Security Articles & Resources

Discover the latest cybersecurity articles, tutorials, and resources from around the web.

Showing 10 of 14 articles

Bypassing Cloudflare WAF to Trigger Reflected XSS on a Major Health Information Platform

Bypassing Cloudflare WAF to Trigger Reflected XSS on a Major Health Information Platform

Overview

Kamran Khan
Jun 02, 2025 1 min read
Bug Bounty Writeup Xss Vulnerability Cloudflare
How to Bypass Encryption Mechanism in Android Apps - InfoSec Write-ups

How to Bypass Encryption Mechanism in Android Apps - InfoSec Write-ups

Hi Folks, hope you are well. As you know developers and pentesters are always into a cat and mouse game. No matter how much we want to deny the fact but we make each other’s life a little tough…

Jaimin Gohel
Jun 01, 2025 1 min read
Android Pentesting Hacking Frida +2
Full-Blown SSRF to Gain Access to Millions of Users’ Records and Multiple Internal Panels

Full-Blown SSRF to Gain Access to Millions of Users’ Records and Multiple Internal Panels

This write-up details an SSRF vulnerability that allowed unauthorized access to millions of sensitive data and internal services.

Skyer
May 31, 2025 1 min read
Bug Bounty Cybersecurity Hacking +2
Grafana CVE-2025–4123: Full Read SSRF & Account Takeover

Grafana CVE-2025–4123: Full Read SSRF & Account Takeover

An open redirect happens when a web application takes a URL parameter and redirects the user to the specified URL without validating it. This might not seem dangerous on its own, but this type of bug…

Alvaro Balada
May 31, 2025 1 min read
Cybersecurity Bug Bounty Infosec +1
A step-by-step Android penetration testing guide for beginners

A step-by-step Android penetration testing guide for beginners

As I’m presently engaged in Android penetration testing, I’d like to relay my experiences with you, as they may prove beneficial in addressing some of the inquiries, I had difficulty resolving…

Sandeep Vishwakarma
May 28, 2025 1 min read
Android Pentest Mobile Testing Mobile Hacking +2
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Introduction: Navigating the Android Abyss

Hacker's Dump
May 28, 2025 1 min read
Android Android Pentesting Penetration Testing +2
Stealing First Party Access Token of Facebook Users: Meta Bug Bounty

Stealing First Party Access Token of Facebook Users: Meta Bug Bounty

Hi, I am Saugat Pokharel from Kathmandu, Nepal. I am going to talk about one of my findings on Facebook. The vulnerability led to the…

Saugat Pokharel
May 27, 2025 1 min read
Bug Bounty Cybersecurity Hacking +2
Why JWTs Valid After Logout: A Pentester’s Guide to Testing and Securing Tokens

Why JWTs Valid After Logout: A Pentester’s Guide to Testing and Securing Tokens

Discover why JWTs stay valid after logout and how refresh tokens keep apps secure. A pentester’s clear guide to testing and fixing tokens.

Sid Joshi
May 27, 2025 1 min read
Jwt Exploitation Bug Bounty Pentesting +2
AEM Bug in Adobe

AEM Bug in Adobe

hi hackers

Muhammad Mater
May 27, 2025 1 min read
Bugbounty Writeup Hunting Bug Bounty Tips +2
How I made $64k from deleted files — a bug bounty story
Featured

How I made $64k from deleted files — a bug bounty story

TL;DR — I built an automation that cloned and scanned tens of thousands of public GitHub repos for leaked secrets. For each repository I…

Sharon Brizinov
May 26, 2025 1 min read
Bug Bounty Github Hacking +1
Showing page 1 of 2 (14 total articles)