bars
Biscuit's Bug Bounty Playbook
search
circle-xmark
⌘
Ctrl
k
copy
Copy
chevron-down
Bug Bounty Reports & Articles
9️⃣
Miscellaneous Reports
Дослідження безпеки подарункових карток
SecurityRise
chevron-right
Client Side Path Traversal (CSPT) Bug Bounty Reports and Techniques
Medium
chevron-right
Redacted bugs #3: Полювання на баги вартістю $7,750 у додатку для дорослих
SecurityRise
chevron-right
How to get easy $$$ from bug bounty ( Web Parameter Tampering )
Medium
chevron-right
Zoom Session Takeover - Cookie Tossing Payloads, OAuth Dirty Dancing, Browser Permissions Hijacking, and WAF abuse
Harel Security Research
chevron-right
🔎 aem bug medium - Google Search
www.google.com
chevron-right
Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies
Medium
chevron-right
How you could get hacked at a coffee shop. – mqst
www.muqsitbaig.com
chevron-right
HackerOne disclosed on HackerOne: LLM03: Training Data Poisoning...
HackerOne
chevron-right
Using YouTube to steal your files
lyra's epic blog
chevron-right
I’m Lovin’ It: Exploiting McDonald’s APIs to hijack deliveries and order food for a penny
eaton-works.com
chevron-right
Hacking Swagger UI - 101
Medium
chevron-right
LDAP — Ports 389, 636, 3268, 3269 — How to exploit?
Medium
chevron-right
https://freedium.cfd/https://medium.com/@loyalonlytoday/7a6562df2aba
freedium.cfd
chevron-right
Privilege Escalation using Client-Side Path Traversal
Medium
chevron-right
Rate Limit Bypass using Tor Network
Medium
chevron-right
IP Leakage Write-up - s8n
0xs8n.github.io
chevron-right
Previous
Web Socket
chevron-left
Next
IDN Homograph Attack
chevron-right
Last updated
2 months ago
sun-bright
desktop
moon
sun-bright
desktop
moon