Published inInfoSec Write-upsDevelopers Mistake Leads to Bountiesss$$$…How the simple mistakes of developer can lead to multiple vulnerabilities and bounties11h ago11h ago
OTP Bypass Bug in Public Bug Bounty ProgramPOC of the report submitted for OTP Bypass bugMar 72Mar 72
Published inInfoSec Write-ups$50-$100 worth Sensitive Leaks via Google Dorks | Part 2Part 2: Learn practical and hidden dorks to target sensitive bounty earning leaks and sensitive files.Mar 51Mar 51
$50-$100 worth Sensitive Leaks via Google Dorks | Part 1Learn practical and hidden dorks to target sensitive bounty earning leaks and sensitive files.Mar 4Mar 4
Published inInfoSec Write-ups$1000–$25k worth API Bug Attack & Chaining StrategiesPractical API bug chaining tips & tricks in Bug BountiesFeb 271Feb 271
Published inInfoSec Write-ups$100-$20k worth Stored XSS Vulnerability | Hidden MethodsHidden Methods to bypass restriction to find Stored XSS in Bug BountiesFeb 264Feb 264
Published inInfoSec Write-ups$500-$20k worth GraphQL Vulnerabilities | Advanced Tips & TricksAdvanced Practical Tips & Tricks to find GraphQL Vulnerability in Bug BountiesFeb 26Feb 26
Published inInfoSec Write-ups$100-$20k worth Account Takeover Vulnerability | Hidden Practical StepsHidden methods to find Account Takeover Vulnerability in Bug BountiesFeb 25Feb 25
Published inInfoSec Write-ups$100-$5000 worth LFI Vulnerability | Advanced Tips and TricksPractical & Expert Techniques, Tips and Tricks to find Local File Inclusion (LFI)Feb 241Feb 241
Published inInfoSec Write-ups$100-$5000 worth File Upload Vulnerability | Advanced TechniquesHidden and Advanced Techniques to bypass File Upload RestrictionsFeb 231Feb 231