Sec-88
Ctrlk
  • 🧑Whoami
  • 🕸️Web-AppSec
  • ✉️API-Sec
  • 📱Android-AppSec
  • IOS-AppSec
  • 📶Network-Sec
  • 💻Desktop AppSec
  • ☁️Cloud Sec
  • 👨‍💻Programming
  • 🖥️Operating Systems
  • ✍️Write-Ups
    • Hunting Methodology
    • API BAC leads to PII Data Disclosure
    • Misconfigured OATUH leads to Pre-Account Takeover
    • Automating Bug Bounty with GitHub Actions
    • From Recon to Reward: My Bug Bounty Methodology when Hunting on Public Bug Bounty Programs
    • Exploring Subdomains: From Enumeration to Takeover Victory
    • 0-Click Account Takeover via Insecure Password Reset Feature
    • How a Simple Click Can Lead to Account Takeover: An OAuth Insecure Implementation Vulnerability
    • The Power Of IDOR even if it is unpredictable IDs
    • Unlocking the Weak Spot: Exploiting Insecure Password Reset Tokens
    • AI Under Siege: Discovering and Exploiting Vulnerabilities
    • Inside the Classroom: How We Hacked Our Way Past Authorization on a Leading EdTech Platform
    • How We Secured Our Client’s Platform Against Interaction-Free Account Thefts
    • Unchecked Privileges: The Hidden Risk of Role Escalation in Collaborative Platforms
    • Decoding Server Behavior: The Key to Mass Account Takeover
    • Exploiting JSON-Based CSRF: The Hidden Threat in Profile Management
    • How We Turned a Medium XSS into a High Bounty by Bypassing HttpOnly Cookie
    • How Monitoring Target Updates Helped Me Earn Bounties in Bug Bounty
    • Semi-Automating My Android Bug Hunting Flow with apkX
    • Using N8N To Orchestrate Web and Mobile Bug Hunting
    • Hacking Android Labs
Powered by GitBook
On this page

Was this helpful?

Edit

✍️Write-Ups

Hunting MethodologyAPI BAC leads to PII Data DisclosureMisconfigured OATUH leads to Pre-Account TakeoverAutomating Bug Bounty with GitHub ActionsFrom Recon to Reward: My Bug Bounty Methodology when Hunting on Public Bug Bounty ProgramsExploring Subdomains: From Enumeration to Takeover Victory0-Click Account Takeover via Insecure Password Reset FeatureHow a Simple Click Can Lead to Account Takeover: An OAuth Insecure Implementation VulnerabilityThe Power Of IDOR even if it is unpredictable IDsUnlocking the Weak Spot: Exploiting Insecure Password Reset TokensAI Under Siege: Discovering and Exploiting VulnerabilitiesInside the Classroom: How We Hacked Our Way Past Authorization on a Leading EdTech PlatformHow We Secured Our Client’s Platform Against Interaction-Free Account TheftsUnchecked Privileges: The Hidden Risk of Role Escalation in Collaborative PlatformsDecoding Server Behavior: The Key to Mass Account TakeoverExploiting JSON-Based CSRF: The Hidden Threat in Profile ManagementHow We Turned a Medium XSS into a High Bounty by Bypassing HttpOnly CookieHow Monitoring Target Updates Helped Me Earn Bounties in Bug BountySemi-Automating My Android Bug Hunting Flow with apkXUsing N8N To Orchestrate Web and Mobile Bug HuntingHacking Android Labs
PreviousBurp SuiteNextHunting Methodology

Last updated 1 year ago

Was this helpful?