Securitycipher's Avatar

Securitycipher

@securitycipher

πŸ“ƒ Write-ups and Resources πŸš€ related to Bug BountyπŸ’² #bugbounty #bugbountytips

164
Followers
9
Following
6,646
Posts
23.11.2024
Joined
Posts Following

Latest posts by Securitycipher @securitycipher

Zero-Click Account Takeover via Organization Invite Abuse

https://medium.com/@abhaycrgowda/zero-click-account-takeover-via-organization-invite-abuse-87751225f950?source=rss------bug_bounty-5

10.03.2026 20:20 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Full Account Takeover via Email Confirmation Misconfiguration

https://medium.com/@abhaycrgowda/full-account-takeover-via-email-confirmation-misconfiguration-9403fa17ba89?source=rss------bug_bounty-5

10.03.2026 19:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

How I Found a $1,000 Signature Replay Vulnerability in a Blockchain Bridge SDK

https://medium.com/@HackerMD/how-i-found-a-1-000-signature-replay-vulnerability-in-a-blockchain-bridge-sdk-61cdf25c901c?source=rss------bug_bounty-5

10.03.2026 18:32 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

The Log4Shell Nightmare: How a Tiny Piece of Code Broke the Internet

https://infosecwriteups.com/the-log4shell-nightmare-how-a-tiny-piece-of-code-broke-the-internet-32828e337858?source=rss------bug_bounty-5

10.03.2026 17:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

β€œBug Bounty Bootcamp #28: Boolean-Based Blind SQL Injection β€” Extracting Data One True/False at a…

https://infosecwriteups.com/bug-bounty-bootcamp-28-boolean-based-blind-sql-injection-extracting-data-one-true-false-at-a-abe69e3de702?source=rss------bug_bounty-5

10.03.2026 14:37 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Connection Reuse Ignores OAuth Bearer Token Mismatch

https://hackerone.com/reports/3595753

10.03.2026 13:56 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

How I Found Two Critical Vulnerabilities in a Desktop App Exposing Internal Systems and User PII

https://uchihamrx.medium.com/how-i-found-two-critical-vulnerabilities-in-a-desktop-app-exposing-internal-systems-and-user-pii-854cf3532e42?source=rss------bug_bounty-5

10.03.2026 13:52 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

HTTP Responses: Status Codes and Security Vulnerabilities

https://medium.com/@HalilIbrahimEroglu/http-responses-status-codes-and-security-vulnerabilities-248be5c50673?source=rss------bug_bounty-5

10.03.2026 12:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

CURLOPT_UNRESTRICTED_AUTH Dangerous Default Documentation Gap

https://hackerone.com/reports/3595764

10.03.2026 10:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

100$ Bugβ€Šβ€”β€ŠThe Hidden Cost of β€œUnsigned” Uploads: Exploiting Cloudinary for Denial of Wallet

https://zer0figure.medium.com/100-bug-the-hidden-cost-of-unsigned-uploads-exploiting-cloudinary-for-denial-of-wallet-a2c0d6c74890?source=rss------bug_bounty-5

10.03.2026 09:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

OWASP Juice Shop β€” BOLA: Unauthorized Basket Access | Security Assessment Finding

https://medium.com/@premwork25/owasp-juice-shop-bola-unauthorized-basket-access-security-assessment-finding-65e1f6b8a46b?source=rss------bug_bounty-5

10.03.2026 08:26 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

️ Supercharging Bug Bounty Recon with Netlas: A Smarter Way to Discover Targets

https://medium.com/bug-bounty-hunting-a-comprehensive-guide-in/%EF%B8%8F-supercharging-bug-bounty-recon-with-netlas-a-smarter-way-to-discover-targets-1911c2aec6a8?source=rss------bug_bounty-5

10.03.2026 07:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Single-endpoint Race Conditions

https://infosecwriteups.com/single-endpoint-race-conditions-7a3879c09e79?source=rss------bug_bounty-5

10.03.2026 06:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Journey to My First Bounty!

https://medium.com/@prakashchauhan9645/journey-to-my-first-bounty-72175d620b10?source=rss------bug_bounty-5

10.03.2026 05:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

A Practical Web Pentesting CTF Challenge β€” Step-by-Step Walkthrough

https://medium.com/@dsmodi484/a-practical-web-pentesting-ctf-challenge-step-by-step-walkthrough-2c2bc2d63ef7?source=rss------bug_bounty-5

10.03.2026 03:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

GuΓ­a de XXE Injection: Fundamentos, Payloads y Estrategias de Bug Bounty

https://medium.com/@jpablo13/gu%C3%ADa-de-xxe-injection-fundamentos-payloads-y-estrategias-de-bug-bounty-71536d05e0a5?source=rss------bug_bounty-5

10.03.2026 00:56 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Trust Boundaries in Agentic AI

https://fdzdev.medium.com/trust-boundaries-in-agentic-ai-3b6ffddffdba?source=rss------bug_bounty-5

09.03.2026 22:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

How I Found the InnerTube Identity Bridge: The Methodology

https://medium.com/@Pwnedl0l/how-i-found-the-innertube-identity-bridge-the-methodology-0757e3aebb75?source=rss------bug_bounty-5

09.03.2026 18:34 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

From Zero to 11 SQLi: Creating A Professional Penetration Testing Framework

https://meetcyber.net/from-zero-to-11-sqli-creating-a-professional-penetration-testing-framework-565b376f1e85?source=rss------bug_bounty-5

09.03.2026 16:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Arbitrary Code Execution via Scanner Bypass in **aws-diagram-mcp-server** `exec()` Namespace

https://hackerone.com/reports/3557138

09.03.2026 15:51 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

URL Encoding Explained: The Complete Beginner-to-Advanced Guide

https://rot-ig.medium.com/url-encoding-explained-the-complete-beginner-to-advanced-guide-9a955437fd40?source=rss------bug_bounty-5

09.03.2026 14:41 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Users can change project visibility which requires high subscription by just changing request body

https://hackerone.com/reports/3370430

09.03.2026 14:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

New Kubernetes Admission Controller Bypass via Mutating Webhook Manipulation

https://xalgord.medium.com/new-kubernetes-admission-controller-bypass-via-mutating-webhook-manipulation-c0ccc0792b9c?source=rss------bug_bounty-5

09.03.2026 13:56 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

LM Challenge-Response Hash Always Sent in SMB Authentication

https://hackerone.com/reports/3584491

09.03.2026 12:43 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

HTTP Parameter Pollution (HPP) |Pentest Field Guide

https://medium.com/@pavankumarck684/http-parameter-pollution-hpp-pentest-field-guide-9670584bcab5?source=rss------bug_bounty-5

09.03.2026 12:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

IDOR Mastery: From Basic ID Changes to Advanced Techniques That Pay $10K+ Bounties

https://medium.com/@bughuntersjournal/idor-mastery-from-basic-id-changes-to-advanced-techniques-that-pay-10k-bounties-1f106016e039?source=rss------bug_bounty-5

09.03.2026 11:25 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

WinRM β€” Port 5985, 5986 β€” How to exploit?

https://medium.com/@verylazytech/winrm-port-5985-5986-how-to-exploit-e6ecc660dc3b?source=rss------bug_bounty-5

09.03.2026 10:32 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Find a bug in University website

https://medium.com/@qa8453026/find-a-bug-in-university-website-2d5ab0e73428?source=rss------bug_bounty-5

09.03.2026 08:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Hacking AI Agents for 20,000$

https://anontriager.medium.com/hacking-ai-agents-for-20-000-15436be41eb9?source=rss------bug_bounty-5

09.03.2026 07:41 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Your RAG’s Secret Backdoor: Leaking Data Through Vector Databases

https://infosecwriteups.com/your-rags-secret-backdoor-leaking-data-through-vector-databases-c33755a5abbe?source=rss------bug_bounty-5

09.03.2026 06:45 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0