Security Articles & Resources

Discover the latest cybersecurity articles, tutorials, and resources from around the web.

Showing 9 of 9 articles

How to Bypass Encryption Mechanism in Android Apps - InfoSec Write-ups

How to Bypass Encryption Mechanism in Android Apps - InfoSec Write-ups

Hi Folks, hope you are well. As you know developers and pentesters are always into a cat and mouse game. No matter how much we want to deny the fact but we make each other’s life a little tough…

Jaimin Gohel
Jun 01, 2025 1 min read
Android Pentesting Hacking Frida +2
Full-Blown SSRF to Gain Access to Millions of Users’ Records and Multiple Internal Panels

Full-Blown SSRF to Gain Access to Millions of Users’ Records and Multiple Internal Panels

This write-up details an SSRF vulnerability that allowed unauthorized access to millions of sensitive data and internal services.

Skyer
May 31, 2025 1 min read
Bug Bounty Cybersecurity Hacking +2
A step-by-step Android penetration testing guide for beginners

A step-by-step Android penetration testing guide for beginners

As I’m presently engaged in Android penetration testing, I’d like to relay my experiences with you, as they may prove beneficial in addressing some of the inquiries, I had difficulty resolving…

Sandeep Vishwakarma
May 28, 2025 1 min read
Android Pentest Mobile Testing Mobile Hacking +2
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Introduction: Navigating the Android Abyss

Hacker's Dump
May 28, 2025 1 min read
Android Android Pentesting Penetration Testing +2
Stealing First Party Access Token of Facebook Users: Meta Bug Bounty

Stealing First Party Access Token of Facebook Users: Meta Bug Bounty

Hi, I am Saugat Pokharel from Kathmandu, Nepal. I am going to talk about one of my findings on Facebook. The vulnerability led to the…

Saugat Pokharel
May 27, 2025 1 min read
Bug Bounty Cybersecurity Hacking +2
MQTT Pentesting: Authentication, Authorization & Availability Attacks

MQTT Pentesting: Authentication, Authorization & Availability Attacks

Introduction:

Vaishali Nagori
May 27, 2025 1 min read
Iot Security Mqtt Pentesting +2
How I made $64k from deleted files — a bug bounty story
Featured

How I made $64k from deleted files — a bug bounty story

TL;DR — I built an automation that cloned and scanned tens of thousands of public GitHub repos for leaked secrets. For each repository I…

Sharon Brizinov
May 26, 2025 1 min read
Bug Bounty Github Hacking +1
How I Made $9,000 in One Month from Bug Bounty

How I Made $9,000 in One Month from Bug Bounty

A deep dive into my methodical approach, unique tricks, and how I exploited a misimplementation of PayU on a target website for a big reward

Milad Safdari (Eulex)
May 26, 2025 1 min read
Bug Bounty Bug Bounty Tips Vulnerability +2
How I Found a Critical Vulnerability and Earned $4,000 in Bug Bounty Hunting

How I Found a Critical Vulnerability and Earned $4,000 in Bug Bounty Hunting

How I Found a Critical Vulnerability and Earned $4,000 in Bug Bounty Hunting

zack0x01
May 26, 2025 1 min read
Bug Bounty Idor Cyber Security +1