BBRE Premium
  • Archive by issues
  • Courses
  • Archive by category
  • Account
Select Page

  • All
  • Featured

Courses

  • Learning GraphQL

    5 Lessons

    You are unauthorized to view this page.

  • Python for web hacking

    3 Lessons

    You are unauthorized to view this page.

Recent Posts

  • SQLi Case Study
  • Google OSV-Scanner
  • 4-part series about hacking GitHub Actions workflows
  • What advice would top hackers give to beginners?
  • Finding bugs by reading RFCs

categories

  • Articles by Issue
  • Bug Bounty
  • Burp
  • Case Studies
  • Challenges
  • Cheat sheets
  • Client-side hacking techniques
  • Cloud
  • Hacking Techniques
  • Labs
  • Mobile
  • Non-technical
  • Recon
  • Server-side hacking techniques
  • Source code
  • Tools
  • Web3
  • Writeups

tags

.net (2) 2fa (1) account-takeover (8) api (2) aws (4) cache-poisoning (5) cicd (2) cloud (2) codeql (5) cors (3) crypto (1) csrf (6) ctf (5) cve (3) debugging (3) dependency-confusion (1) deserialisation (2) dns (2) free (206) ghactions (3) graphql (4) idor (1) java (6) js (9) json (2) learning (1) mongodb (1) nuclei (1) path-traversal (1) postmessage (2) premium (101) proto-pollution (3) python (3) qa (1) rails (1) rce (12) regex (2) request-smuggling (5) rpc (1) ruby (3) salesforce (1) secrets (4) semgrep (2) session (1) sqli (5) ssrf (16) ssti (1) talks (6) terminal (4) unicode (1) urls (4) vscode (2) waf (4) web3 (7) websockets (3) wordpress (3) xml (1) xss (22)

Categories

  • Facebook
  • Twitter
© Bug Bounty Reports Explained Grzegorz Niedziela 2022. Company registration number: PL6751745962