CyferNest Sec🚨 URGENT: First PoC Exploit of 2025 Targets Critical Windows Vulnerability CVE-2024–49113 (“LDAP…New year, same cybersecurity drama — but this one is a blockbuster! Meet CVE-2024–49113, aka the terrifyingly catchy “LDAP Nightmare.”…Jan 47Jan 47
InMeetCyberbyAbhirupKonwarHow I got access to Credentials easilyElite Google Dorking🥷Dec 2, 20246Dec 2, 20246
InSystem WeaknessbyVery Lazy Tech 👾Google Dorks for Bug Bounty: The Ultimate GuideBug bounty hunting is all about uncovering vulnerabilities in systems and applications. But did you know you could use Google to unearth…Nov 25, 20241Nov 25, 20241
Mohammed DiefHow I do my recon and end up finding hidden assets and vulnerabilities before anyone else Pt.2The secret to bug bounty is literally recon and automation, I remember days where I would just code and chill all day just to come at night…Nov 24, 20241Nov 24, 20241
Mohammed DiefHow I do my recon and end up finding hidden assets and vulnerabilities before anyone else Pt.1As most of you knows I been doing bug bounties for more than 5 years, and I would say 30-40% of the vulnerabilities I found was because of…Oct 16, 20247Oct 16, 20247
InOSINT TeambySri Shavin KumarP3 (Medium) : How I Gain Access To NASA's Internal Workspace?!Sep 3, 20243Sep 3, 20243
Bashir Mohamed (BlackPanther87)From 401 — Unauthorized Access to 3000 $ Bounty from Microsoft.Hi everyone, this is my very first writeup on Medium.Oct 8, 20246Oct 8, 20246
zack0x01Find XSS on the Fly 🔥( Full guide )Discover my comprehensive guide on identifying all types of XSS vulnerabilities, including stored, reflected, and DOM-based XSS.Jul 8, 20246Jul 8, 20246
#$ubh@nk@rFile Upload (RCE) to Bounty | HackerOneIntro : Hello Hacker’s😀 what’s up! Hope you are all Fine. Today I am gonna show you how do I get a RCE Vulnerability in a Endpoint that…Oct 1, 20245Oct 1, 20245
Facundo FernandezCritical Information Disclosure Vulnerability via CNAME (AUTOMATED SCAN)Hi there,Oct 3, 20245Oct 3, 20245
Sugam DangalEasiest P3/P4 security misconfiguration to make $$ as a beginner.Hey guys, hope you’re doing well. Today I’ll be sharing about the a low hanging bug that could easily make you few hundred $$ as a…Aug 7, 20242Aug 7, 20242
InInfoSec Write-upsbyPh.HitachiHow i Find Database Credentials via Mass Recon & Recon Scoping on GcashHi guys,Apr 22, 20248Apr 22, 20248
InInfoSec Write-upsbyOm AroraRECON IS IMPORTANT !!! In Depth Recon Methodology Bug Bounty Part 01Hello Everyone,Jul 12, 202410Jul 12, 202410
InInfoSec Write-upsbyAbhi SharmaBypass Rate Limit on authentication endpoints like a pro………!Feb 24, 20243Feb 24, 20243
Chux5 Advanced Ways I Test For File Upload VulnerabilitiesAs red teamers, pentesters and bug hunters — we all love to see file upload functionalities in our targets. There are many things that can…Mar 22, 20245Mar 22, 20245
Pronay BiswasThe Ultimate Guide to Chaining Bugs: How I Found a Reverse Shell in a Bug Bounty ProgramBug Bounty HuntingJun 9, 20243Jun 9, 20243
Very Lazy Tech 👾POC — CVE-2024–4956 -Unauthenticated Path TraversalPOC — CVE-2024–4956 — Nexus Repository Manager 3 Unauthenticated Path TraversalJun 10, 20241Jun 10, 20241
an0nbilThe only recon methodology you need.the best way to recon using just one tool.Jun 6, 20242Jun 6, 20242
InInfoSec Write-upsbywhit3ros3How I Got My First Bounty: The Exciting Story of My Bug Bounty BreakthroughLong time no see! I’ve been a bit preoccupied with other tasks besides bug bounty hunting, so I haven’t had the chance to post any blogs…May 15, 20245May 15, 20245