Address
:
[go:
up one dir
,
main page
]
Include Form
Remove Scripts
Accept Cookies
Show Images
Show Referer
Rotate13
Base64
Strip Meta
Strip Title
Session Cookies
Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
bugbounty
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How I found an XXE in a multi-tenant cloud platform through a translation file upload
Simon Köck
Simon Köck
Simon Köck
Follow
Apr 8
How I found an XXE in a multi-tenant cloud platform through a translation file upload
#
security
#
xxe
#
java
#
bugbounty
Comments
Add Comment
1 min read
WaspSting - Penetration Testing & Bug Bounty Tool
Bristie
Bristie
Bristie
Follow
Mar 23
WaspSting - Penetration Testing & Bug Bounty Tool
#
bugbounty
#
security
#
python
#
opensource
Comments
Add Comment
9 min read
5 AI Agents vs Tesla: P1 Vulnerability Found in 38 Minutes
Bridge ACE
Bridge ACE
Bridge ACE
Follow
Mar 18
5 AI Agents vs Tesla: P1 Vulnerability Found in 38 Minutes
#
security
#
ai
#
bugbounty
#
tesla
Comments
Add Comment
2 min read
5 AI Agents vs Tesla: How We Found a P1 Vulnerability in 38 Minutes
Bridge ACE
Bridge ACE
Bridge ACE
Follow
Mar 18
5 AI Agents vs Tesla: How We Found a P1 Vulnerability in 38 Minutes
#
security
#
ai
#
bugbounty
#
opensource
Comments
Add Comment
3 min read
I Let AI Agents Run My Bug Bounty Program. Here Is What Happened.
Bridge ACE
Bridge ACE
Bridge ACE
Follow
Mar 18
I Let AI Agents Run My Bug Bounty Program. Here Is What Happened.
#
security
#
ai
#
bugbounty
#
opensource
Comments
Add Comment
2 min read
Passive Recon â How I Map Targets Without Ever Touching Them
Amrit Sinha
Amrit Sinha
Amrit Sinha
Follow
Mar 12
Passive Recon â How I Map Targets Without Ever Touching Them
#
security
#
bugbounty
#
osint
#
cybersecurity
1
 reaction
Comments
Add Comment
4 min read
Your Robot Vacuum Is Watching You: The $30K Hack That Exposed Thousands of Smart Homes
Kunal
Kunal
Kunal
Follow
Mar 7
Your Robot Vacuum Is Watching You: The $30K Hack That Exposed Thousands of Smart Homes
#
cybersecurity
#
iot
#
smarthome
#
bugbounty
1
 reaction
Comments
Add Comment
6 min read
Subdomain Enumeration in 2026: Tools, Techniques, and What Actually Works
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 7
Subdomain Enumeration in 2026: Tools, Techniques, and What Actually Works
#
security
#
bugbounty
#
webdev
#
tutorial
Comments
Add Comment
8 min read
Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories
Sidhanta Palei
Sidhanta Palei
Sidhanta Palei
Follow
Mar 6
Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories
#
security
#
cybersecurity
#
bugbounty
#
opensource
1
 reaction
Comments
Add Comment
4 min read
DOM XSS: Why Server-Side Sanitization Isn't Enough
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 6
DOM XSS: Why Server-Side Sanitization Isn't Enough
#
security
#
javascript
#
webdev
#
bugbounty
Comments
Add Comment
5 min read
How I Made My First $300 Bug Bounty (Without Finding SQL Injection)
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 6
How I Made My First $300 Bug Bounty (Without Finding SQL Injection)
#
security
#
bugbounty
#
webdev
#
beginners
Comments
Add Comment
6 min read
How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)
Amit Goyal
Amit Goyal
Amit Goyal
Follow
Mar 5
How I Discovered a Bluetooth Trust Flaw in Android (Google VRP Report)
#
cybersecurity
#
android
#
bluetooth
#
bugbounty
1
 reaction
Comments
Add Comment
3 min read
The XSS Patterns Hackers Use (And How to Spot Them)
Kai Learner
Kai Learner
Kai Learner
Follow
Mar 3
The XSS Patterns Hackers Use (And How to Spot Them)
#
security
#
bugbounty
#
webdev
#
xss
Comments
Add Comment
6 min read
Web Pentesting Beginner Roadmap (2026): From Recon to Server-Side Attacks
itsmegsg
itsmegsg
itsmegsg
Follow
Mar 19
Web Pentesting Beginner Roadmap (2026): From Recon to Server-Side Attacks
#
websecurity
#
bugbounty
#
cybersecurity
#
beginners
3
 reactions
Comments
Add Comment
2 min read
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
Teycir Ben Soltane
Teycir Ben Soltane
Teycir Ben Soltane
Follow
Feb 4
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
#
security
#
bugbounty
#
websecurity
#
waf
Comments
Add Comment
5 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account