Rikesh BaniyaAbusing auto mail responders to access internal workplacesWhen ever you send an email to a company address support@example.com , contact@example.com you might have noticed you will be greeted with…Jun 8, 20243Jun 8, 20243
Evan ConnellyPost Account Takeover? Account Takeover of Internal Tesla AccountsIn testing various Tesla web applications as part of the Tesla Bug Bounty Program, I’ve created many Tesla user accounts. At some point…Apr 4, 20231Apr 4, 20231
Viktor MaresAttacking Web Login Portals — How I hacked over 600 accountsHi everyone,Feb 12, 20233Feb 12, 20233
InSystem WeaknessbyMayank GandhiBusiness Logic Vulnerabilities (easy hit) Bug-BountyHello Cybersecurity Researchers,May 10, 202211May 10, 202211
Taniya AgarwalBounty Evaluation GitHub = $15,000 US Dollars | Rate LimitI found the bug on GitHub website where, I bypassed the login authentication. In this walk through I will show it was done. Let’s…Dec 28, 202112Dec 28, 202112
vishnurajHow I managed to hack User accounts of a billion-dollar sport platformHello everyone,Dec 4, 20211Dec 4, 20211
InInfoSec Write-upsbyTommaso De PontiHow response Manipulation got me a little, but sweet BountySo it can for youSep 7, 2020Sep 7, 2020
Sm4rtyHunting for Bugs in Shopping/Billing Feature.Hey Guys, I am Samrat Gupta aka Sm4rty, a Security Researcher and a Bug Bounty Hunter. In this blog, I will be explaining how can you find…Nov 28, 20213Nov 28, 20213