Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
bugbounty
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
Teycir Ben Soltane
Teycir Ben Soltane
Teycir Ben Soltane
Follow
Feb 4
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
#
security
#
bugbounty
#
websecurity
#
waf
Comments
Add Comment
5 min read
Why BOLA Is #1 in OWASP API Top 10
YogSec
YogSec
YogSec
Follow
Feb 3
Why BOLA Is #1 in OWASP API Top 10
#
bugbounty
#
cybersecurity
#
bola
#
owasp
Comments
Add Comment
3 min read
Understanding APIs Beyond the Textbook: A Bug Hunterâs Perspective
YogSec
YogSec
YogSec
Follow
Feb 2
Understanding APIs Beyond the Textbook: A Bug Hunterâs Perspective
#
apisecurity
#
bugbounty
#
webdev
#
pentesting
Comments
Add Comment
2 min read
Meet ReVex: The Cyberpunk HTTP Repeater that lives in your DevTools â ď¸
Mohamed
Mohamed
Mohamed
Follow
Feb 1
Meet ReVex: The Cyberpunk HTTP Repeater that lives in your DevTools â ď¸
#
cybersecurity
#
webdev
#
bugbounty
#
programming
Comments
Add Comment
2 min read
Bug Bounty: Detection vs Validation
Chudi Nnorukam
Chudi Nnorukam
Chudi Nnorukam
Follow
Feb 10
Bug Bounty: Detection vs Validation
#
bugbounty
#
validation
#
security
#
falsepositives
Comments
Add Comment
5 min read
Semi-Autonomous Bug Bounty System
Chudi Nnorukam
Chudi Nnorukam
Chudi Nnorukam
Follow
Feb 10
Semi-Autonomous Bug Bounty System
#
bugbounty
#
ai
#
security
#
automation
Comments
Add Comment
4 min read
I Built an AI-Powered Bug Bounty Automation System
Chudi Nnorukam
Chudi Nnorukam
Chudi Nnorukam
Follow
Feb 10
I Built an AI-Powered Bug Bounty Automation System
#
bugbounty
#
ai
#
automation
#
security
Comments
Add Comment
5 min read
Failure-Driven Learning: Auto-Recovery in Security Tools
Chudi Nnorukam
Chudi Nnorukam
Chudi Nnorukam
Follow
Feb 10
Failure-Driven Learning: Auto-Recovery in Security Tools
#
bugbounty
#
failurerecovery
#
automation
#
security
Comments
Add Comment
6 min read
Human-in-the-Loop: The Ethics of Security Automation
Chudi Nnorukam
Chudi Nnorukam
Chudi Nnorukam
Follow
Feb 10
Human-in-the-Loop: The Ethics of Security Automation
#
bugbounty
#
ethics
#
automation
#
security
Comments
Add Comment
6 min read
Multi-Platform Bug Bounty Tool
Chudi Nnorukam
Chudi Nnorukam
Chudi Nnorukam
Follow
Feb 10
Multi-Platform Bug Bounty Tool
#
bugbounty
#
hackerone
#
intigriti
#
bugcrowd
Comments
Add Comment
4 min read
Day 1 - Learning Bug Bounty
Arun kumar G
Arun kumar G
Arun kumar G
Follow
Jan 21
Day 1 - Learning Bug Bounty
#
bugbounty
#
cybersecurity
#
ethicalhacking
#
hacker
Comments
Add Comment
1 min read
Bug Bounty Hunting in 2026
krlz
krlz
krlz
Follow
Jan 11
Bug Bounty Hunting in 2026
#
security
#
bugbounty
#
tutorial
#
beginners
2
 reactions
Comments
Add Comment
4 min read
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it
is*hosting
is*hosting
is*hosting
Follow
Nov 18 '25
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it
#
bugbounty
#
hackerone
#
cybersecurity
#
infosec
Comments
Add Comment
3 min read
Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired
Nimesh Thakur
Nimesh Thakur
Nimesh Thakur
Follow
Dec 6 '25
Building 404fuzz: A Multi-Core Fuzzer That Never Gets Tired
#
bugbounty
#
opensource
#
node
#
infosec
5
 reactions
Comments
Add Comment
3 min read
404ping v2 â The API Testing CLI That Went From Side-Project to Beast Mode đĽ
Nimesh Thakur
Nimesh Thakur
Nimesh Thakur
Follow
Nov 29 '25
404ping v2 â The API Testing CLI That Went From Side-Project to Beast Mode đĽ
#
webdev
#
opensource
#
bugbounty
#
javascript
12
 reactions
Comments
4
 comments
3 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account