Skip to content

Security Breached Blog

Hack Smart, Stay Safe: Comprehensive Guides to Cybersecurity and Bug Bounty

vulnerability

May 18, 2018
by MuhammadKhizerJaved

How I was able to get subscription of $120/year For Free | Bug Bounty POC

About 2 Months ago a friend gave me his wetransfer.com account to send a 15GB file to a friend as he was using WeTransfer Plus subscription that he bought for...

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Email a link to a friend (Opens in new window) Email

Like this:

Like Loading...
  • BugBounty POC
  • 8
  • Read More
February 4, 2018
by

Hunting Insecure Direct Object Reference Vulnerabilities for Fun and Profit (PART-1)

Hello Guys!! This is my first Blog post and i am starting with IDOR Vulnerability. In this Post you will know about many endpoints to test IDOR vulnerability! Hope you...

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Email a link to a friend (Opens in new window) Email

Like this:

Like Loading...
  • BugBounty POC / Tutorials / Uncategorized
  • 1
  • Read More
Page 2 of 2«12

Security Breached Blog © 2026. All Rights Reserved.

Powered by WordPress. Theme by Alx.

 

Loading Comments...
 

    %d