<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — Bug Bounty</title>
  <link>https://appsec.fyi/bugbounty.html</link>
  <description>Curated Bug Bounty resources from appsec.fyi</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/bugbounty.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Fri, 10 Apr 2026 16:02:05 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>Automate Recon and Detect Subdomain Takeovers</title>
    <link>https://www.webasha.com/blog/how-can-i-automate-recon-and-detect-subdomain-takeovers-using-tools-like-amass-subfinder-and-nuclei</link>
    <guid isPermaLink="true">https://www.webasha.com/blog/how-can-i-automate-recon-and-detect-subdomain-takeovers-using-tools-like-amass-subfinder-and-nuclei</guid>
    <description>Automate Recon and Detect Subdomain Takeovers</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:56:32 +0000</pubDate>
  </item>
  <item>
    <title>Writeups - Pentester Land</title>
    <link>https://pentester.land/writeups/</link>
    <guid isPermaLink="true">https://pentester.land/writeups/</guid>
    <description>Writeups - Pentester Land</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:56:32 +0000</pubDate>
  </item>
  <item>
    <title>The Unfiltered 2025 Guide to Web Pentesting &amp; Bug Bounties</title>
    <link>https://brutsecurity.medium.com/the-unfiltered-2025-guide-to-web-pentesting-bug-bounties-from-zero-to-hired-24b3ffb10bc9</link>
    <guid isPermaLink="true">https://brutsecurity.medium.com/the-unfiltered-2025-guide-to-web-pentesting-bug-bounties-from-zero-to-hired-24b3ffb10bc9</guid>
    <description>The Unfiltered 2025 Guide to Web Pentesting &amp; Bug Bounties</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:56:31 +0000</pubDate>
  </item>
  <item>
    <title>Recon to Master: Complete Bug Bounty Checklist</title>
    <link>https://www.scribd.com/document/913060978/Recon-to-Master-the-Complete-Bug-Bounty-Checklist-by-Coffinxp-Jul-2025-InfoSec-Write-ups</link>
    <guid isPermaLink="true">https://www.scribd.com/document/913060978/Recon-to-Master-the-Complete-Bug-Bounty-Checklist-by-Coffinxp-Jul-2025-InfoSec-Write-ups</guid>
    <description>Recon to Master: Complete Bug Bounty Checklist</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:56:30 +0000</pubDate>
  </item>
  <item>
    <title>Awesome Bug Bounty Tools - GitHub</title>
    <link>https://github.com/vavkamil/awesome-bugbounty-tools</link>
    <guid isPermaLink="true">https://github.com/vavkamil/awesome-bugbounty-tools</guid>
    <description>Awesome Bug Bounty Tools - GitHub</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:56:29 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Hunter Software in 2026: What Belongs in Your Stack</title>
    <link>https://www.penligent.ai/hackinglabs/bug-bounty-hunter-software-in-2026-what-actually-belongs-in-your-stack/</link>
    <guid isPermaLink="true">https://www.penligent.ai/hackinglabs/bug-bounty-hunter-software-in-2026-what-actually-belongs-in-your-stack/</guid>
    <description>Bug Bounty Hunter Software in 2026: What Belongs in Your Stack</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:56:29 +0000</pubDate>
  </item>
  <item>
    <title>How I&#x27;d Start Bug Bounty Hunting in 2026: A 90-Day Plan</title>
    <link>https://medium.com/infosec-writes-up/how-id-start-bug-bounty-hunting-in-2026-a-practical-90-day-plan-d49042c59597</link>
    <guid isPermaLink="true">https://medium.com/infosec-writes-up/how-id-start-bug-bounty-hunting-in-2026-a-practical-90-day-plan-d49042c59597</guid>
    <description>How I&#x27;d Start Bug Bounty Hunting in 2026: A 90-Day Plan</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:56:28 +0000</pubDate>
  </item>
  <item>
    <title>Backend Mastery: The Real Bug Bounty Superpower (2026)</title>
    <link>https://medium.com/@tanjimul_islam/backend-mastery-the-real-bug-bounty-superpower-2026-guide-0141f8e271de</link>
    <guid isPermaLink="true">https://medium.com/@tanjimul_islam/backend-mastery-the-real-bug-bounty-superpower-2026-guide-0141f8e271de</guid>
    <description>Backend Mastery: The Real Bug Bounty Superpower (2026)</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:56:27 +0000</pubDate>
  </item>
  <item>
    <title>Fix Your Bug Bounty Strategy: The 2026 Blueprint</title>
    <link>https://codelivly.com/give-me-5-minutes-and-ill-fix-your-bug-bounty-strategy/</link>
    <guid isPermaLink="true">https://codelivly.com/give-me-5-minutes-and-ill-fix-your-bug-bounty-strategy/</guid>
    <description>Fix Your Bug Bounty Strategy: The 2026 Blueprint</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:56:26 +0000</pubDate>
  </item>
  <item>
    <title>How I Started a Bug-Bounty Career in 2026</title>
    <link>https://medium.com/infosec-writes-up/how-i-started-a-bug-bounty-career-in-2026-a-practical-roadmap-8bfd844d6a44</link>
    <guid isPermaLink="true">https://medium.com/infosec-writes-up/how-i-started-a-bug-bounty-career-in-2026-a-practical-roadmap-8bfd844d6a44</guid>
    <description>How I Started a Bug-Bounty Career in 2026</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:56:26 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Hunting Methodology 2025 - Amr Elsagaei</title>
    <link>https://www.amrelsagaei.com/bug-bounty-hunting-methodology-2025</link>
    <guid isPermaLink="true">https://www.amrelsagaei.com/bug-bounty-hunting-methodology-2025</guid>
    <description>Bug Bounty Hunting Methodology 2025 - Amr Elsagaei</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:44:01 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Hunting in 2026 - DEV Community</title>
    <link>https://dev.to/krlz/bug-bounty-hunting-guide-2026-from-zero-to-paid-security-researcher-5c82</link>
    <guid isPermaLink="true">https://dev.to/krlz/bug-bounty-hunting-guide-2026-from-zero-to-paid-security-researcher-5c82</guid>
    <description>Bug Bounty Hunting in 2026 - DEV Community</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:44:00 +0000</pubDate>
  </item>
  <item>
    <title>Getting Started With Bug Bounties: 2026 Guide - Coursera</title>
    <link>https://www.coursera.org/articles/bug-bounty</link>
    <guid isPermaLink="true">https://www.coursera.org/articles/bug-bounty</guid>
    <description>Getting Started With Bug Bounties: 2026 Guide - Coursera</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:44:00 +0000</pubDate>
  </item>
  <item>
    <title>A Beginner&#x27;s Guide to Bug Bounties</title>
    <link>https://medium.com/@richard_wachara/a-beginners-guide-to-bug-bounties-f710b10ae188</link>
    <guid isPermaLink="true">https://medium.com/@richard_wachara/a-beginners-guide-to-bug-bounties-f710b10ae188</guid>
    <description>A Beginner&#x27;s Guide to Bug Bounties</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:43:59 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Hunting Methodology 2025 - Phirojshah</title>
    <link>https://medium.com/@phirojshah20/bug-bounty-hunting-methodology-2025-797bf8ae4c27</link>
    <guid isPermaLink="true">https://medium.com/@phirojshah20/bug-bounty-hunting-methodology-2025-797bf8ae4c27</guid>
    <description>Bug Bounty Hunting Methodology 2025 - Phirojshah</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:43:58 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty 101: Complete Roadmap for Beginners (2026)</title>
    <link>https://netlas.io/blog/bug_bounty_roadmap/</link>
    <guid isPermaLink="true">https://netlas.io/blog/bug_bounty_roadmap/</guid>
    <description>Bug Bounty 101: Complete Roadmap for Beginners (2026)</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:43:57 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Methodology Version 2025</title>
    <link>https://medium.com/@techinsights5/bug-bounty-methodology-version-2025-4cb701838658</link>
    <guid isPermaLink="true">https://medium.com/@techinsights5/bug-bounty-methodology-version-2025-4cb701838658</guid>
    <description>Bug Bounty Methodology Version 2025</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:43:56 +0000</pubDate>
  </item>
  <item>
    <title>31 Bite-Sized Tips and Bug Bounty Resources for 2026</title>
    <link>https://www.intigriti.com/blog/business-insights/31-bite-sized-tips-techniques-and-bug-bounty-resources-to-kick-off-2026</link>
    <guid isPermaLink="true">https://www.intigriti.com/blog/business-insights/31-bite-sized-tips-techniques-and-bug-bounty-resources-to-kick-off-2026</guid>
    <description>31 Bite-Sized Tips and Bug Bounty Resources for 2026</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 10 Apr 2026 01:43:56 +0000</pubDate>
  </item>
  <item>
    <title>Getting Started as a Penetration Tester in NZ (2026 Edition)</title>
    <link>https://www.linkedin.com/pulse/getting-started-penetration-tester-nz-2026-edition-simon-howard-hxt7e</link>
    <guid isPermaLink="true">https://www.linkedin.com/pulse/getting-started-penetration-tester-nz-2026-edition-simon-howard-hxt7e</guid>
    <description>Getting Started as a Penetration Tester in NZ (2026 Edition)</description>
    <category>Bug Bounty</category>
    <pubDate>Mon, 06 Apr 2026 02:03:08 +0000</pubDate>
  </item>
  <item>
    <title>shuvonsec/claude-bug-bounty: AI Bug Bounty Framework</title>
    <link>https://github.com/shuvonsec/claude-bug-bounty</link>
    <guid isPermaLink="true">https://github.com/shuvonsec/claude-bug-bounty</guid>
    <description>shuvonsec/claude-bug-bounty: AI Bug Bounty Framework</description>
    <category>Bug Bounty</category>
    <pubDate>Mon, 06 Apr 2026 02:03:07 +0000</pubDate>
  </item>
  <item>
    <title>Disclosed: $4.3m Paid in HackerOne LHEs, PortSwigger Top 10 Released</title>
    <link>https://getdisclosed.com/p/disclosed-february-9th-2026-4-3m-paid-in-hackerone-lhes-portswigger-top-10-released-yeswehack-s-2026</link>
    <guid isPermaLink="true">https://getdisclosed.com/p/disclosed-february-9th-2026-4-3m-paid-in-hackerone-lhes-portswigger-top-10-released-yeswehack-s-2026</guid>
    <description>Disclosed: $4.3m Paid in HackerOne LHEs, PortSwigger Top 10 Released</description>
    <category>Bug Bounty</category>
    <pubDate>Mon, 06 Apr 2026 02:03:05 +0000</pubDate>
  </item>
  <item>
    <title>HackerOne Hacktivity</title>
    <link>https://hackerone.com/hacktivity/overview</link>
    <guid isPermaLink="true">https://hackerone.com/hacktivity/overview</guid>
    <description>HackerOne Hacktivity</description>
    <category>Bug Bounty</category>
    <pubDate>Mon, 06 Apr 2026 02:03:03 +0000</pubDate>
  </item>
  <item>
    <title>How Bug Bounty Hunters Are Using Claude Code</title>
    <link>https://infosecwriteups.com/how-bug-bounty-hunters-are-using-claude-code-a94d6ceb056a</link>
    <guid isPermaLink="true">https://infosecwriteups.com/how-bug-bounty-hunters-are-using-claude-code-a94d6ceb056a</guid>
    <description>How Bug Bounty Hunters Are Using Claude Code</description>
    <category>Bug Bounty</category>
    <pubDate>Mon, 06 Apr 2026 02:03:02 +0000</pubDate>
  </item>
  <item>
    <title>API Penetration Testing: Combined Checklist + Scenario List</title>
    <link>https://github.com/mitulkalsariya/API-Security-Checklist-Scenarios</link>
    <guid isPermaLink="true">https://github.com/mitulkalsariya/API-Security-Checklist-Scenarios</guid>
    <description>API Penetration Testing: Combined Checklist + Scenario List</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 03 Apr 2026 15:58:03 +0000</pubDate>
  </item>
  <item>
    <title>The Tools I Use for Bug Bounty Hunting</title>
    <link>https://devprogramming.medium.com/the-tools-i-use-for-bug-bounty-hunting-5e544af7df44</link>
    <guid isPermaLink="true">https://devprogramming.medium.com/the-tools-i-use-for-bug-bounty-hunting-5e544af7df44</guid>
    <description>The Tools I Use for Bug Bounty Hunting</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 03 Apr 2026 15:58:02 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Hunting in 2025: A Real World Guide</title>
    <link>https://blog.hackbynight.nl/getting-started-with-bug-bounty-hunting-in-2025-a-real-world-guide-051a3fb36376</link>
    <guid isPermaLink="true">https://blog.hackbynight.nl/getting-started-with-bug-bounty-hunting-in-2025-a-real-world-guide-051a3fb36376</guid>
    <description>Bug Bounty Hunting in 2025: A Real World Guide</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 03 Apr 2026 15:58:00 +0000</pubDate>
  </item>
  <item>
    <title>Full Bug Bounty Hunting Methodology - Recon (DEF CON 32 Workshop)</title>
    <link>https://github.com/R-s0n/bug-bounty-village-defcon32-workshop/blob/main/recon-methodology.md</link>
    <guid isPermaLink="true">https://github.com/R-s0n/bug-bounty-village-defcon32-workshop/blob/main/recon-methodology.md</guid>
    <description>Full Bug Bounty Hunting Methodology - Recon (DEF CON 32 Workshop)</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 03 Apr 2026 15:57:59 +0000</pubDate>
  </item>
  <item>
    <title>The Best Bug Bounty Recon Methodology (2024) | Hive Five</title>
    <link>https://www.hivefive.community/p/the-best-bug-bounty-recon-methodology</link>
    <guid isPermaLink="true">https://www.hivefive.community/p/the-best-bug-bounty-recon-methodology</guid>
    <description>The Best Bug Bounty Recon Methodology (2024) | Hive Five</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 03 Apr 2026 15:57:56 +0000</pubDate>
  </item>
  <item>
    <title>2025 Bug Bounty Methodology, Toolsets and Persistent Recon</title>
    <link>https://ravi73079.medium.com/2025-bug-bounty-methodology-toolsets-and-persistent-recon-d991e39e52ce</link>
    <guid isPermaLink="true">https://ravi73079.medium.com/2025-bug-bounty-methodology-toolsets-and-persistent-recon-d991e39e52ce</guid>
    <description>2025 Bug Bounty Methodology, Toolsets and Persistent Recon</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 03 Apr 2026 15:57:55 +0000</pubDate>
  </item>
  <item>
    <title>Comprehensive Bug Bounty Hunting Methodology (2024 Edition)</title>
    <link>https://infosecwriteups.com/comprehensive-bug-bounty-hunting-checklist-2024-edition-4abb3a9cbe66</link>
    <guid isPermaLink="true">https://infosecwriteups.com/comprehensive-bug-bounty-hunting-checklist-2024-edition-4abb3a9cbe66</guid>
    <description>Comprehensive Bug Bounty Hunting Methodology (2024 Edition)</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 03 Apr 2026 15:57:53 +0000</pubDate>
  </item>
  <item>
    <title>From Recon to Report: Complete Bug Bounty Workflow for 2025</title>
    <link>https://cyberxsociety.com/from-recon-to-report-complete-bug-bounty-workflow-for-2025-with-tools-commands-and-tips/</link>
    <guid isPermaLink="true">https://cyberxsociety.com/from-recon-to-report-complete-bug-bounty-workflow-for-2025-with-tools-commands-and-tips/</guid>
    <description>From Recon to Report: Complete Bug Bounty Workflow for 2025</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 03 Apr 2026 15:57:51 +0000</pubDate>
  </item>
  <item>
    <title>Recon for Bug Bounty: 8 Essential Tools | Intigriti</title>
    <link>https://www.intigriti.com/researchers/blog/hacking-tools/recon-for-bug-bounty-8-essential-tools-for-performing-effective-reconnaissance</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/blog/hacking-tools/recon-for-bug-bounty-8-essential-tools-for-performing-effective-reconnaissance</guid>
    <description>Recon for Bug Bounty: 8 Essential Tools | Intigriti</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 03 Apr 2026 15:57:50 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Hunting Methodology 2025</title>
    <link>https://github.com/amrelsagaei/Bug-Bounty-Hunting-Methodology-2025</link>
    <guid isPermaLink="true">https://github.com/amrelsagaei/Bug-Bounty-Hunting-Methodology-2025</guid>
    <description>Bug Bounty Hunting Methodology 2025</description>
    <category>Bug Bounty</category>
    <pubDate>Fri, 03 Apr 2026 15:57:48 +0000</pubDate>
  </item>
  <item>
    <title>How I Built a 5-Path AI “Recon Beast” with n8n and Gemini (2026 Guide)</title>
    <link>https://medium.com/@spapasotiropoulos/how-i-built-a-5-path-ai-recon-beast-with-n8n-and-gemini-2026-guide-dcf5d3992d85</link>
    <guid isPermaLink="true">https://medium.com/@spapasotiropoulos/how-i-built-a-5-path-ai-recon-beast-with-n8n-and-gemini-2026-guide-dcf5d3992d85</guid>
    <description>In 2026, the bug bounty landscape requires more than just speed, with AI enhancing attacker capabilities. The article discusses building a 5-Path AI &quot;Recon Beast&quot; using n8n and Gemini. This innovative approach leverages automation and AI to enhance reconnaissance processes for bug bounty hunting. The focus is on utilizing technology to improve efficiency and effectiveness in identifying vulnerabilities.</description>
    <category>Bug Bounty</category>
    <pubDate>Mon, 16 Feb 2026 14:43:36 +0000</pubDate>
  </item>
  <item>
    <title>(Research) Exploiting HTTP Parsers Inconsistencies</title>
    <link>https://rafa.hashnode.dev/exploiting-http-parsers-inconsistencies</link>
    <guid isPermaLink="true">https://rafa.hashnode.dev/exploiting-http-parsers-inconsistencies</guid>
    <description>The content titled &quot;(Research) Exploiting HTTP Parsers Inconsistencies&quot; likely discusses a study or investigation into vulnerabilities related to inconsistencies in HTTP parsers. This research may explore how these inconsistencies can be manipulated or exploited for various purposes. The focus is likely on understanding the weaknesses in HTTP parsers and potentially finding ways to enhance security measures to mitigate these vulnerabilities.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:53 +0000</pubDate>
  </item>
  <item>
    <title>Top 10 web hacking techniques of 2022 | PortSwigger Research</title>
    <link>https://portswigger.net/research/top-10-web-hacking-techniques-of-2022</link>
    <guid isPermaLink="true">https://portswigger.net/research/top-10-web-hacking-techniques-of-2022</guid>
    <description>The content is about the top 10 web hacking techniques of 2022 as researched by PortSwigger. It likely delves into the latest methods and strategies used by hackers to exploit vulnerabilities in web systems. This information can be valuable for cybersecurity professionals, developers, and organizations to understand current threats and enhance their defenses against cyber attacks.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:49 +0000</pubDate>
  </item>
  <item>
    <title>HTTP-HOST HEADER ATTACKS. Hi! My name is Hashar Mujahid and today… | by Has</title>
    <link>https://infosecwriteups.com/http-host-header-attacks-55ca4b7786c</link>
    <guid isPermaLink="true">https://infosecwriteups.com/http-host-header-attacks-55ca4b7786c</guid>
    <description>The content discusses HTTP-Host header attacks and is authored by Hashar Mujahid. It seems to provide information or insights related to this type of cyber attack.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:47 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty — Tips / Tricks / JS (JavaScript Files) - InfoSec Write-ups - Me</title>
    <link>https://medium.com/bugbountywriteup/bug-bounty-tips-tricks-js-javascript-files-bdde412ea49d</link>
    <guid isPermaLink="true">https://medium.com/bugbountywriteup/bug-bounty-tips-tricks-js-javascript-files-bdde412ea49d</guid>
    <description>The content discusses bug bounty tips, tricks, and JavaScript (JS) files in the context of InfoSec write-ups. It likely includes insights, strategies, and techniques related to identifying and exploiting security vulnerabilities in web applications through bug bounty programs. The author may share their experiences, knowledge, and recommendations for effectively finding and reporting bugs in JavaScript files to enhance cybersecurity practices.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:36 +0000</pubDate>
  </item>
  <item>
    <title>https://github.com/dsopas/assessment-mindset</title>
    <link>https://github.com/dsopas/assessment-mindset</link>
    <guid isPermaLink="true">https://github.com/dsopas/assessment-mindset</guid>
    <description>The provided link leads to a GitHub repository named &quot;assessment-mindset&quot; created by dsopas. The repository likely contains information, code, or resources related to developing an assessment mindset. It may include tools, techniques, or strategies for improving assessment skills or approaches. Users can explore the repository to gain insights into fostering a positive mindset towards assessments.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:34 +0000</pubDate>
  </item>
  <item>
    <title>The Hitchhiker’s Guide to Bug Bounty Hunting Throughout the Galaxy. v2</title>
    <link>https://medium.com/@Nick_Jenkins/the-hitchhikers-guide-to-bug-bounty-hunting-throughout-the-galaxy-474ddb87ae15</link>
    <guid isPermaLink="true">https://medium.com/@Nick_Jenkins/the-hitchhikers-guide-to-bug-bounty-hunting-throughout-the-galaxy-474ddb87ae15</guid>
    <description>The content is titled &quot;The Hitchhiker’s Guide to Bug Bounty Hunting Throughout the Galaxy. v2.&quot; It suggests a guide or resource for individuals interested in bug bounty hunting, a practice where individuals find and report security vulnerabilities in exchange for rewards. The title alludes to the popular book &quot;The Hitchhiker&#x27;s Guide to the Galaxy,&quot; implying a whimsical or humorous approach to the subject matter. It likely provides tips, strategies, and insights for bug bounty hunters operating in a wide range of environments or platforms.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:32 +0000</pubDate>
  </item>
  <item>
    <title>commixproject/commix: Automated All-in-One OS Command Injection Exploitatio</title>
    <link>https://github.com/commixproject/commix</link>
    <guid isPermaLink="true">https://github.com/commixproject/commix</guid>
    <description>The content is about commixproject/commix, a tool for automated OS command injection exploitation. It is designed to streamline the process of identifying and exploiting vulnerabilities related to OS command injections. This tool aims to automate the exploitation of such vulnerabilities, making it easier for security professionals to test and secure their systems against these types of attacks.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:16 +0000</pubDate>
  </item>
  <item>
    <title>https://bugbountyforum.com/</title>
    <link>https://bugbountyforum.com/</link>
    <guid isPermaLink="true">https://bugbountyforum.com/</guid>
    <description>The content provided is a URL link to bugbountyforum.com. The website likely focuses on bug bounty programs, where individuals can report security vulnerabilities in exchange for rewards. It serves as a platform for security researchers and companies to collaborate in identifying and fixing potential security issues. The forum may offer discussions, resources, and opportunities related to bug bounty programs.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:12 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty POC - All Bug Bounty POC write ups by Security Researchers.</title>
    <link>https://bugbountypoc.com/</link>
    <guid isPermaLink="true">https://bugbountypoc.com/</guid>
    <description>The content is about Bug Bounty Proof of Concepts (POC) which are write-ups created by security researchers. These POCs detail vulnerabilities found in software or systems, demonstrating how they can be exploited. This information is valuable for organizations looking to improve their security by addressing these vulnerabilities.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:10 +0000</pubDate>
  </item>
  <item>
    <title>File Upload XSS - Brute XSS</title>
    <link>https://brutelogic.com.br/blog/file-upload-xss/</link>
    <guid isPermaLink="true">https://brutelogic.com.br/blog/file-upload-xss/</guid>
    <description>The content is very brief and mentions &quot;File Upload XSS - Brute XSS.&quot; This likely refers to a type of cross-site scripting (XSS) attack that involves exploiting vulnerabilities in file upload functionality to execute malicious scripts. The term &quot;Brute XSS&quot; may suggest a method of systematically testing for XSS vulnerabilities. Overall, the content seems to highlight the potential risks associated with file uploads and XSS attacks.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:08 +0000</pubDate>
  </item>
  <item>
    <title>https://www.hahwul.com/2019/09/28/oxml-xxe-payload-inject-tool-docem/</title>
    <link>https://www.hahwul.com/2019/09/28/oxml-xxe-payload-inject-tool-docem/</link>
    <guid isPermaLink="true">https://www.hahwul.com/2019/09/28/oxml-xxe-payload-inject-tool-docem/</guid>
    <description>The content discusses a tool called &quot;Docem&quot; developed by a security researcher to inject XXE payloads into OXML files. XXE (XML External Entity) vulnerabilities can be exploited to manipulate XML data and potentially lead to security breaches. The tool automates the process of injecting malicious payloads into Office Open XML (OXML) files, making it easier for security professionals to test and identify vulnerabilities in systems that process XML data. The tool&#x27;s capabilities and potential impact on security testing are highlighted in the article.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:06 +0000</pubDate>
  </item>
  <item>
    <title>How to discover up to 10,000 subdomains with your own tool | by _Y000_ | In</title>
    <link>https://infosecwriteups.com/this-time-you-will-learn-how-to-create-your-own-tool-with-which-you-will-be-able-to-discover-2e813495907e?source=email-90814179aa21-1621145044731-digest.reader-7b722bfd1b8d-2e813495907e----3-83------------------0b6c6411_3e40_4cf8_aa11_58ca9276b55b-1-633a7078_5501_4113_8b60_cb312e862af1&amp;gi=ade60b3e6501</link>
    <guid isPermaLink="true">https://infosecwriteups.com/this-time-you-will-learn-how-to-create-your-own-tool-with-which-you-will-be-able-to-discover-2e813495907e?source=email-90814179aa21-1621145044731-digest.reader-7b722bfd1b8d-2e813495907e----3-83------------------0b6c6411_3e40_4cf8_aa11_58ca9276b55b-1-633a7078_5501_4113_8b60_cb312e862af1&amp;gi=ade60b3e6501</guid>
    <description>The content discusses a method to uncover up to 10,000 subdomains using a self-created tool by _Y000_. It likely provides insights or instructions on how to utilize this tool effectively for discovering subdomains efficiently. The focus is on empowering individuals to explore a large number of subdomains using a personalized tool.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:30:04 +0000</pubDate>
  </item>
  <item>
    <title>How to discover up to 10,000 subdomains with your own tool | by _Y000_ | Ne</title>
    <link>https://medium.com/nerd-for-tech/how-to-discover-up-to-10-000-subdomains-with-your-own-tool-6189b164a7a3</link>
    <guid isPermaLink="true">https://medium.com/nerd-for-tech/how-to-discover-up-to-10-000-subdomains-with-your-own-tool-6189b164a7a3</guid>
    <description>The content discusses a method to uncover up to 10,000 subdomains using a self-created tool by _Y000_ on the platform Ne. The focus is on the process of discovering subdomains efficiently through the tool.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:29:54 +0000</pubDate>
  </item>
  <item>
    <title>A ffuf Primer | Daniel Miessler</title>
    <link>https://danielmiessler.com/study/ffuf/?mc_cid=78334e62a9&amp;mc_eid=45008603ab</link>
    <guid isPermaLink="true">https://danielmiessler.com/study/ffuf/?mc_cid=78334e62a9&amp;mc_eid=45008603ab</guid>
    <description>The content seems to be a primer on the tool &quot;ffuf&quot; by Daniel Miessler. It likely introduces readers to the basics of using ffuf, a versatile web fuzzer commonly used for web application security testing. The primer may cover how to install and utilize ffuf effectively for tasks such as discovering hidden files or directories, identifying vulnerabilities, and conducting comprehensive web scans. Daniel Miessler, a well-known cybersecurity expert, is likely the author of this primer, providing valuable insights and guidance on leveraging ffuf for security testing purposes.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:29:40 +0000</pubDate>
  </item>
  <item>
    <title>https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/</title>
    <link>https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/</link>
    <guid isPermaLink="true">https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/</guid>
    <description>The content discusses website penetration testing and database hacking using SQLmap. It covers the importance of penetration testing to identify vulnerabilities, the process of using SQLmap for database hacking, and steps to perform SQL injection attacks. The article emphasizes the ethical use of these techniques for security testing and highlights the risks associated with unauthorized hacking. It provides insights into the tools and methods used in penetration testing and database hacking, aiming to enhance cybersecurity awareness and skills.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:29:30 +0000</pubDate>
  </item>
  <item>
    <title>https://link.medium.com/oVNvKnISbdb</title>
    <link>https://link.medium.com/oVNvKnISbdb</link>
    <guid isPermaLink="true">https://link.medium.com/oVNvKnISbdb</guid>
    <description>I&#x27;m unable to access external content such as the one you provided. If you can provide the main points or key ideas from the content, I&#x27;d be happy to help summarize it for you in 100 words or less.</description>
    <category>Bug Bounty</category>
    <pubDate>Thu, 14 Aug 2025 04:29:28 +0000</pubDate>
  </item>
</channel>
</rss>