Biscuit's Bug Bounty Playbook
Ctrl
K
Copy
Bug Bounty Reports & Articles
9️⃣
Miscellaneous Reports
Дослідження безпеки подарункових карток
SecurityRise
Client Side Path Traversal (CSPT) Bug Bounty Reports and Techniques
Medium
Redacted bugs #3: Полювання на баги вартістю $7,750 у додатку для дорослих
SecurityRise
How to get easy $$$ from bug bounty ( Web Parameter Tampering )
Medium
Zoom Session Takeover - Cookie Tossing Payloads, OAuth Dirty Dancing, Browser Permissions Hijacking, and WAF abuse
Harel Security Research
🔎 aem bug medium - Google Search
www.google.com
Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies
Medium
How you could get hacked at a coffee shop | Cyber Security | Muqsit Baig
mqst
HackerOne disclosed on HackerOne: LLM03: Training Data Poisoning...
HackerOne
Using YouTube to steal your files
lyra's epic blog
I’m Lovin’ It: Exploiting McDonald’s APIs to hijack deliveries and order food for a penny
eaton-works.com
Hacking Swagger UI - 101
Medium
LDAP — Ports 389, 636, 3268, 3269 — How to exploit?
Medium
A list of good wordlists for bug bounty hunters | by loyalonlytoday - Freedium
freedium.cfd
Privilege Escalation using Client-Side Path Traversal
Medium
Rate Limit Bypass using Tor Network
Medium
Previous
Web Socket
Next
IDN Homograph Attack
Last updated
7 days ago