mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.2K
active users

#bugbountytips

0 posts0 participants0 posts today
2rZiKKbOU3nTafniR2qMMSE0gwZThe Best Alternatives to Intelx.io Credential stuffing is truly a satisfying bug to hunt. The feeling of inserting someone else’s credentials and logging in is like being able to walk through clo...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-writeup" target="_blank">#bug-bounty-writeup</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/web-security" target="_blank">#web-security</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a><br><br><a href="https://systemweakness.com/the-best-alternatives-to-intelx-io-f1c469e23fb1?source=rss----f20a9840e177---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=IfR2B5K2tgCeUmdFcadBwFKuWOG&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZDorks For Sensitive Information Disclosure Part-3 Look google’s crawlers just got some juicy info………. Continue reading on InfoSec Write-ups » <br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bugs" target="_blank">#bugs</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-writeup" target="_blank">#bug-bounty-writeup</a><br><br><a href="https://infosecwriteups.com/dorks-for-sensitive-information-disclosure-part-3-a687a9c5a3bf?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=H5wp7dAlBGsulG7YpS95kXNgQu8&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
linuxBug Bounty Entry: Getting Started with Platforms like HackerOne and Bugcrowd In the rapidly evolving digital landscape, cyber threats loom large, and organizations are increasingly relying on proac...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/technology" target="_blank">#technology</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/linux" target="_blank">#linux</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a><br><br><a href="https://rafalw3bcraft.medium.com/bug-bounty-entry-getting-started-with-platforms-like-hackerone-and-bugcrowd-849ffb8ba046?source=rss------technology-5" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=linux" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=LKDrzmseOm84k6XaaO2r3IxVRK4&amp;interestId=linux" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZHow to Run SQLMAP from Anywhere in Windows CMD (Complete Setup Guide) Hey, you. Yeah, you. Continue reading on InfoSec Write-ups » <br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/sqlinjectiontypes" target="_blank">#sqlinjectiontypes</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/vapt" target="_blank">#vapt</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a><br><br><a href="https://infosecwriteups.com/how-to-run-sqlmap-from-anywhere-in-windows-cmd-complete-setup-guide-eee9d61f6303?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=N04hkUazot1j3zrTS2zAcSQQihM&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZThe Epic Tale of a JWT Key Left on a Confluence Wiki Page — Totally Secure, Right? The story of where to hid JWT key 🔑… and from all places they found 🕵️‍♂️ was in the public ...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-writeup" target="_blank">#bug-bounty-writeup</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bugs" target="_blank">#bugs</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a><br><br><a href="https://infosecwriteups.com/the-epic-tale-of-a-jwt-key-left-on-a-confluence-wiki-page-totally-secure-right-141189f1d9c3?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=Tyr8jzPQq1xgprRmHgU1xKTsJzE&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZHow I Found 100+ API Keys in JavaScript Files (JS Secrets Exposed) It was a routine bug bounty hunt when I almost scrolled past a minified JavaScript file — until a tiny string caught my eye...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/api" target="_blank">#api</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/data-leak" target="_blank">#data-leak</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/javascript" target="_blank">#javascript</a><br><br><a href="https://infosecwriteups.com/how-i-found-100-api-keys-in-javascript-files-js-secrets-exposed-939cc1f22289?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=QByEinx1NqBSEYhhD9Et1rYbz84&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZHow an API Token Flaw Let Me Bypass Premium Restrictions Hi Guys, Welcome back to yet another article, Today, I want to walk you through one of the bugs I found while hunting on HackerOne. I was st...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-writeup" target="_blank">#bug-bounty-writeup</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/api" target="_blank">#api</a><br><br><a href="https://systemweakness.com/how-an-api-token-flaw-let-me-bypass-premium-restrictions-43a395f3ddd9?source=rss----f20a9840e177---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=4xjZ6Jz4C5twjncn23HTLMuxGPA&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
Doyensec<p>Are you located in the US/EU? Passionate about <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a>? Maybe you follow <a href="https://infosec.exchange/tags/bugbountytips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbountytips</span></a> or are an avid <a href="https://infosec.exchange/tags/ctf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ctf</span></a> player and are ready to take the next step. If so, we're looking for our next <a href="https://infosec.exchange/tags/intern" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intern</span></a>, so consider applying today - <a href="https://hackers.doyensec.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">hackers.doyensec.com</span><span class="invisible"></span></a>.<br><a href="https://infosec.exchange/tags/doyensec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doyensec</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/internship" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internship</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZWeek 7 — Learning Basic Concepts of Cybersecurity Week 7 — Learning Basic Concepts of Cybersecurity Intro Hi there! If you’re wondering who I am, I go by @iamaangx028 on the internet...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/information-security" target="_blank">#information-security</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/information-technology" target="_blank">#information-technology</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/ethical-hacking" target="_blank">#ethical-hacking</a><br><br><a href="https://infosecwriteups.com/week-7-learning-basic-concepts-of-cybersecurity-09b4170209d1?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=YD70YRJPB1rxA2fiSEooZ8k2MXQ&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Windows Device Names Still Allow Path Traversal in UNC Paths After CVE-2025-27210 Fix<br><a href="https://hackerone.com/reports/3255707" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">hackerone.com/reports/3255707</span><span class="invisible"></span></a></p><p><a href="https://kolektiva.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a> <a href="https://kolektiva.social/tags/bugbountytips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbountytips</span></a> <a href="https://kolektiva.social/tags/bugbountytip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbountytip</span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZWeek 6 — Learning Basic Concepts of Cybersecurity Week 6 — Learning Basic Concepts of Cybersecurity Intro Hi there! If you’re wondering who I am, I go by @iamaangx028 on the internet...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/information-technology" target="_blank">#information-technology</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/information-security" target="_blank">#information-security</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/ethical-hacking" target="_blank">#ethical-hacking</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a><br><br><a href="https://infosecwriteups.com/week-6-learning-basic-concepts-of-cybersecurity-d2a27e136f24?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=JogQMZVdB1h6pcNEQOlAhIUTuqG&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZ“Why IDORs Are Everywhere — And How to Find Them” “Why IDORs Are Everywhere — And How to Find Them” — Part&nbsp;I This write-up has been prepared under the guidance of Amish P...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/idor" target="_blank">#idor</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/poc" target="_blank">#poc</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/idor-vulnerability" target="_blank">#idor-vulnerability</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a><br><br><a href="https://infosecwriteups.com/why-idors-are-everywhere-and-how-to-find-them-3ba45128e0f3?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=X4dRStFPByQaCoaqTCX8HjEtktk&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZHow I found my first Critical SSRF (and how you can too) SSRF (Server Side Request Forgery) is a web vulnerability that allows an attacker to cause the server to send requests to a malicious addres...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/ssrf" target="_blank">#ssrf</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-writeup" target="_blank">#bug-bounty-writeup</a><br><br><a href="https://systemweakness.com/how-i-found-my-first-critical-ssrf-and-how-you-can-too-b0f5fb1bd62b?source=rss----f20a9840e177---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=B1FlQywNJVRCFzOJiYMUj4NuhKC&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZThe Bug Bounty Program Litmus Test: 5 Red Flags to Avoid Wasting Your Time Spot slow payouts, low rewards, and duplicate traps — use these 5 red flags to find bug bounty programs that truly v...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/ethical-hacking" target="_blank">#ethical-hacking</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/infosec" target="_blank">#infosec</a><br><br><a href="https://infosecwriteups.com/the-bug-bounty-program-litmus-test-5-red-flags-to-avoid-wasting-your-time-1adc0034de43?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=T7LPnD5eqkLY1jdCOX9Z4nvimqO&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZWhen One Google Account Isn’t Enough: Breaking Identity Boundaries via SSO Confusion Bug Bounty Writeup | Identity Management Flaw | Persistent Authentication | SSO&nbsp;Misuse 🚨 Summary During an...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/freelancing" target="_blank">#freelancing</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-writeup" target="_blank">#bug-bounty-writeup</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a><br><br><a href="https://systemweakness.com/when-one-google-account-isnt-enough-breaking-identity-boundaries-via-sso-confusion-10e4f8381a44?source=rss----f20a9840e177---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=RRDBTfdEWQVGRf2VwvapL6fc3Ae&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZThe $100,000 Click: My First Year in Bug Bounties From Ramen Noodles to Life-Changing Payouts Continue reading on InfoSec Write-ups » <br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/penetration-testing" target="_blank">#penetration-testing</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/ethical-hacking" target="_blank">#ethical-hacking</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a><br><br><a href="https://infosecwriteups.com/the-100-000-click-my-first-year-in-bug-bounties-824d581a6c00?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=OeOZ42KTmoiEz5cEkMGNfbIesD2&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
MozillaHow a Simple IDOR in a Payment Flow Led to Order Manipulation and PII Exposure Analyzing a Authorization Flaw That Let Attackers Manipulate Orders and Access User&nbsp;Data Hi there! I’m Aryaveer Sin...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/infosec" target="_blank">#infosec</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/web-security" target="_blank">#web-security</a><br><br><a href="https://systemweakness.com/how-a-simple-idor-in-a-payment-flow-led-to-order-manipulation-and-pii-exposure-ec3ed410b08d?source=rss----f20a9840e177---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=Mozilla" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=H3TyMk4wO8PwwhOtWNp3hukqxu4&amp;interestId=Mozilla" rel="nofollow noopener" target="_blank">Match</a>
linux️ Beyond /etc/passwd: LFI Bypass, The Ultimate Guide By Shah kaif | “Inclusion isn’t just about files. It’s about control.” |&nbsp; LinkedIn What is Local File Inclusion (LFI)? Local File Inc...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-tips" target="_blank">#bug-bounty-tips</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/lfi" target="_blank">#lfi</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty-writeup" target="_blank">#bug-bounty-writeup</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bugbounty-writeup" target="_blank">#bugbounty-writeup</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/bug-bounty" target="_blank">#bug-bounty</a><br><br><a href="https://systemweakness.com/%EF%B8%8F-beyond-etc-passwd-lfi-bypass-the-ultimate-guide-5829d1efb600?source=rss----f20a9840e177---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=linux" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=LDn3U0NJYkctT9MTUtQL2V4XXH6&amp;interestId=linux" rel="nofollow noopener" target="_blank">Match</a>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Automate Your Recon: One API to Run All Your Pentesting Tools Instantly<br><a href="https://infosecwriteups.com/automate-your-recon-one-api-to-run-all-your-pentesting-tools-instantly-e1502862c2c7?source=rss------bug_bounty-5" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosecwriteups.com/automate-y</span><span class="invisible">our-recon-one-api-to-run-all-your-pentesting-tools-instantly-e1502862c2c7?source=rss------bug_bounty-5</span></a></p><p><a href="https://kolektiva.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a> <a href="https://kolektiva.social/tags/bugbountytips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbountytips</span></a> <a href="https://kolektiva.social/tags/bugbountytip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbountytip</span></a></p>
Sonar Research<p>📁🫷🚧Can't control the extension of a file upload, but you want an XSS? <br>Read more on how we overcame this obstacle to further exploit entire organizations using Fortinet endpoint protection:</p><p><a href="https://www.sonarsource.com/blog/caught-in-the-fortinet-how-attackers-can-exploit-forticlient-to-compromise-organizations-2-3?utm_medium=social&amp;utm_source=mastodon&amp;utm_campaign=research&amp;utm_content=blog-caught-in-the-fortinet-260625-&amp;utm_term=&amp;s_category=Organic&amp;s_source=Social%20Media&amp;s_origin=social" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">sonarsource.com/blog/caught-in</span><span class="invisible">-the-fortinet-how-attackers-can-exploit-forticlient-to-compromise-organizations-2-3?utm_medium=social&amp;utm_source=mastodon&amp;utm_campaign=research&amp;utm_content=blog-caught-in-the-fortinet-260625-&amp;utm_term=&amp;s_category=Organic&amp;s_source=Social%20Media&amp;s_origin=social</span></a></p><p><a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/bugbountytips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbountytips</span></a></p>