InInfoSec Write-upsbyAkash GhoshThe Subdomain They Forgot — How I Chained Bugs for a $1,000 BountyThe internet never forgets, and neither should bug bounty hunters. As hackers, we live for those quiet moments when something seemingly…Jan 114Jan 114
InOSINT TeambyRaunak Gupta Aka BiscuitAdmin Panel Takeover Using a Leaky JS File— — — — — — — — — Free Article Link: Here!!! — — — — — — — — —Oct 16, 20242Oct 16, 20242
RamshathHow I Turned a Tiny Security Flaw into a $250 BountyImagine this: you're casually testing a website, poking around, looking for vulnerabilities, and BAM! You uncover something that turns out…Jan 251Jan 251
Mr HorbioBY USING JAVASCRIPT ANALYSIS GOT 200$ for JUST AN API TOKEN Leak [Information Disclosure…Hi hackers! Mr. Horbio this side, I hope your are doing good. I come with new article. Yes! you will get 200$ to 500$ just finding leaked…Jan 221Jan 221
InPinoy White HatbyJapz DivinoEasy $10,000 bounty using Wayback MachineSeverity: Critical (9 ~ 10) Weakness: Sensitive Information Disclosure Bounty: $10,000Jan 236Jan 236
Gaber FahmyIDOR on Tesla Disclosing Users' EmailsIDOR on Tesla Disclosing Users' EmailsJan 2410Jan 2410
InInfosec MatrixbySpectat0rguy40+ Google Dorks For Low Hanging FruitsYou Can Use These Dorks To Find Low Hanging FruitsJan 20Jan 20
RishurajHow Limited path traversal into an RCE, gets me a $6,000 bounty.In this write-up, I will explain how I successfully escalated a limited path traversal into an RCE.Jan 181Jan 181
swaroop 04|16Re-captcha token generating secret key leaking identified via way back machineHello viewers and fellow hackers! Today, I want to share a unique vulnerability that I haven’t heard of before — it’s the first time I’m…Jan 18Jan 18
Ibtissam Hammadi$5,000 Bug Bounty: The Hacker’s Unexpected Goldmine5 Secrets to Turn Code Flaws into CashJan 23Jan 23
InSystem WeaknessbyMehboob KhanHow i find sensitive files in 2 minutes|| Easy Bug #2 $$$Free Link:- https://medium.com/@securityinsights/d53965b7e4f4?source=friends_link&sk=771cd6e71dfa8cb4648111100a11d47aJan 234Jan 234
Ammar MukhtarEarn $5/Hour: 5 Easy Websites That PayWant to make $5 an hour without fancy skills? Here’s how!Dec 4, 2024113Dec 4, 2024113
Ibtissam Hammadi$4,000 Bug Bounty: How I Found This Critical VulnerabilityIt is a journey through persistence, technical exploration, and the sweet reward of discovering your first major security vulnerability.Jan 225Jan 225
InCyber Security Write-upsbyAbdul Rehman ParkarHow I Got Paid for an Out-of-Scope VulnerabilityHello fellow researchers, my name is Abdul Rehman Parkar, and I work at IZYITS.Nov 5, 20244Nov 5, 20244
InOSINT TeambyAkash GhoshThe $900 Bug: My Journey Through SSRF and LFI ExploitsNov 22, 2024Nov 22, 2024
InOSINT TeambyAbhirupKonwar2025 ChatGPT Prompts for Bug HuntersUnique prompts for bug huntersJan 44Jan 44
Shaikh MinhazHow I Hacked a Website While Dancing💸So recently, while I was randomly visiting websites (obviously for bugs), I came across a UK-based website. It was an educational website…Nov 21, 20249Nov 21, 20249
ThexssratThe Ultimate Checklist for Detecting IDOR and Broken Access Control VulnerabilitiesWhen testing web applications for security vulnerabilities, Insecure Direct Object References (IDOR) and Broken Access Control (BAC) are…Dec 25, 2024Dec 25, 2024
InInfoSec Write-upsbyShubham BhamareThis is How I Turned an Informative Bug into a Valid $500 BugIn this write-up, I have shared the story of a simple Facebook bug where the Activity Log and Hacked Flow features weren’t working as…Jan 135Jan 135
Rishav anandFind CSRF and get a bounty of $900 QuicklyUnderstanding CSRF in Simple TermsOct 26, 20242Oct 26, 20242