BugBounty & Hacking Resources
@projectzeroTM
1.18K
subscribers
22
photos
2
videos
5
files
363
links
Download Telegram
Join
BugBounty & Hacking Resources
1.18K subscribers
BugBounty & Hacking Resources
https://www.youtube.com/watch?v=b7WlUofPJpU
YouTube
DEF CON 32 - Practical Exploitation of DoS in Bug Bounty - Roni Lupin Carta
The talk "Practical Exploitation of DoS in Bug Bounty" explains methods for identifying and exploiting Denial of Service (DoS) vulnerabilities in bug bounty programs. Starting with an overview of DoS attacks and their impact, we will highlight how these attacks…
🔥
2
BugBounty & Hacking Resources
https://blog.pspaul.de/posts/bench-press-leaking-text-nodes-with-css/
pspaul's blog
Bench Press: Leaking Text Nodes with CSS
Some time ago, while reading up on new CSS features, I asked myself: Is it possible to leak the entire content of an HTML text node only using CSS?
❤
2
🔥
1
BugBounty & Hacking Resources
https://portswigger.net/research/concealing-payloads-in-url-credentials
PortSwigger Research
Concealing payloads in URL credentials
Last year Johan Carlsson discovered you could conceal payloads inside the credentials part of the URL . This was fascinating to me especially because the payload is not actually visible in the URL in
🔥
2
❤
1
👍
1
BugBounty & Hacking Resources
https://blog.voorivex.team/a-weird-csp-bypass-led-to-35k-bounty
Voorivex's Team
CSP Bypass Exploit Earns $3.5k Reward
Discover the $3.5k bounty story about how CSP bypass unlocked a XSS vulnerability leading to account takeover
❤
2
🔥
1
BugBounty & Hacking Resources
https://github.com/doyensec/CSPTPlayground
GitHub
GitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).
CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT). - doyensec/CSPTPlayground
🔥
4
BugBounty & Hacking Resources
https://x.com/albinowax/status/1849794101379502270?s=46
❤
2
🔥
2
BugBounty & Hacking Resources
https://blog.arcjet.com/security-concepts-for-developers-trivial-packages/
Arcjet blog
Security Concepts for Developers: Trivial Packages
Discover the hidden risks of using trivial packages in development. Learn how small, seemingly insignificant dependencies can lead to significant security vulnerabilities.
🔥
3
❤
2
BugBounty & Hacking Resources
https://infosecwriteups.com/csrf-bypass-using-domain-confusion-leads-to-ato-ac682dd17722
Medium
CSRF Bypass Using Domain Confusion Leads To ATO
Hello everyone, it’s Osama (W4lT3R) again! I wanted to share a recent finding with you where I successfully bypassed the CSRF protection…
❤
4
👍
2
BugBounty & Hacking Resources
https://x.com/0x0SojalSec/status/1850605494291017921
❤
2
🔥
1
BugBounty & Hacking Resources
https://www.landh.tech/blog/20241028-hidden-supply-chain-links/
❤
3
🔥
1
BugBounty & Hacking Resources
https://x.com/bxmbn/status/1850981526252482869?s=46
❤
2
🔥
1
BugBounty & Hacking Resources
https://dreyand.rs/code/review/2024/10/27/what-are-my-options-cyberpanel-v236-pre-auth-rce
DreyAnd’s Web Security Blog
What Are My OPTIONS? CyberPanel v2.3.6 pre-auth RCE
Few months ago I was assigned to do a pentest on a target running CyberPanel. It seemed to be installed by default by some VPS providers & it was also sponsored by Freshworks.
❤
1
BugBounty & Hacking Resources
https://hackerone.com/reports/2778380
HackerOne
U.S. Dept Of Defense disclosed on HackerOne: Unauthenticated LFI...
Hi `DOD` Team,
# Summary:
* When accessing the endpoint on https:// ██████████/jolokia/exec/com.sun.management:type=DiagnosticCommand/compilerDirectivesAdd/ it is possible to path traversal on the...
🔥
3
❤
1
BugBounty & Hacking Resources
https://lite.evernote.com/note/3c0c0a20-1b65-10b8-b710-0c4a2a4e209d
🔥
4
BugBounty & Hacking Resources
https://x.com/garethheyes/status/1851614921936552330?t=kavctqknDdpkIftgOKcr4A&s=19
❤
1
BugBounty & Hacking Resources
https://x.com/NahamSec/status/1851818696685314160
❤
4
🔥
2
BugBounty & Hacking Resources
https://mizu.re/post/heroctf-v6-writeups
mizu.re
HeroCTF v6 Writeups. Tags:Writeups - Writeups - Web
❤
1
BugBounty & Hacking Resources
https://rikeshbaniya.medium.com/tale-of-zendesk-0-day-and-a-potential-25k-bounty-61bcf9c5dc06
Medium
User info extraction abusing placeholder injection in Zendesk
In this blog, I will share how I found template injection affecting Zendesk customers with default configuration.
🔥
2
BugBounty & Hacking Resources
https://x.com/kinugawamasato/status/1816234368714871185
X (formerly Twitter)
Masato Kinugawa (@kinugawamasato) on X
ooh, this works on Chrome Canary :D
<input type="hidden" oncontentvisibilityautostatechange="alert(/ChromeCanary/)" style="content-visibility:auto">
🔥
3
BugBounty & Hacking Resources
https://swisskyrepo.github.io/PayloadsAllTheThings/XSS%20Injection/#xss-in-noscript
swisskyrepo.github.io
Cross Site Scripting - Payloads All The Things
Payloads All The Things, a list of useful payloads and bypasses for Web Application Security
❤
2
🔥
2
BugBounty & Hacking Resources
https://www.wetest.net/blog/a-comprehensive-guide-to-xss-attacks-and-defenses-862.html
www.wetest.net
A Comprehensive Guide to XSS Attacks and Defenses
This article provides a detailed introduction to XSS(Cross Site Scripting) vulnerability attacks and defenses, including vulnerability basics, XSS fundamentals, encoding basics, XSS Payload, and XSS attack defense.
❤
2
🔥
2
TWeb.init({scrollToPost:'projectzeroTM/123'});