mrhavitBreaking TikTok: Our Journey to Finding an Account Takeover VulnerabilityHello, fellow security researchers and bug bounty hunters!Jun 4, 202311
Sushil ChoudharyMy First Critical VulnerabilityHey Hunters, I am Back with one another find so let's startJul 142Jul 142
Gökhan GüzelkokarFrom Long-Term Hacking to Instant Rewards: Finding SQLi in 3 Minutes Worth $3125I believe that if you want to succeed in bug bounty, you should focus on programs that you have been hacking for a long time, like 2–3…Jul 69Jul 69
mrhavitBreaking TikTok: Our Journey to Finding an Account Takeover VulnerabilityHello, fellow security researchers and bug bounty hunters!Jun 4, 202311
Sushil ChoudharyMy First Critical VulnerabilityHey Hunters, I am Back with one another find so let's startJul 142
Gökhan GüzelkokarFrom Long-Term Hacking to Instant Rewards: Finding SQLi in 3 Minutes Worth $3125I believe that if you want to succeed in bug bounty, you should focus on programs that you have been hacking for a long time, like 2–3…Jul 69
ElcapitanoCritical Logic Flaw Allows Overwrite of Any User AccountWhile conducting web application testing, I focused on the email and password update sections, particularly the email update functionality…Jul 18
Yousef MuhammedelkhirCtrl + U to Bounty: How I Found Sensitive Info in the Source Codeبسم الله الرحمن الرحيمJul 81