Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
bugbounty
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
🧭 Selecting the Right Bug Bounty Targets & Reconnaissance
Trumpiter
Trumpiter
Trumpiter
Follow
Jun 2
🧭 Selecting the Right Bug Bounty Targets & Reconnaissance
#
bugbounty
#
security
Comments
Add Comment
24 min read
🐞 Comprehensive Bug Bounty Hunting Methodology
Trumpiter
Trumpiter
Trumpiter
Follow
Jun 2
🐞 Comprehensive Bug Bounty Hunting Methodology
#
bugbounty
#
security
Comments
Add Comment
32 min read
Final Tale: Part 3 - The Gateways We Left Open
Peter Davis
Peter Davis
Peter Davis
Follow
May 30
Final Tale: Part 3 - The Gateways We Left Open
#
infosec
#
git
#
bitbucket
#
bugbounty
5
reactions
Comments
Add Comment
5 min read
🚀 Introducing Astra v1.1 – Local, Powerful, and Now Even More Flexible
Bhawesh Chaudhary
Bhawesh Chaudhary
Bhawesh Chaudhary
Follow
May 18
🚀 Introducing Astra v1.1 – Local, Powerful, and Now Even More Flexible
#
cybersecurity
#
astra
#
bugbounty
#
recon
Comments
Add Comment
2 min read
Git Tales: Secrets in the Shadows
Peter Davis
Peter Davis
Peter Davis
Follow
Apr 29
Git Tales: Secrets in the Shadows
#
bugbounty
#
infosec
#
pentest
#
sourcecodereview
2
reactions
Comments
Add Comment
3 min read
How to Use Burp Suite for Bug Bounty Hunting: A Beginner-Friendly Guide
Sampa Kundu
Sampa Kundu
Sampa Kundu
Follow
Apr 22
How to Use Burp Suite for Bug Bounty Hunting: A Beginner-Friendly Guide
#
burpsuite
#
bugbounty
#
cybersecurity
Comments
Add Comment
1 min read
How I found my "First Bug" in a public bug bounty program
Blue Byte
Blue Byte
Blue Byte
Follow
Apr 18
How I found my "First Bug" in a public bug bounty program
#
bugbounty
#
jwt
#
hashcat
#
firstbug
Comments
Add Comment
2 min read
Web Cache Deception Attacks
Blue Byte
Blue Byte
Blue Byte
Follow
May 9
Web Cache Deception Attacks
#
hacking
#
pentest
#
bugbounty
#
cybersecurity
Comments
Add Comment
2 min read
Git Tales: Part 2 - Demons in the Cloud
Peter Davis
Peter Davis
Peter Davis
Follow
May 9
Git Tales: Part 2 - Demons in the Cloud
#
bugbounty
#
infosec
#
cloudsecurity
#
pentest
3
reactions
Comments
Add Comment
5 min read
Credential Dumping Applications: What They Are, How They Work, and How to Defend Against Them
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Jun 5
Credential Dumping Applications: What They Are, How They Work, and How to Defend Against Them
#
cybersecurity
#
security
#
bugbounty
5
reactions
Comments
2
comments
1 min read
Next.js Middleware Broken Access Controls
Blue Byte
Blue Byte
Blue Byte
Follow
Mar 27
Next.js Middleware Broken Access Controls
#
nextjs
#
bugbounty
#
pentest
#
hacking
Comments
Add Comment
1 min read
(Ⅱ) Android Identity Authentication
TECNO Security
TECNO Security
TECNO Security
Follow
Mar 26
(Ⅱ) Android Identity Authentication
#
security
#
cybersecurity
#
bugbounty
#
development
Comments
Add Comment
2 min read
Bug Bounty 2025: The Unfiltered Roadmap to Hunting Success
linuxmobile ( リナックス )
linuxmobile ( リナックス )
linuxmobile ( リナックス )
Follow
Mar 30
Bug Bounty 2025: The Unfiltered Roadmap to Hunting Success
#
programming
#
bountyhunter
#
bugbounty
#
webdev
3
reactions
Comments
Add Comment
17 min read
2FA Bypass via Response Manipulation
Blue Byte
Blue Byte
Blue Byte
Follow
Feb 24
2FA Bypass via Response Manipulation
#
bugbounty
#
pentest
#
2fa
#
mfa
Comments
Add Comment
1 min read
【Recognition】Excellent Security Researcher in January 2025 iiiiiinv
TECNO Security
TECNO Security
TECNO Security
Follow
Feb 21
【Recognition】Excellent Security Researcher in January 2025 iiiiiinv
#
security
#
cybersecurity
#
bugbounty
Comments
Add Comment
1 min read
Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param
Blue Byte
Blue Byte
Blue Byte
Follow
Feb 19
Easy Bug: Open-Redirect on OAuth 2.0 redirect_uri param
#
bugbounty
#
oauth
#
openredirect
#
authentication
Comments
Add Comment
1 min read
Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover
Blue Byte
Blue Byte
Blue Byte
Follow
Feb 17
Attacking Misconfigured Amazon Cognito: Zero-Click Account Takeover
#
aws
#
cognito
#
cloud
#
bugbounty
Comments
Add Comment
2 min read
AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks
Aditya Tripathi
Aditya Tripathi
Aditya Tripathi
Follow
Feb 1
AI-Powered Ransomware: How Hackers Are Using Artificial Intelligence to Launch Attacks
#
cybersecurity
#
ransomware
#
ethicalhacking
#
bugbounty
Comments
Add Comment
4 min read
Comprehensive CEH v13 Study Guide
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Feb 23
Comprehensive CEH v13 Study Guide
#
cybersecurity
#
bugbounty
6
reactions
Comments
Add Comment
4 min read
25000$ IDOR: How a Simple ID Enumeration Exposed Private Data
Karthikeyan Nagaraj
Karthikeyan Nagaraj
Karthikeyan Nagaraj
Follow
Feb 22
25000$ IDOR: How a Simple ID Enumeration Exposed Private Data
#
webdev
#
bugbounty
#
cybersecurity
1
reaction
Comments
Add Comment
1 min read
Top 7 Payloads lists Every Bug Bounty Hunter Need To Know
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Feb 18
Top 7 Payloads lists Every Bug Bounty Hunter Need To Know
#
bugbounty
#
cybersecurity
6
reactions
Comments
Add Comment
3 min read
Easy RCE with LaTeX via file upload
Blue Byte
Blue Byte
Blue Byte
Follow
Feb 13
Easy RCE with LaTeX via file upload
#
bugbounty
#
latex
#
rce
#
swagger
Comments
Add Comment
2 min read
Path traversal via alias misconfiguration in Nginx
Blue Byte
Blue Byte
Blue Byte
Follow
Jan 19
Path traversal via alias misconfiguration in Nginx
#
nginx
#
hacking
#
bugbounty
#
reverseproxy
Comments
Add Comment
1 min read
Some handy notes for GCP pentesting
Bruno
Bruno
Bruno
Follow
Nov 19 '24
Some handy notes for GCP pentesting
#
security
#
infosec
#
bugbounty
Comments
Add Comment
1 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon
Genius_InTrouble
Genius_InTrouble
Genius_InTrouble
Follow
Nov 6 '24
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon
#
webdev
#
security
#
beginners
#
bugbounty
6
reactions
Comments
Add Comment
4 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account