Все публикации

DEFCON Workshop | Forming a Bug Bounty Hunting Party (Digital Version)

Ask Yourself These Four Questions When Bug Bounty Hunting for IDORs

Bug Bounty Hunting | Find Bugs in Hidden React Source Code!! ⏰ QUICK TIP ⏰

Live Bug Bounty Hunting | The FloQast Security Team Tells You How to HACK THEM!

Live Bug Bounty Recon | New HackerOne Program Vendasta (Framework Data Available!)

Bug Bounty | Looks Like a Session Riding Attack #bugbounty #cybersecurity

Bug Bounty | Notes Are Mandatory! #bugbounty #cybersecurity

Bug Bounty | Advice For Beginners #bugbounty #cybersecurity

Bug Bounty | Add Custom Header #bugbounty #cybersecurity #hackerone

Fiverr Pro | Attack Surface Vulnerability Scanning -- 👀🎯 See How Attackers See You

Fiverr Pro | Web Application & Cloud Infrastructure Pen Test

Bug Bounty | Internal Apps Share Auth w/ Customer-Facing App #bugbounty #cybersecurity

Bug Bounty | What Data Do They REALLY Care About?? #bugbounty #cybersecurity

Bug Bounty | When Applications Look Similar But Aren't... #bugbounty #cybersecurity

Bug Bounty | Why It's SO HARD to Find An XSS Bug When You're a Beginner #bugbounty #cybersecurity

Bug Bounty | What Are HTTP Requests?? #bugbounty bugbounty #cybersecurity

Bug Bounty | 404 Response = API -- Fuzz For Endpoints #bugbounty #cybersecurity

Bug Bounty | Burpsuite Scan for User-Controlled Input -- DOM Injection #bugbounty #cybersecurity

[Part III] Bug Bounty Hunting for IDORs & Access Controls

Live Bug Bounty Hunting | Authenticated Testing the Client-Side & Server-Side on Figma's Core App

Bug Bounty Hunting for Client-Side Injection Vulnerabilities | Part I

Live Bug Bounty Hunting | Client-Side Injection Testing on Starbucks Japan (Plus Q&A)

[Part II] Bug Bounty Hunting for IDORs and Access Control Violations

[Part I] Bug Bounty Hunting for IDORs and Access Control Violations