bug bounty hunting

  1. fzzn6590

    Hacking Silent Account Takeover: How an IDOR and Password Reset Poisoning Lead to a 0-Click Account Takeover

    Introduction This time, I was hunting for vulnerabilities in a e-commerce platform, which hosts over 300 stores. After enumerating all the subdomains, I noticed that stores using the free plan had domains formatted like: “storename.ecommerce.com”. I chose one and started capturing traffic with...
  2. d0ctrine

    Hacking 🔓 A Rough Overview of Hacking in 2025 🔓

    A Rough Overview of Hacking in 2025 My inbox is overflowing with messages like d0ctrine teach me hacking! or d0ctrine how do I get credit card numbers from sites?. First off if youve been paying any damn attention to my other writeups youd know that before I was your favorite fraud guru I was a...
Top Bottom