InInfoSec Write-upsbymo9khu93rEmail Verification Bypass via Remember MeToday I will tell you my finding of email verification that I found accidently.Apr 22, 20247Apr 22, 20247
ThexssratA Very Basic Beginner Bug Bounty MethodologyCross-Site Scripting (XSS)Dec 21, 2023Dec 21, 2023
bug4youHow I Got 4 SQLI Vulnerabilities At One Target Manually Using The Repeater TabHi everyone, I’m Yousseff, A Junior Computer Science Student, and Cyber Security Enthusiast, Always hungry for a deep understanding of the…Sep 19, 202319Sep 19, 202319
Chevon PhillipRCE due to Dependency Confusion — $5000 bounty!Hey everyone! I’m back with another cool write-up about a bug bounty report I submitted to a private program on HackerOne. Guess what? I…May 10, 20237May 10, 20237
InSystem WeaknessbyDavid MerianChatGPT Hacking Prompts, SQLi, XSS, Vuln Analysis, Nuclei Templates, and moreSeveral prompts for hacking with ChatGPT I’ve consolidated with demos.Feb 14, 20232Feb 14, 20232
Jake McGreevyBypassing MFA is as easy as 1..2..3..!As organizations work to become more and more secure, implementing multi-factor authentication is usually one of the first things they do…May 24, 20234May 24, 20234
InInfoSec Write-upsbyTheBountyBoxCool Recon techniques every hacker misses! 🔥🔥Welcome to this article! This article is about some cool recon techniques every hacker misses! Tighten your belts as we walk you through…Aug 23, 202210Aug 23, 202210
InInfoSec Write-upsbyTheBountyBoxMass Hunting CVE’s Part-1👀🔥CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws. A CVE number uniquely…Aug 31, 20224Aug 31, 20224
InInfoSec Write-upsbyTheBountyBoxCool Recon techniques every hacker misses! Episode 2🔥🔥Welcome to the 2nd Episode of Cool Recon Techniques. We are back with some more cool recon techniques which we think hackers out there…Sep 18, 20225Sep 18, 20225