<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Bug Bounty Hunter on Medium]]></title>
        <description><![CDATA[Latest stories tagged with Bug Bounty Hunter on Medium]]></description>
        <link>https://medium.com/tag/bug-bounty-hunter/latest?source=rss------bug_bounty_hunter-5</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Bug Bounty Hunter on Medium</title>
            <link>https://medium.com/tag/bug-bounty-hunter/latest?source=rss------bug_bounty_hunter-5</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Wed, 06 May 2026 15:34:03 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/tag/bug-bounty-hunter" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[How I Turned $3 Into 8 Paid Bugs]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@0xs3fo/how-i-turned-3-into-8-paid-bugs-b81c5384465c?source=rss------bug_bounty_hunter-5"><img src="https://cdn-images-1.medium.com/max/1024/1*URjvMIp3SCei74tCihFQdQ.jpeg" width="1024"></a></p><p class="medium-feed-snippet">&#x628;&#x650;&#x633;&#x652;&#x645;&#x650; &#x627;&#x644;&#x644;&#x64E;&#x651;&#x640;&#x647;&#x650; &#x627;&#x644;&#x631;&#x64E;&#x651;&#x62D;&#x652;&#x645;&#x64E;&#x640;&#x670;&#x646;&#x650; &#x627;&#x644;&#x631;&#x64E;&#x651;&#x62D;&#x650;&#x64A;&#x645;&#x650;
&#x627;&#x644;&#x644;&#x64E;&#x651;&#x647;&#x64F;&#x645;&#x64E;&#x651; &#x635;&#x64E;&#x644;&#x650;&#x651; &#x648;&#x64E;&#x633;&#x64E;&#x644;&#x650;&#x651;&#x645;&#x652; &#x648;&#x64E;&#x628;&#x64E;&#x627;&#x631;&#x650;&#x643;&#x652; &#x639;&#x64E;&#x644;&#x64E;&#x649; &#x633;&#x64E;&#x64A;&#x650;&#x651;&#x62F;&#x650;&#x646;&#x64E;&#x627; &#x645;&#x64F;&#x62D;&#x64E;&#x645;&#x64E;&#x651;&#x62F;&#x64D;</p><p class="medium-feed-link"><a href="https://medium.com/@0xs3fo/how-i-turned-3-into-8-paid-bugs-b81c5384465c?source=rss------bug_bounty_hunter-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@0xs3fo/how-i-turned-3-into-8-paid-bugs-b81c5384465c?source=rss------bug_bounty_hunter-5</link>
            <guid isPermaLink="false">https://medium.com/p/b81c5384465c</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty-hunter]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <dc:creator><![CDATA[Saif Eldin]]></dc:creator>
            <pubDate>Fri, 01 May 2026 18:07:44 GMT</pubDate>
            <atom:updated>2026-05-01T18:07:44.400Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Bug Bounty Series — Part 3 (HTTP Parameter Pollution)]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@adii.utsav/bug-bounty-series-part-3-http-parameter-pollution-e2bbf95c8cae?source=rss------bug_bounty_hunter-5"><img src="https://cdn-images-1.medium.com/max/875/0*KOcOjki2FZbT9cBG.png" width="875"></a></p><p class="medium-feed-snippet">Inside: A deep dive into the lessons learned and techniques applied during my latest hands-on experiments.</p><p class="medium-feed-link"><a href="https://medium.com/@adii.utsav/bug-bounty-series-part-3-http-parameter-pollution-e2bbf95c8cae?source=rss------bug_bounty_hunter-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@adii.utsav/bug-bounty-series-part-3-http-parameter-pollution-e2bbf95c8cae?source=rss------bug_bounty_hunter-5</link>
            <guid isPermaLink="false">https://medium.com/p/e2bbf95c8cae</guid>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[bug-bounty-hunter]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <dc:creator><![CDATA[Aditya Kumar]]></dc:creator>
            <pubDate>Sat, 25 Apr 2026 09:18:33 GMT</pubDate>
            <atom:updated>2026-04-25T09:18:33.282Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Before You Test Anything, Understand What the System Is Protecting
A disciplined approach to SaaS…]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@clipp3r/before-you-test-anything-understand-what-the-system-is-protecting-a-disciplined-approach-to-saas-54445a412b9b?source=rss------bug_bounty_hunter-5"><img src="https://cdn-images-1.medium.com/max/1408/1*FPiNoKQZ7NjjlcyXaMazEQ.png" width="1408"></a></p><p class="medium-feed-link"><a href="https://medium.com/@clipp3r/before-you-test-anything-understand-what-the-system-is-protecting-a-disciplined-approach-to-saas-54445a412b9b?source=rss------bug_bounty_hunter-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@clipp3r/before-you-test-anything-understand-what-the-system-is-protecting-a-disciplined-approach-to-saas-54445a412b9b?source=rss------bug_bounty_hunter-5</link>
            <guid isPermaLink="false">https://medium.com/p/54445a412b9b</guid>
            <category><![CDATA[vapt]]></category>
            <category><![CDATA[bug-bounty-hunter]]></category>
            <category><![CDATA[methodology]]></category>
            <category><![CDATA[reconnaissance]]></category>
            <dc:creator><![CDATA[clipper]]></dc:creator>
            <pubDate>Tue, 21 Apr 2026 04:56:55 GMT</pubDate>
            <atom:updated>2026-04-21T18:38:45.134Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[All It Took Was a Negative Number: A Price Manipulation Story | PortSwigger — High-Level Logic…]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@katedtcore/all-it-took-was-a-negative-number-a-price-manipulation-story-portswigger-high-level-logic-076509af5a48?source=rss------bug_bounty_hunter-5"><img src="https://cdn-images-1.medium.com/max/2600/1*to8znEzdYpvhRSYFz3Ir6A.png" width="2752"></a></p><p class="medium-feed-snippet">Not all vulnerabilities require complex payloads or advanced techniques.
Sometimes, simply entering a negative number is enough.
In this&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@katedtcore/all-it-took-was-a-negative-number-a-price-manipulation-story-portswigger-high-level-logic-076509af5a48?source=rss------bug_bounty_hunter-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@katedtcore/all-it-took-was-a-negative-number-a-price-manipulation-story-portswigger-high-level-logic-076509af5a48?source=rss------bug_bounty_hunter-5</link>
            <guid isPermaLink="false">https://medium.com/p/076509af5a48</guid>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[price-manipulation]]></category>
            <category><![CDATA[burpsuite]]></category>
            <category><![CDATA[bug-bounty-hunter]]></category>
            <category><![CDATA[portswigger]]></category>
            <dc:creator><![CDATA[Kate D Terracore]]></dc:creator>
            <pubDate>Wed, 15 Apr 2026 22:10:26 GMT</pubDate>
            <atom:updated>2026-04-15T22:31:48.935Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[ Is Bug Bounty a Good Long-Term Career? The Reality in 2026]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-link"><a href="https://medium.com/@pradeeptadi03/is-bug-bounty-a-good-long-term-career-the-reality-in-2026-8bb238d4d01e?source=rss------bug_bounty_hunter-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@pradeeptadi03/is-bug-bounty-a-good-long-term-career-the-reality-in-2026-8bb238d4d01e?source=rss------bug_bounty_hunter-5</link>
            <guid isPermaLink="false">https://medium.com/p/8bb238d4d01e</guid>
            <category><![CDATA[bug-bounty-hunter]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <dc:creator><![CDATA[Pradeeptadi]]></dc:creator>
            <pubDate>Tue, 14 Apr 2026 16:41:14 GMT</pubDate>
            <atom:updated>2026-04-14T16:41:14.031Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Bug Bounty / Web Application Security Hunting Checklist - 2026 XSS Rat version]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://thexssrat.medium.com/bug-bounty-web-application-security-hunting-checklist-2026-xss-rat-version-1886138a8200?source=rss------bug_bounty_hunter-5"><img src="https://cdn-images-1.medium.com/max/969/1*1Zv3ZF3r_qVhfTZkCybH-g.jpeg" width="969"></a></p><p class="medium-feed-link"><a href="https://thexssrat.medium.com/bug-bounty-web-application-security-hunting-checklist-2026-xss-rat-version-1886138a8200?source=rss------bug_bounty_hunter-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://thexssrat.medium.com/bug-bounty-web-application-security-hunting-checklist-2026-xss-rat-version-1886138a8200?source=rss------bug_bounty_hunter-5</link>
            <guid isPermaLink="false">https://medium.com/p/1886138a8200</guid>
            <category><![CDATA[bug-bounty-hunter]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Thexssrat]]></dc:creator>
            <pubDate>Mon, 06 Apr 2026 10:39:59 GMT</pubDate>
            <atom:updated>2026-04-06T10:42:29.169Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[ How I Earned $200 in 5 Minutes Using a Simple Broken Link Hijacking Bug]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@pradeeptadi03/how-i-earned-200-in-5-minutes-using-a-simple-broken-link-hijacking-bug-41821fb41b1e?source=rss------bug_bounty_hunter-5"><img src="https://cdn-images-1.medium.com/max/1536/1*QPZJpYU3Zhi4UkNOHcgwtA.png" width="1536"></a></p><p class="medium-feed-snippet">Broken Link hijacking in 2min </p><p class="medium-feed-link"><a href="https://medium.com/@pradeeptadi03/how-i-earned-200-in-5-minutes-using-a-simple-broken-link-hijacking-bug-41821fb41b1e?source=rss------bug_bounty_hunter-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@pradeeptadi03/how-i-earned-200-in-5-minutes-using-a-simple-broken-link-hijacking-bug-41821fb41b1e?source=rss------bug_bounty_hunter-5</link>
            <guid isPermaLink="false">https://medium.com/p/41821fb41b1e</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty-hunter]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <dc:creator><![CDATA[Pradeeptadi]]></dc:creator>
            <pubDate>Sat, 04 Apr 2026 17:32:35 GMT</pubDate>
            <atom:updated>2026-04-05T03:15:37.673Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Why Beginners Fail in Bug Bounty (And How to Fix It in 2026)]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-snippet">The Confusion Every Beginner Faces</p><p class="medium-feed-link"><a href="https://sukhveersingh97997.medium.com/why-beginners-fail-in-bug-bounty-and-how-to-fix-it-in-2026-456bb7dd4f8d?source=rss------bug_bounty_hunter-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://sukhveersingh97997.medium.com/why-beginners-fail-in-bug-bounty-and-how-to-fix-it-in-2026-456bb7dd4f8d?source=rss------bug_bounty_hunter-5</link>
            <guid isPermaLink="false">https://medium.com/p/456bb7dd4f8d</guid>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bug-hunting]]></category>
            <category><![CDATA[bug-bounty-hunter]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <dc:creator><![CDATA[Sukhveer Singh]]></dc:creator>
            <pubDate>Fri, 27 Mar 2026 11:58:55 GMT</pubDate>
            <atom:updated>2026-03-27T11:58:55.231Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[IDOR on Tesla Disclosing Users’ Emails]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@lonewolfx1/idor-on-tesla-disclosing-users-emails-d86132348ca0?source=rss------bug_bounty_hunter-5"><img src="https://cdn-images-1.medium.com/max/600/1*QLlpLmaSTtbMZdnsC7KG_g.png" width="600"></a></p><p class="medium-feed-snippet">Hello friend, I hope you are doing well.</p><p class="medium-feed-link"><a href="https://medium.com/@lonewolfx1/idor-on-tesla-disclosing-users-emails-d86132348ca0?source=rss------bug_bounty_hunter-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@lonewolfx1/idor-on-tesla-disclosing-users-emails-d86132348ca0?source=rss------bug_bounty_hunter-5</link>
            <guid isPermaLink="false">https://medium.com/p/d86132348ca0</guid>
            <category><![CDATA[infosec]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[infosec-write-ups]]></category>
            <category><![CDATA[bug-bounty-hunter]]></category>
            <dc:creator><![CDATA[Gaber Fahmy]]></dc:creator>
            <pubDate>Thu, 26 Mar 2026 03:31:59 GMT</pubDate>
            <atom:updated>2026-03-26T03:31:59.498Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Improper Input Handling Leading to Client Side Code Execution and Backend Information Disclosure]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://infosecwriteups.com/improper-input-handling-leading-to-client-side-code-execution-and-backend-information-disclosure-fe58853f9f0c?source=rss------bug_bounty_hunter-5"><img src="https://cdn-images-1.medium.com/max/1024/0*BMrGzBunaZCts_4t.jpeg" width="1024"></a></p><p class="medium-feed-snippet">Improper Input Handling allows unsanitized user input to trigger client-side code execution while exposing backend processing details and&#x2026;</p><p class="medium-feed-link"><a href="https://infosecwriteups.com/improper-input-handling-leading-to-client-side-code-execution-and-backend-information-disclosure-fe58853f9f0c?source=rss------bug_bounty_hunter-5">Continue reading on InfoSec Write-ups »</a></p></div>]]></description>
            <link>https://infosecwriteups.com/improper-input-handling-leading-to-client-side-code-execution-and-backend-information-disclosure-fe58853f9f0c?source=rss------bug_bounty_hunter-5</link>
            <guid isPermaLink="false">https://medium.com/p/fe58853f9f0c</guid>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bug-bounty-hunter]]></category>
            <category><![CDATA[vulnerability-disclosure]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[responsible-disclosure]]></category>
            <dc:creator><![CDATA[Aditya Bhatt]]></dc:creator>
            <pubDate>Wed, 25 Mar 2026 08:34:09 GMT</pubDate>
            <atom:updated>2026-03-26T07:58:24.622Z</atom:updated>
        </item>
    </channel>
</rss>