
Medium | Bug Bounty
43 FOLLOWERS
Discover smart, unique perspectives on bug bounty and the topics that matter most to you like cybersecurity, hacking, security, infosec, bug bounty tips, ethical hacking, penetration testing, pentesting, and vulnerability. We're an open platform where over 100 million readers come to find insightful and dynamic thinking. Our purpose is to spread these ideas and deepen our understanding of the..
Medium | Bug Bounty
5d ago
First off, I want to say a big thank you for the incredible support on my first blog. I really appreciate it. If you haven’t had a chance ..read more
Medium | Bug Bounty
5d ago
In this article, I would like to cover how it is possible to efficiently check thousands of endpoints for potential Cross Site Scripting ..read more
Medium | Bug Bounty
5d ago
Endpoint Detection and Response (EDR) solutions play a critical role in cybersecurity, providing organizations with the ability to monitor ..read more
Medium | Bug Bounty
5d ago
A comprehensive analysis of Subdomain Takeovers (SDTO), DNS Hijacking, Dangling DNS, CNAME misconfigurations ..read more
Medium | Bug Bounty
5d ago
Greetings fellow hackers, my name is Sandy, Security Analyst and Bug bounty hunter ..read more
Medium | Bug Bounty
5d ago
Greetings fellow hackers, my name is Sandy, Security Analyst and Bug bounty hunter ..read more
Medium | Bug Bounty
2w ago
This lab has a horizontal privilege escalation vulnerability on the user account page. To solve the lab, obtain the API key for the user ..read more
Medium | Bug Bounty
2w ago
First off, I want to say a big thank you for the incredible support on my first blog. I really appreciate it. If you haven’t had a chance ..read more
Medium | Bug Bounty
2w ago
This lab has a horizontal privilege escalation vulnerability on the user account page. To solve the lab, obtain the API key for the user ..read more