portswigger.net/research/sha...
40+ Google Dorks For Low Hanging Fruits
https://bitpanic.medium.com/40-google-dorks-for-low-hanging-fruits-d8fc3d5d7a8d?source=rss------bug_bounty-5
Amazing swag π€ thanks @yeswehack.bsky.social #bugbounty
Articles worth reading discovered last week:
π flatt.tech/research/pos...
π snyk.io/articles/rem...
π nastystereo.com/security/rub...
π blog.doyensec.com/2024/12/03/c...
π nastystereo.com/security/r-s...
π satoooon1024.hatenablog.com/entry/2024/1...
π portswigger.net/research/byp...
Did you know you can use an ancient magic cookie to downgrade parsers and bypass WAFs?! Hope you enjoy this quality bit of RFC-diving from @d4d89704243.bsky.social!
portswigger.net/research/byp...
π¨ CORS vulnerabilities in Go π¨
Misusing strings.HasSuffix, Contains, or HasPrefix? You might be leaving the door wide open! π
Learn how these patterns lead to bypasses ππ
π pentesterlab.com/blog/golang-...
A mindmap with the following text https://tl.gd/n_1ss2vji
What is an API? What makes them special? And what kind of APIs are out there? #apisecurity #apis #bugbountytips #BugBounty
Just got a reward for a high vulnerability submitted on @yeswehack.bsky.social -- Violation of Secure Design Principles (CWE-657). yeswehack.com/hunters/drak... #YesWeRHackers #bugbounty
github.com/drak3hft7/Ch... #cybersecurity #offensivesec #activedirectory
Encoding isn't magic β¨: It doesnβt bypass filters or hack systems unless something decodes it.
Learn how to avoid this common security misconception:
pentesterlab.com/blog/encodin...
#AppSec #CyberSecurity #BugBounty