dev-resources.site
for different kinds of informations.
bugbounty Article's
30 articles in total
【Activities Guide】A detailed overview of the TECNO Security Response Center's security incentive activities
read article
Master Password Attacks in Minutes! Ethical Hacking Guide 🔓
read article
How to Set Up an Access Point with a Fake Captive Portal
read article
Some handy notes for GCP pentesting
read article
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon
read article
Top 5 Vulnerabilities You’re Missing Out On (And How to Catch Them)
read article
The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques
read article
Top Hacking Books for 2024 (plus Resources): FREE and Paid
read article
Bug bounty hunting with LLMs
read article
External vs. Internal Explained
read article
Bug Bounty Report Template
read article
Docker explained for pentesters
read article
A07:2021 – Identification and Authentication Failures
read article
what is BOUNTY BUG ?
read article
Cara Menginstal DVWS (Damn Vulnerable Web Services) di Nginx
read article
Details QA should share when reporting a bug for efficient resolution
read article
Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers
read article
Top 5 open-source bug reporting tools for web developers
read article
The Role of Bug Reporting in Software Testing: A Deep Dive
read article
10 Best Bug Bounty Platforms to Earn Money Online
read article
Rapyd Launches Bug Bounty Program: Earn Rewards for Finding Security Vulnerabilities
read article
How to Get Started with Bug Bounty?
read article
$350 XSS in 15 minutes
read article
The Best Ways to Exploit Rate Limit Vulnerabilities
read article
A Brief Introduction to SAML Security Vector
read article
A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters
read article
P1 Bug Bounties: What is an IDOR, and how does IDOR == $$$?
read article
An Open Source apps Leads to XSS to RCE Vulnerability Flaws
read article
How To Exploit PHP Remotely To Bypass Filters & WAF Rules
read article
The Various Utilization Methods of PHP Serialization & Deserialization
read article
Featured ones: