Biscuit's Bug Bounty Playbook
CtrlK
  • 👋Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • 🧾Resume For Cyber Security Freshie
    • 📗Browser extension For Bug Bounty
    • 📀POC Videos YT Channel
    • 📺55 YouTube Channels To Learn Hacking
    • 👀Hackers to Follow on Social Media
      • Twitter
      • Medium
      • YouTube
      • GitHub
      • Discord Server
      • Security GitBooks
    • 🏅Learn The Basics
      • 🎖️Type Of Cyber Security
      • 🥈Common Job Roles
      • 🥉Get Started With InfoSec
      • ⚕️Best Bug Bounty Platform
      • 🗞️Best InfoSec Writeups Website
      • 🍪Hacking Books
      • 🥂CLI Commands
      • 💿Learn WSL
    • 👩‍💻Fun Programming Codes
    • 🔮Build your own Bug Bounty Methodology
    • 🎴Bug Bounty Checklist
    • 😼JS Analysis for Bug Bounty
  • 🟧Learn to Use Burp Suite
  • Learn Android Bug Bounty
    • 🎥Video Tutorials
  • ❤️YouTube Channels
  • 📰Bug Bounty Reports
  • 📚Blogs & Writeups
  • 🏹GitHub Repository
  • 👨‍👨‍👧Conference Talks
  • 🖨️Automated Scanners
  • ⚙️Intentionally Vulnerable Apps
  • 🎱Learn Drozer For Android Pentesting
  • 🪀Learn Frida For Android Pentesting
  • 🏈Bypassing Security Protections in APKs via Objection and Frida
  • 🪁Security Tools For Android Pentesting
  • 😼PIDCAT for Android Bug Bounty Logging
  • 🎹CLI Commands & Shortcuts
  • My Android Bug Bounty Lab Setup
  • Learn Thick Client Pentesting
    • 🟥Introduction Videos
  • 📑Introduction Articles
  • ✅Pentesting Checklist
  • 📚Bug Bounty Writeups
  • 🐞Thick Client Vulnerabilities
    • DLL Hijacking Basics
  • 🥼Intentionally vulnerable labs
  • 🛠️Tools for Thick Client Pentesting
  • 🏠Bug Bounty Programs with Thick Client Scope
  • 💵Paid Udemy Course
  • Bug Bounty Reports & Articles
    • 0️⃣Index
    • 1️⃣Takeover's (Accounts, Sub-domains, etc)
      • 🚡Sub Domain Takeover
      • 🚠Account Takeover
      • 🚟dependency confusion vulnerability
    • 2️⃣IDOR (Indirect Object Reference)
    • 3️⃣Leaks & Disclosure (PII, API Key, etc)
    • 4️⃣Open Redirects
    • 5️⃣Request Forgery (CSRF & SSRF)
      • 🟢CSRF
      • 🔴SSRF
    • 6️⃣Injections (HTML, XSS, etc)
      • 🟡XSS
      • 🟠HTML Injection
      • ⚫SQL Injection
      • 🟣CR/LF Injection
      • 🟢SSTI
      • 🔴Host Header Injection
      • 🔵CSV Injection
    • 7️⃣Broken Access Control & Broken Authentication
      • ⚙️File Upload Functionality
      • ⚙️Password Reset Functionality
      • ⚙️2FA Functionality
      • ⚙️Oauth Functionality
      • ⚙️Bypassing
      • ⚙️Misconfiguration
      • ⚙️Captcha Bypass
      • ⚙️Business Logic Flow
    • 8️⃣Web Socket
    • 9️⃣Miscellaneous Reports
    • 🔟IDN Homograph Attack
    • 🧻User-Role Management Issue
    • 0️Cloud
      • 🌩️AWS S3
    • 1️Low Hanging Fruits
    • 2️Cache Vulnerabilities
    • 3️DOS/DDOS
  • 4️Forced Browsing
  • 5️RCE
  • 6️OSINT
  • Bug Bounty Platforms
    • 🐛BugCrowd
    • 🐞HackerOne
    • 🐝Intigriti
    • 🐜Open Bug Bounty
  • Exploiting Technologies
    • 0️⃣Introduction
    • 1️⃣Wordpress
    • 2️⃣GraphQL API
    • 3️⃣IDOR Vulnerability
Powered by GitBook
On this page
  1. Bug Bounty Reports & Articles

3️⃣Leaks & Disclosure (PII, API Key, etc)

LogoHunting JavaScript File for Bug HuntersMedium
https://medium.com/@realm3ter/analyzing-javascript-files-to-find-bugs-820167476ffemedium.com
LogoHow to look for JS files Vulnerability for fun and profit?Medium
LogoGit Directory Exposed Leads to Credentials DisclosureMedium
LogoJS for Bug Bounties 2.0 Extreme Edition 2024Medium
LogoJS is love ❤️.Medium
Logo25+ users sensitive information disclosed by waybackurlsMedium
LogoInformation DisclosureMedium
LogoPlaintext Storage of a Password Lead to sensitive data leakageMedium
LogoThis is the easiest bug you can find right now.Medium
LogoIDOR lead to PII DisclosureMedium
LogoUnauthenticated Massive PII LeakMedium
LogoLogitech disclosed on HackerOne: Sensitive information disclosure...HackerOne
LogoDeriv.com disclosed on HackerOne: login to any user's cashier...HackerOne
LogoX / xAI disclosed on HackerOne: Information Disclosure through...HackerOne
LogoInformation Disclosure: Story of 500€ + 400$ BountyMedium
LogoP1 Vulnerability in 60 secondsMedium
LogoHow I Found a Bug under 3 mins , that could risk the reputation of an entire organisation !Medium
LogoHow to find the Origin IPMedium
https://0xk4tedu.medium.com/how-i-can-easily-get-four-p1-at-nasa-using-simple-google-dorking-d4457bec19710xk4tedu.medium.com
LogoHow I Discovered a PII Leak in a Developer PlatformMedium
PreviousIDOR (Indirect Object Reference)NextOpen Redirects

Last updated 7 days ago