Ex-founder | Security Researcher | 👨🌾 Homesteader
Blog: blog.stellersjay.pub
X: https://x.com/call_eax
mastodon: https://infosec.exchange/@CALLEAX
Why it's great:
- Learn unfamiliar subsystems.
- Follow real-world PoCs from start to finish.
- Apply insights directly to your own targets.
Sharpens skills.
Why it's great:
- Learn unfamiliar subsystems.
- Follow real-world PoCs from start to finish.
- Apply insights directly to your own targets.
Sharpens skills.
- Found a forbidden (403) path
- Check for subpaths beyond that
- Found an image
- Sub-sequential response length grew from 1034 to 830319 🙃
Great defense or it's a bug...
- Found a forbidden (403) path
- Check for subpaths beyond that
- Found an image
- Sub-sequential response length grew from 1034 to 830319 🙃
Great defense or it's a bug...
- 💯 Build your own API wordlist.
- Why? Public lists are too well-known and overused.
- Craft one tailored to your hunt for a competitive edge.
- Don’t forget to test these wordlists on URL subpaths, you might uncover unique bypasses.
#bugbountytips
- 💯 Build your own API wordlist.
- Why? Public lists are too well-known and overused.
- Craft one tailored to your hunt for a competitive edge.
- Don’t forget to test these wordlists on URL subpaths, you might uncover unique bypasses.
#bugbountytips
4d 55 52 4c 28 bd 06 00 52 50 4b 47 48 45 41 44 4c 00 00 00
4d 55 52 4c 28 bd 06 00 52 50 4b 47 48 45 41 44 4c 00 00 00
blog.stellersjay.pub/now-and-late...
blog.stellersjay.pub/now-and-late...