Sec-88
Ctrlk
  • 🧑Whoami
  • 🕸️Web-AppSec
  • ✉️API-Sec
  • 📱Android-AppSec
  • IOS-AppSec
  • 📶Network-Sec
  • 💻Desktop AppSec
  • ☁️Cloud Sec
  • 👨‍💻Programming
  • 🖥️Operating Systems
  • ✍️Write-Ups
    • Hunting Methodology
    • API BAC leads to PII Data Disclosure
    • Misconfigured OATUH leads to Pre-Account Takeover
    • Automating Bug Bounty with GitHub Actions
    • From Recon to Reward: My Bug Bounty Methodology when Hunting on Public Bug Bounty Programs
    • Exploring Subdomains: From Enumeration to Takeover Victory
    • 0-Click Account Takeover via Insecure Password Reset Feature
    • How a Simple Click Can Lead to Account Takeover: An OAuth Insecure Implementation Vulnerability
    • The Power Of IDOR even if it is unpredictable IDs
    • Unlocking the Weak Spot: Exploiting Insecure Password Reset Tokens
    • AI Under Siege: Discovering and Exploiting Vulnerabilities
    • Inside the Classroom: How We Hacked Our Way Past Authorization on a Leading EdTech Platform
    • How We Secured Our Client’s Platform Against Interaction-Free Account Thefts
    • Unchecked Privileges: The Hidden Risk of Role Escalation in Collaborative Platforms
    • Decoding Server Behavior: The Key to Mass Account Takeover
    • Exploiting JSON-Based CSRF: The Hidden Threat in Profile Management
    • How We Turned a Medium XSS into a High Bounty by Bypassing HttpOnly Cookie
    • How Monitoring Target Updates Helped Me Earn Bounties in Bug Bounty
    • Semi-Automating My Android Bug Hunting Flow with apkX
    • Using N8N To Orchestrate Web and Mobile Bug Hunting
    • Hacking Android Labs
Powered by GitBook
On this page

Was this helpful?

Edit
  1. ✍️Write-Ups

Automating Bug Bounty with GitHub Actions

PreviousMisconfigured OATUH leads to Pre-Account TakeoverNextFrom Recon to Reward: My Bug Bounty Methodology when Hunting on Public Bug Bounty Programs

Last updated 1 year ago

Was this helpful?