CyferNest Sec🚨 URGENT: First PoC Exploit of 2025 Targets Critical Windows Vulnerability CVE-2024–49113 (“LDAP…New year, same cybersecurity drama — but this one is a blockbuster! Meet CVE-2024–49113, aka the terrifyingly catchy “LDAP Nightmare.”…Jan 41357Jan 41357
InMeetCyberbyAbhirupKonwarHow I got access to Credentials easilyElite Google Dorking🥷Dec 2, 20244996Dec 2, 20244996
InSystem WeaknessbyVery Lazy Tech 👾Google Dorks for Bug Bounty: The Ultimate GuideBug bounty hunting is all about uncovering vulnerabilities in systems and applications. But did you know you could use Google to unearth…Nov 25, 2024751Nov 25, 2024751
Mohammed DiefHow I do my recon and end up finding hidden assets and vulnerabilities before anyone else Pt.2The secret to bug bounty is literally recon and automation, I remember days where I would just code and chill all day just to come at night…Nov 24, 20242891Nov 24, 20242891
Mohammed DiefHow I do my recon and end up finding hidden assets and vulnerabilities before anyone else Pt.1As most of you knows I been doing bug bounties for more than 5 years, and I would say 30-40% of the vulnerabilities I found was because of…Oct 16, 20245577Oct 16, 20245577
InOSINT TeambySri Shavin KumarP3 (Medium) : How I Gain Access To NASA's Internal Workspace?!Sep 3, 20244923Sep 3, 20244923
Bashir Mohamed (BlackPanther87)From 401 — Unauthorized Access to 3000 $ Bounty from Microsoft.Hi everyone, this is my very first writeup on Medium.Oct 8, 20244766Oct 8, 20244766
zack0x01Find XSS on the Fly 🔥( Full guide )Discover my comprehensive guide on identifying all types of XSS vulnerabilities, including stored, reflected, and DOM-based XSS.Jul 8, 20247787Jul 8, 20247787
#$ubh@nk@rFile Upload (RCE) to Bounty | HackerOneIntro : Hello Hacker’s😀 what’s up! Hope you are all Fine. Today I am gonna show you how do I get a RCE Vulnerability in a Endpoint that…Oct 1, 20243115Oct 1, 20243115
Facundo FernandezCritical Information Disclosure Vulnerability via CNAME (AUTOMATED SCAN)Hi there,Oct 3, 20243335Oct 3, 20243335
Sugam DangalEasiest P3/P4 security misconfiguration to make $$ as a beginner.Hey guys, hope you’re doing well. Today I’ll be sharing about the a low hanging bug that could easily make you few hundred $$ as a…Aug 7, 20242042Aug 7, 20242042
InInfoSec Write-upsbyPh.HitachiHow i Find Database Credentials via Mass Recon & Recon Scoping on GcashHi guys,Apr 22, 20247118Apr 22, 20247118
InInfoSec Write-upsbyOm AroraRECON IS IMPORTANT !!! In Depth Recon Methodology Bug Bounty Part 01Hello Everyone,Jul 12, 202453910Jul 12, 202453910
InInfoSec Write-upsbyAbhi SharmaBypass Rate Limit on authentication endpoints like a pro………!Feb 24, 20247563Feb 24, 20247563
Chux5 Advanced Ways I Test For File Upload VulnerabilitiesAs red teamers, pentesters and bug hunters — we all love to see file upload functionalities in our targets. There are many things that can…Mar 22, 20245105Mar 22, 20245105
Pronay BiswasThe Ultimate Guide to Chaining Bugs: How I Found a XSS in a Bug Bounty ProgramBug Bounty HuntingJun 9, 2024563Jun 9, 2024563
Very Lazy Tech 👾POC — CVE-2024–4956 -Unauthenticated Path TraversalPOC — CVE-2024–4956 — Nexus Repository Manager 3 Unauthenticated Path TraversalJun 10, 2024501Jun 10, 2024501
an0nbilThe only recon methodology you need.the best way to recon using just one tool.Jun 6, 20247303Jun 6, 20247303
InInfoSec Write-upsbywhit3ros3How I Got My First Bounty: The Exciting Story of My Bug Bounty BreakthroughLong time no see! I’ve been a bit preoccupied with other tasks besides bug bounty hunting, so I haven’t had the chance to post any blogs…May 15, 20242915May 15, 20242915