Mukund BhuvaHow I Hacked the Dutch Government: Exploiting an Innocent Image for Remote Code ExecutionPwning the Dutch Government with RCEFeb 1210
Mikko KenttäläZero-Click Calendar invite — Critical zero-click vulnerability chain in macOSCritical zero-click vulnerability chain in macOS (patched)Sep 12Sep 12
RendieroHow to Learn and Participate in Bug BountiesA Beginner’s Guide to Getting Started with Bug Bounty Programs7h ago7h ago
mrhavitBreaking TikTok: Our Journey to Finding an Account Takeover VulnerabilityHello, fellow security researchers and bug bounty hunters!Jun 4, 202311Jun 4, 202311
Mukund BhuvaHow I Hacked the Dutch Government: Exploiting an Innocent Image for Remote Code ExecutionPwning the Dutch Government with RCEFeb 1210
Mikko KenttäläZero-Click Calendar invite — Critical zero-click vulnerability chain in macOSCritical zero-click vulnerability chain in macOS (patched)Sep 12
RendieroHow to Learn and Participate in Bug BountiesA Beginner’s Guide to Getting Started with Bug Bounty Programs7h ago
mrhavitBreaking TikTok: Our Journey to Finding an Account Takeover VulnerabilityHello, fellow security researchers and bug bounty hunters!Jun 4, 202311
RaxomaraBypassing Rate Limits: All Known TechniquesIntroduction Rate limiting is a crucial security feature to prevent abuse by controlling the number of requests a user or system can make…4h ago
BrownBearSecWhat I learnt from reading 217* Subdomain Takeover bug reports.A comprehensive analysis of Subdomain Takeovers (SDTO), DNS Hijacking, Dangling DNS, CNAME misconfigurations…Oct 31, 20225