Aditya KumarJan 303 min readHow to Chain Multiple Vulnerabilities for Maximum Impact in Bug Bounty Hunting
Dipti BhadouriyaJan 72 min readProblems with Running Your Own Managed Bug Bounty or Responsible Disclosure Programs
Abhinav BangiaNov 12, 20243 min readUnderstanding CVE-2024-6387: A P1 Vulnerability Exposing Systems to Remote Code Execution Risks
Aditya KumarAug 16, 20244 min readUnderstanding OAuth Misconfigurations: Common Pitfalls and How to Avoid Them
Anurag TripathiMay 14, 20242 min readShielding Your WordPress Site:Understanding and Mitigating XML-RPC Vulnerabilities
Abhinav BangiaSep 22, 20233 min readDeciphering Bug Severity in Bug Bounty Programs: A Deep Dive into Impact Assessment
Abhinav BangiaSep 11, 20233 min readUnderstanding Cross-Site Request Forgery (CSRF) Attacks: What You Need to Know
Abhinav BangiaAug 17, 20232 min readCyber Sleuthing: Unveiling Web Vulnerabilities with Burp Suite Mastery
Abhinav BangiaAug 16, 20233 min readUnleashing the Power: The Benefits of a Functional Bug Bounty Program