Explore our latest articles on bug bounty hunting, vulnerability discovery, and security research
Read our Medium publications on cybersecurity topics
Learn how to identify and exploit common password reset vulnerabilities in web applications.
Read on Medium
Discover our powerful tool for testing Cross-Origin Resource Sharing configurations and vulnerabilities.
Read on Medium
Proven strategies and techniques to maximize your success in bug bounty programs.
Read on Medium
Technical analysis of an unauthenticated information disclosure vulnerability in Atlassian Jira.
Read on Medium
A case study of discovering and exploiting a Local File Inclusion vulnerability in a major network.
Read on Medium
How I discovered and reported an open redirect vulnerability in Epic Games that earned my first bounty.
Read on Medium