Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
bugbounty
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Passive Recon â How I Map Targets Without Ever Touching Them
Amrit Sinha
Amrit Sinha
Amrit Sinha
Follow
Mar 12
Passive Recon â How I Map Targets Without Ever Touching Them
#
security
#
bugbounty
#
osint
#
cybersecurity
1
 reaction
Comments
Add Comment
4 min read
Your Robot Vacuum Is Watching You: The $30K Hack That Exposed Thousands of Smart Homes
Kunal
Kunal
Kunal
Follow
Mar 7
Your Robot Vacuum Is Watching You: The $30K Hack That Exposed Thousands of Smart Homes
#
cybersecurity
#
iot
#
smarthome
#
bugbounty
1
 reaction
Comments
Add Comment
6 min read
Subdomain Enumeration in 2026: Tools, Techniques, and What Actually Works
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 7
Subdomain Enumeration in 2026: Tools, Techniques, and What Actually Works
#
security
#
bugbounty
#
webdev
#
tutorial
Comments
Add Comment
8 min read
How to Find IDOR Vulnerabilities: The Bug Bounty Hunter's Practical Guide
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 6
How to Find IDOR Vulnerabilities: The Bug Bounty Hunter's Practical Guide
#
security
#
bugbounty
#
webdev
#
tutorial
Comments
Add Comment
6 min read
Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories
Sidhanta Palei
Sidhanta Palei
Sidhanta Palei
Follow
Mar 6
Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories
#
security
#
cybersecurity
#
bugbounty
#
opensource
1
 reaction
Comments
Add Comment
4 min read
DOM XSS: Why Server-Side Sanitization Isn't Enough
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 6
DOM XSS: Why Server-Side Sanitization Isn't Enough
#
security
#
javascript
#
webdev
#
bugbounty
Comments
Add Comment
5 min read
How I Made My First $300 Bug Bounty (Without Finding SQL Injection)
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 6
How I Made My First $300 Bug Bounty (Without Finding SQL Injection)
#
security
#
bugbounty
#
webdev
#
beginners
Comments
Add Comment
6 min read
How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)
Amit Goyal
Amit Goyal
Amit Goyal
Follow
Mar 5
How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)
#
cybersecurity
#
android
#
bluetooth
#
bugbounty
1
 reaction
Comments
Add Comment
3 min read
The XSS Patterns Hackers Use (And How to Spot Them)
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 3
The XSS Patterns Hackers Use (And How to Spot Them)
#
security
#
bugbounty
#
webdev
#
xss
Comments
Add Comment
6 min read
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
Teycir Ben Soltane
Teycir Ben Soltane
Teycir Ben Soltane
Follow
Feb 4
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
#
security
#
bugbounty
#
websecurity
#
waf
Comments
Add Comment
5 min read
Why BOLA Is #1 in OWASP API Top 10
YogSec
YogSec
YogSec
Follow
Feb 3
Why BOLA Is #1 in OWASP API Top 10
#
bugbounty
#
cybersecurity
#
bola
#
owasp
Comments
Add Comment
3 min read
Understanding APIs Beyond the Textbook: A Bug Hunterâs Perspective
YogSec
YogSec
YogSec
Follow
Feb 2
Understanding APIs Beyond the Textbook: A Bug Hunterâs Perspective
#
apisecurity
#
bugbounty
#
webdev
#
pentesting
Comments
Add Comment
2 min read
Meet ReVex: The Cyberpunk HTTP Repeater that lives in your DevTools â ď¸
Mohamed
Mohamed
Mohamed
Follow
Feb 1
Meet ReVex: The Cyberpunk HTTP Repeater that lives in your DevTools â ď¸
#
cybersecurity
#
webdev
#
bugbounty
#
programming
Comments
Add Comment
2 min read
How I Unified Bug Bounty Scanning Across HackerOne, Intigriti, and Bugcrowd
Chudi Nnorukam
Chudi Nnorukam
Chudi Nnorukam
Follow
Feb 10
How I Unified Bug Bounty Scanning Across HackerOne, Intigriti, and Bugcrowd
#
bugbounty
#
hackerone
#
intigriti
#
bugcrowd
Comments
Add Comment
5 min read
How I Built a Multi-Agent Bug Bounty Automation System
Chudi Nnorukam
Chudi Nnorukam
Chudi Nnorukam
Follow
Feb 10
How I Built a Multi-Agent Bug Bounty Automation System
#
bugbounty
#
ai
#
automation
#
security
Comments
Add Comment
9 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account