Intigriti
banner
intigriti.com
Intigriti
@intigriti.com
Bug bounty & VDP platform trusted by the world’s largest organisations! 🌍

linktr.ee/hackwithintigriti
DOM-based XSS vulnerabilities are tricky to test for, especially at scale, which often makes them go unnoticed for years... 😬

Yet, these seamless DOM-based bugs can sometimes even lead to account takeovers 👀

In our comprehensive article, we explore how you can identify and exploit this XSS type.
November 11, 2025 at 5:08 PM
Most JWT vulnerabilities go unnoticed as they're notoriously tricky to test for 😬

Yet, when present, they can allow for account takeovers, SQL injections and in-app privilege escalations 🤠

In our latest article, we break down every common JWT attack vector with practical exploitation techniques.
November 7, 2025 at 5:08 PM
Latest Bug Bytes is live! 🚀

This month's issue is as usual packed with bug bounty tips:
✅ Cool trick to find disclosed secrets in internal web extensions
✅ A repository full of WAF bypasses
✅ Hacking Intercom misconfigurations
✅ Wayback Machine for hackers

+ monthly hacking challenge & much more!
October 31, 2025 at 5:09 PM
It's time for the monthly code challenge!

This developer has just completed this new MFA implementation, which provides an added layer of security to protect against credential stuffing attacks! 🤠

Can you craft a working payload to evade this MFA implementation? 😎
October 30, 2025 at 8:09 PM
XSS vulnerabilities keep haunting applications even today 👻

And they're all over the place... sometimes hiding in plain sight! 👀

In our most recent article, we shared a practical and beginner-friendly methodology for testing for reflected & stored XSS vulnerabilities in any target!
October 20, 2025 at 4:40 PM
Exposed secrets can have a devastating impact on any organization 👀

But you have to know where to look for them... 🔍

In our article, we explore several methods to search for leaked secrets, such as credential pairs, API keys, and other hard-coded tokens that can expand your initial attack surfaces
October 5, 2025 at 4:08 PM
It's time for the monthly code challenge!

This developer has just finished writing his new input sanitizer function and is certain that it catches all malicious XSS payloads! 🤠

Can you craft a working payload proving him otherwise? 😎
October 1, 2025 at 7:09 PM
Next.js has become one of the most popular web development frameworks 🤠

But its extensive functionality introduces multiple attack surfaces for security vulnerabilities to arise... 😬

In our recent article, we documented 3 ways to exploit SSRF vulnerabilities in NextJS targets!

Link in next post 👇
September 28, 2025 at 4:08 PM
Latest Bug Bytes is live! 🚀

This month's issue is as usual packed with bug bounty tips:
✅ A common (yet unknown) SSRF attack vector in Next.js Middleware
✅ Exploiting PDF processors by generating and uploading malicious PDF payload files
✅ A full recon breakdown on how to approach any target
September 19, 2025 at 4:07 PM
Web-based plugin ecosystems introduce an entirely new world of integration possibilities to cloud-based platforms 🤠

But they also open up a new attack surface for us to explore... 👀

In our latest article, we've lined up frequent security risks to test for when you approach your next target
September 2, 2025 at 4:08 PM
It's time for the monthly code challenge!

The latest release has introduced profile customization, including uploading your profile picture! 🤠

Can you craft a payload that enables remote code execution? The web server (Apache) is configured to execute any PHP files in the upload directory! 😎
August 29, 2025 at 4:08 PM
SSRF vulnerabilities are getting harder to find... But they're still one of the most impactful bugs you can discover 🤠

Our latest community challenge featured a unique SSRF pattern in NextJS Middleware that many developers (& security researchers) don't know about 👀
August 28, 2025 at 4:08 PM
Latest Bug Bytes is live! 🚀

This month's issue is as usual packed with bug bounty tips:
✅ Evading WAFs like Cloudflare,Akamai & AWS Cloudfront
✅ Creating your complete bug bounty automation system
✅ A powerful, targeted backup file scanner
✅ Bypassing CSP to achieve XSS via a cool trick with PDFs
August 15, 2025 at 4:12 PM
Firebase targets are often overlooked... Causing security misconfigurations to stay undiscovered for months 😬

Firebase uses custom security rules that are more complex to get right.

In our latest article, we covered several ways to find security misconfigurations in Firebase targets 😎
August 12, 2025 at 4:07 PM
Reposted by Intigriti
Come and find the @intigriti.com team at BsidesLV. I have stickers and challenge coins… 👀
August 4, 2025 at 6:18 PM
Reposted by Intigriti
🔒 Security isn’t an afterthought at UpCloud, it’s built in.

Thanks to our partnership with @intigriti.com, we’ve integrated bug bounty, VDP & PTaaS to stay ahead of threats and protect what matters most: our customers.

🎥 www.youtube.com/watch?v=Jf_D...
📖 www.intigriti.com/customer-sto...
Intigriti Customer Story: Upcloud
YouTube video by Intigriti
www.youtube.com
July 15, 2025 at 7:49 AM
It's time for the monthly code challenge!

This new text-to-image tool has been added to the collection of conversion tools. It also accepts URLs! 🤠

Can you craft a working proof of concept that is capable of reaching the internal-only AWS metadata endpoint? 😎
July 30, 2025 at 9:07 PM
You've identified a possible SQLi 🤑

But WAF is in the way... 😓

What if you could just bypass this WAF and get your payload through? 🤠

In our latest article, we documented several ways to identify the origin IP of your target behind popular CDNs and firewalls!

🔗 www.intigriti.com/researchers/...
July 29, 2025 at 6:08 PM
Latest Bug Bytes is live! 🚀

This month's issue is as usual packed with bug bounty tips:
✅ Exploiting Log4Shell (Log4J) in 2025
✅ Indispensable GH recon tool (not the one you have in mind)
✅ Advanced WAF evasion techniques
✅ One of the most comprehensive guides on finding exposed S3 buckets
July 19, 2025 at 4:08 PM
Most bug bounty hunters overlook GitHub...

It's the place where developers accidentally commit API keys, database credentials, and internal URLs (almost every single day) 🤠

In our most recent article, we documented how you can use GitHub dorking to find more vulnerabilities!

Read the article now👇
July 13, 2025 at 9:50 PM
For some bug bounty hunters, the Log4Shell hunt never truly ended... 😈

While most moved on, some researchers know this vulnerability is still present today 👀

We just published a comprehensive guide showing exactly how to uncover Log4Shell vulnerabilities! 👇

www.intigriti.com/researchers/...
June 29, 2025 at 4:08 PM
It's time for the monthly code challenge!

Junior dev just finished with a new sandbox security policy to verify that only safe templates are rendered on his Twig 2.0 playground! 🤠

Can you craft a working proof of concept that executes the 'whoami' command? 😎
June 25, 2025 at 4:13 PM
Template injections (SSTIs) are still common and can often be escalated to RCE! 🤑

But only if you know where to look for them! 🧐

In our latest article, we've outlined several SSTI exploitation techniques, including limited cases where sandboxes prevent functions! 😎

intigriti.com/researchers/...
June 15, 2025 at 4:08 PM
Hidden parameters can lead to all sorts of vulnerabilities, from XSS to SQLi and potentially even command injections! 🤑

But they are also hard to find... 😓

In our latest article, we documented 5 methods to find hidden input parameters in API endpoints & app routes! 😎

intigriti.com/researchers/...
June 3, 2025 at 4:08 PM
It's time for the monthly code challenge!

New support employee blindly clicks on any links you send in the chat! 🤠

Can you spot the CORS issue and craft a working proof of concept that fetches the contents of the internal-only host intranet\.example\.com? 😎
May 28, 2025 at 4:08 PM