Explore our latest articles on bug bounty hunting, vulnerability discovery, and security research
Read our Medium publications on cybersecurity topics
Learn how to identify and exploit common password reset vulnerabilities in web applications.
Read on MediumDiscover our powerful tool for testing Cross-Origin Resource Sharing configurations and vulnerabilities.
Read on MediumProven strategies and techniques to maximize your success in bug bounty programs.
Read on MediumTechnical analysis of an unauthenticated information disclosure vulnerability in Atlassian Jira.
Read on MediumA case study of discovering and exploiting a Local File Inclusion vulnerability in a major network.
Read on MediumHow I discovered and reported an open redirect vulnerability in Epic Games that earned my first bounty.
Read on Medium