Securitycipher's Avatar

Securitycipher

@securitycipher

πŸ“ƒ Write-ups and Resources πŸš€ related to Bug BountyπŸ’² #bugbounty #bugbountytips

163
Followers
9
Following
6,691
Posts
23.11.2024
Joined
Posts Following

Latest posts by Securitycipher @securitycipher

m00nwalk2 .. picoCTF

https://medium.com/@O.Adel/m00nwalk2-picoctf-6326b4211c51?source=rss------bug_bounty-5

13.03.2026 13:50 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Digital Forensics & Steganography: Live Cyber Investigation Demonstration

https://medium.com/@cyberb354/digital-forensics-steganography-live-cyber-investigation-demonstration-13613e126033?source=rss------bug_bounty-5

13.03.2026 12:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

The Cybersecurity Career Roadmap Most Beginners Follow Is Designed to Keep Them Beginners β€” Here Is…

https://medium.com/@R.H_Rizvi/the-cybersecurity-career-roadmap-most-beginners-follow-is-designed-to-keep-them-beginners-here-is-58f34caa7003?source=rss------bug_bounty-5

13.03.2026 11:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Critical Splunk RCE Vulnerability (CVE-2026–20163) Lets Attackers Run Shell Commands on Your Server

https://medium.com/@EternalSec/critical-splunk-rce-vulnerability-cve-2026-20163-lets-attackers-run-shell-commands-on-your-server-244fcbe3497d?source=rss------bug_bounty-5

13.03.2026 10:22 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Chaining SQLi into RCE β€” A Lab Case Study

https://medium.com/@Shatha511/chaining-sqli-into-rce-a-lab-case-study-23590bb23a3a?source=rss------bug_bounty-5

13.03.2026 08:25 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Logic Flaw in Meta Account Center: The Case of the Silent Patched Disavow Flow

https://evangeliux.medium.com/logic-flaw-in-meta-account-center-the-case-of-the-silent-patched-disavow-flow-715a0662775f?source=rss------bug_bounty-5

13.03.2026 07:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

How I Exploited Three API Vulnerabilities in a Banking Application

https://adeolaodunlade.medium.com/how-i-exploited-three-api-vulnerabilities-in-a-banking-application-5ceff7c70449?source=rss------bug_bounty-5

13.03.2026 06:36 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Authorization Bypass in Starknet Snap via enableAuthorize parameter leads to unauthorized transaction signing

https://hackerone.com/reports/3507241

13.03.2026 04:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Lab: Reflected XSS into HTML context with all tags blocked except custom ones

https://medium.com/@may.hack/lab-reflected-xss-into-html-context-with-all-tags-blocked-except-custom-ones-c6be6f71b741?source=rss------bug_bounty-5

13.03.2026 04:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

GuΓ­a Maestra de SQL Injection (SQLi): Tipos, Payloads y TΓ©cnicas de EvasiΓ³n

https://medium.com/@jpablo13/gu%C3%ADa-maestra-de-sql-injection-sqli-tipos-payloads-y-t%C3%A9cnicas-de-evasi%C3%B3n-f1640ccdeac4?source=rss------bug_bounty-5

13.03.2026 01:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

‍♂️How I Escalated From Domain User to Domain Admin

https://medium.com/@jabaribrown62/%EF%B8%8F-how-i-escalated-from-domain-user-to-domain-admin-c62488453360?source=rss------bug_bounty-5

12.03.2026 23:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Security Practicals: Complete Walkthrough

https://medium.com/@hithaishi_sp/security-practicals-complete-walkthrough-7dde53c961ae?source=rss------bug_bounty-5

12.03.2026 21:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Mapping the GraphQL Attack Surface: Schema Enumeration, Batch Abuse, and Resolver Explosions

https://medium.com/@ommkoli00/mapping-the-graphql-attack-surface-schema-enumeration-batch-abuse-and-resolver-explosions-285714610185?source=rss------bug_bounty-5

12.03.2026 20:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

SQL Injection vulnerability found on ibm.com endpoint

https://hackerone.com/reports/3578842

12.03.2026 19:37 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

CORS End-to-End: How Browsers Enforce It, How Attackers Break It, How Devs Fix It

https://medium.com/@ivickybishnoi29/cors-end-to-end-how-browsers-enforce-it-how-attackers-break-it-how-devs-fix-it-cea4b77e6028?source=rss------bug_bounty-5

12.03.2026 19:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Discovering OTP Validation Bypass and IDOR in a Data Export Function

https://medium.com/@nyany032/discovering-otp-validation-bypass-and-idor-in-a-data-export-function-83235fe7ba82?source=rss------bug_bounty-5

12.03.2026 18:35 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Curl_compareheader() fails to match multi-value HTTP headers

https://hackerone.com/reports/3598444

12.03.2026 16:52 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

When Multi-Tenant Isolation Completely Falls Apart

https://mixbanana.medium.com/when-multi-tenant-isolation-completely-falls-apart-2b969110d400?source=rss------bug_bounty-5

12.03.2026 14:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Bug Bounty Hunting β€” Complete Guide (Part-167)

https://medium.com/@rafid19/bug-bounty-hunting-complete-guide-part-167-0dcbe527fd69?source=rss------bug_bounty-5

12.03.2026 13:53 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

File Upload Vulnerabilities: Tricks, Attacks, and How to Harden Your Uploads

https://medium.com/@verylazytech/file-upload-vulnerabilities-tricks-attacks-and-how-to-harden-your-uploads-7862eba3c549?source=rss------bug_bounty-5

12.03.2026 11:23 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Bypass of Open Redirect Fix on lovable.dev via /..// Path Traversal in redirect parameter

https://hackerone.com/reports/3599248

12.03.2026 10:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

⚑ Automating Web Security Testing with OWASP ZAP
A Beginner-Friendly Guide for Bug Bounty…

https://medium.com/bug-bounty-hunting-a-comprehensive-guide-in/automating-web-security-testing-with-owasp-zap-a-beginner-friendly-guide-for-bug-bounty-d57f40a53e11?source=rss------bug_bounty-5

12.03.2026 07:37 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Web Security Series #1 β€” Exploiting Authentication Using a Brute-Force Attack

https://medium.com/@laibakashif0011/web-security-series-1-exploiting-authentication-using-a-brute-force-attack-ff4fa1bd3203?source=rss------bug_bounty-5

12.03.2026 06:38 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

[Kubernetes for Everyone] β€” Exploiting Grafana (CVE-2021-43798) To Gain SSH Access and Extract…

https://meetcyber.net/kubernetes-for-everyone-exploiting-grafana-cve-2021-43798-to-gain-ssh-access-and-extract-c3f02bb2ff8b?source=rss------bug_bounty-5

12.03.2026 05:09 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Things I Always Check When Testing a Login Page

https://medium.com/@vedanthore/things-i-always-check-when-testing-a-login-page-fcdedc79573a?source=rss------bug_bounty-5

12.03.2026 03:26 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

NULL Pointer Dereference (DoS) in libcurl SFTP QUOTE command parsing due to missing return statement

https://hackerone.com/reports/3597359

11.03.2026 23:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Web3 Security Careers: Smart Contract Auditors vs Security Researchers

https://coinsbench.com/web3-security-careers-smart-contract-auditors-vs-security-researchers-d8361759011a?source=rss------bug_bounty-5

11.03.2026 22:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

The 3 Levels of AI Autonomy Nobody Explains Honestly β€” And Why Getting Them Wrong Breaks Every…

https://medium.com/@R.H_Rizvi/the-3-levels-of-ai-autonomy-nobody-explains-honestly-and-why-getting-them-wrong-breaks-every-aba51e75b770?source=rss------bug_bounty-5

11.03.2026 20:20 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Proving Grounds β€” Hokkaido (OSCP Prep)

https://medium.com/@SilentExploit/proving-grounds-hokkaido-oscp-prep-7916d15393d5?source=rss------bug_bounty-5

11.03.2026 19:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Mapping the Attackers Before Mapping the Application

https://infosecwriteups.com/mapping-the-attackers-before-mapping-the-application-af002d1d396b?source=rss------bug_bounty-5

11.03.2026 18:37 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0