BugBounty & Hacking Resources
@projectzeroTM
1.18K
subscribers
22
photos
2
videos
5
files
363
links
Download Telegram
Join
BugBounty & Hacking Resources
1.18K subscribers
BugBounty & Hacking Resources
https://blog.arcjet.com/security-concepts-for-developers-trivial-packages/
Arcjet blog
Security Concepts for Developers: Trivial Packages
Discover the hidden risks of using trivial packages in development. Learn how small, seemingly insignificant dependencies can lead to significant security vulnerabilities.
🔥
3
❤
2
BugBounty & Hacking Resources
https://infosecwriteups.com/csrf-bypass-using-domain-confusion-leads-to-ato-ac682dd17722
Medium
CSRF Bypass Using Domain Confusion Leads To ATO
Hello everyone, it’s Osama (W4lT3R) again! I wanted to share a recent finding with you where I successfully bypassed the CSRF protection…
❤
4
👍
2
BugBounty & Hacking Resources
https://x.com/0x0SojalSec/status/1850605494291017921
❤
2
🔥
1
BugBounty & Hacking Resources
https://www.landh.tech/blog/20241028-hidden-supply-chain-links/
❤
3
🔥
1
BugBounty & Hacking Resources
https://x.com/bxmbn/status/1850981526252482869?s=46
❤
2
🔥
1
BugBounty & Hacking Resources
https://dreyand.rs/code/review/2024/10/27/what-are-my-options-cyberpanel-v236-pre-auth-rce
DreyAnd’s Web Security Blog
What Are My OPTIONS? CyberPanel v2.3.6 pre-auth RCE
Few months ago I was assigned to do a pentest on a target running CyberPanel. It seemed to be installed by default by some VPS providers & it was also sponsored by Freshworks.
❤
1
BugBounty & Hacking Resources
https://hackerone.com/reports/2778380
HackerOne
U.S. Dept Of Defense disclosed on HackerOne: Unauthenticated LFI...
Hi `DOD` Team,
# Summary:
* When accessing the endpoint on https:// ██████████/jolokia/exec/com.sun.management:type=DiagnosticCommand/compilerDirectivesAdd/ it is possible to path traversal on the...
🔥
3
❤
1
BugBounty & Hacking Resources
https://lite.evernote.com/note/3c0c0a20-1b65-10b8-b710-0c4a2a4e209d
🔥
4
BugBounty & Hacking Resources
https://x.com/garethheyes/status/1851614921936552330?t=kavctqknDdpkIftgOKcr4A&s=19
❤
1
BugBounty & Hacking Resources
https://x.com/NahamSec/status/1851818696685314160
❤
4
🔥
2
BugBounty & Hacking Resources
https://mizu.re/post/heroctf-v6-writeups
mizu.re
HeroCTF v6 Writeups. Tags:Writeups - Writeups - Web
❤
1
BugBounty & Hacking Resources
https://rikeshbaniya.medium.com/tale-of-zendesk-0-day-and-a-potential-25k-bounty-61bcf9c5dc06
Medium
User info extraction abusing placeholder injection in Zendesk
In this blog, I will share how I found template injection affecting Zendesk customers with default configuration.
🔥
2
BugBounty & Hacking Resources
https://x.com/kinugawamasato/status/1816234368714871185
X (formerly Twitter)
Masato Kinugawa (@kinugawamasato) on X
ooh, this works on Chrome Canary :D
<input type="hidden" oncontentvisibilityautostatechange="alert(/ChromeCanary/)" style="content-visibility:auto">
🔥
3
BugBounty & Hacking Resources
https://swisskyrepo.github.io/PayloadsAllTheThings/XSS%20Injection/#xss-in-noscript
swisskyrepo.github.io
Cross Site Scripting - Payloads All The Things
Payloads All The Things, a list of useful payloads and bypasses for Web Application Security
❤
2
🔥
2
BugBounty & Hacking Resources
https://www.wetest.net/blog/a-comprehensive-guide-to-xss-attacks-and-defenses-862.html
www.wetest.net
A Comprehensive Guide to XSS Attacks and Defenses
This article provides a detailed introduction to XSS(Cross Site Scripting) vulnerability attacks and defenses, including vulnerability basics, XSS fundamentals, encoding basics, XSS Payload, and XSS attack defense.
❤
2
🔥
2
BugBounty & Hacking Resources
https://medium.com/@mrhavit/breaking-tiktok-our-journey-to-finding-an-account-takeover-vulnerability-b0646aba1c4b
Medium
Breaking TikTok: Our Journey to Finding an Account Takeover Vulnerability
Hello, fellow security researchers and bug bounty hunters!
❤
3
BugBounty & Hacking Resources
https://www.yeswehack.com/learn-bug-bounty/dom-explorer-tool-parse-html?utm_source=twitter&utm_medium=social&utm_campaign=dom-explorer-tool
YesWeHack
Dom-Explorer launched to reveal how browsers parse HTML, mutated XSS
Learn about Dom-Explorer, a new open-source tool for understanding how popular browsers parse HTML and uncovering mutation XSS vulnerabilities.
🔥
2
❤
1
BugBounty & Hacking Resources
https://www.mdsec.co.uk/2024/10/when-wafs-go-awry-common-detection-evasion-techniques-for-web-application-firewalls/
MDSec
When WAFs Go Awry: Common Detection & Evasion Techniques for Web Application Firewalls - MDSec
Web Application Firewalls (WAFs) help to protect web applications by monitoring, filtering, and blocking HTTP traffic to and from a web service. However, WAFs are too often relied upon as...
🔥
2
❤
1
BugBounty & Hacking Resources
https://x.com/05__Yash/status/1853803857433837638
❤
2
BugBounty & Hacking Resources
https://x.com/0x0SojalSec/status/1853532267215519991
❤
2
🔥
2
BugBounty & Hacking Resources
https://blog.sicuranext.com/breaking-down-multipart-parsers-validation-bypass/
Sicuranext Blog
Breaking Down Multipart Parsers: File upload validation bypass
TL;DR: Basically, all multipart/form-data parsers fail to fully comply with the RFC, and when it comes to validating filenames or content uploaded by users, there are always numerous ways to bypass validation. We'll test various bypass techniques against…
❤
2
TWeb.init({scrollToPost:'projectzeroTM/129'});