Blue Byte
Blue Byte
Blue Byte
Follow
Feb 19
Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param
#
bugbounty
#
oauth
#
openredirect
#
authentication
Comments
Add Comment
1 min read
Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover
Blue Byte
Blue Byte
Blue Byte
Follow
Feb 17
Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover
#
aws
#
cognito
#
cloud
#
bugbounty
Comments
Add Comment
2 min read
AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks
Aditya Tripathi
Aditya Tripathi
Aditya Tripathi
Follow
Feb 1
AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks
#
cybersecurity
#
ransomware
#
ethicalhacking
#
bugbounty
Comments
Add Comment
4 min read
Comprehensive CEH v13 Study Guide
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Feb 23
Comprehensive CEH v13 Study Guide
#
cybersecurity
#
bugbounty
7
 reactions
Comments
Add Comment
4 min read
25000$ IDOR: How a Simple ID Enumeration Exposed Private Data
Karthikeyan Nagaraj
Karthikeyan Nagaraj
Karthikeyan Nagaraj
Follow
Feb 22
25000$ IDOR: How a Simple ID Enumeration Exposed Private Data
#
webdev
#
bugbounty
#
cybersecurity
1
 reaction
Comments
Add Comment
1 min read
loading...
We're a blogging-forward open source social network where we learn from one another
Log in
Create account