Open in app

Sign in

Medium Logo
Write

Sign in

Thexssrat
Thexssrat

6.9K followers

Home

About

Pinned
Geek Culture

Published in

Geek Culture

Main App Bug Bounty Methodology —  V3

Introduction

Apr 9, 2021
1
Main App Bug Bounty Methodology —  V3
Main App Bug Bounty Methodology —  V3
Apr 9, 2021
1
Pinned

IDORs: What are they and how do you test for them?

In this article i try to completely cover IDORs.

Nov 26, 2020
IDORs: What are they and how do you test for them?
IDORs: What are they and how do you test for them?
Nov 26, 2020

The Ultimate Checklist for Detecting IDOR and Broken Access Control Vulnerabilities

When testing web applications for security vulnerabilities, Insecure Direct Object References (IDOR) and Broken Access Control (BAC) are…

Dec 25, 2024
The Ultimate Checklist for Detecting IDOR and Broken Access Control Vulnerabilities
The Ultimate Checklist for Detecting IDOR and Broken Access Control Vulnerabilities
Dec 25, 2024

Very Basic Beginner Bug Bounty Methodology: Practical Tips and Techniques for Web Apps

Beginner Bug Bounty Methodology: Practical Tips and Techniques for Web Apps

Dec 23, 2024
Very Basic Beginner Bug Bounty Methodology: Practical Tips and Techniques for Web Apps
Very Basic Beginner Bug Bounty Methodology: Practical Tips and Techniques for Web Apps
Dec 23, 2024

100 CLI Flags and Tricks Every Bug Bounty Hunter Should Know

Bug bounty hunting is an exciting yet challenging field that requires the mastery of numerous tools and techniques. While graphical…

Dec 23, 2024
100 CLI Flags and Tricks Every Bug Bounty Hunter Should Know
100 CLI Flags and Tricks Every Bug Bounty Hunter Should Know
Dec 23, 2024

Understanding and Testing for API3:2023 — Broken Object Property Level Authorization

Introduction

Dec 7, 2024
Dec 7, 2024

Understanding and Testing for API2:2023 — Broken Authentication

Introduction

Dec 6, 2024
Dec 6, 2024

Understanding and Testing for API1:2023 — Broken Object Level Authorization

Dec 5, 2024
Dec 5, 2024

Bug Bounty Methodology Checklist for Web Applications (B2B Apps)

General checklist for bug bounties

Dec 4, 2024
Bug Bounty Methodology Checklist for Web Applications (B2B Apps)
Bug Bounty Methodology Checklist for Web Applications (B2B Apps)
Dec 4, 2024

Using ANY.RUN

In today’s cybersecurity landscape, detecting and analyzing malware is more critical than ever. Malicious executables often mask their true…

Nov 19, 2024
Using ANY.RUN
Using ANY.RUN
Nov 19, 2024
Thexssrat

Thexssrat

6.9K followers

No b*llshit Hacking tutorials with extreme value in short bursts

Following
  • Qasim Mahmood Khalid

    Qasim Mahmood Khalid

  • Cristi Vlad

    Cristi Vlad

  • Rahul Bhichher

    Rahul Bhichher

  • Sean (zseano)

    Sean (zseano)

See all (5)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech