- Disclosed.
- Posts
- Disclosed. April 27 2025: Welcome to the Future of Bug Bounty News
Disclosed. April 27 2025: Welcome to the Future of Bug Bounty News
The bug bounty world, curated.

Welcome to Disclosed.
Hello. Thank you for being an early reader of the Disclosed. Newsletter. My name is Harley and I’m a hacker community cultivator, creator, and co-founder of the Bug Bounty Village at DEF CON. I spend nearly all of my time talking with hackers, pentesters, and bug bounty hunters. My goal is to provide you with valuable content each week that is actionable and helpful, but I’m new to this. I’d greatly appreciate all of the feedback as I get started and I promise to iterate and improve week over week.
If you have something in particular you’d like to see, please let me know by either replying directly to this email or reaching out to me on LinkedIn / Twitter.
Thanks again, now onto the content:
In This Issue

Ambassador World Cup Finals Kick Off
🔗 Tweet by @Hacker0×01
The AWC is kicking off soon in Dubai. The finals will contain Spain vs Egypt and Greece vs Netherlands.
🏆 The stage is set for the #AmbassadorWorldCup championship Finals! 🏆
🇪🇸 Spain vs 🇪🇬 Egypt – Who will take the crown in DUBAI this May?
🇬🇷 Greece and 🇳🇱 Netherlands battle it out for 3rd place!The world is watching. Who will rise as the HackerOne Ambassador World Cup
— HackerOne (@Hacker0x01)
9:53 PM • Apr 15, 2025
Recent Critical Bug Reports Earned Big Bounties
🔗 Tweet by @h0rus3c
Shout-out to h0rus3c for reporting six critical vulnerabilities, including a 0-click mass account takeover and multiple instances of blind SQL injection across various programs on YesWeHack.
Over the past 30 days, I’ve received rewards for reporting 6 Critical vulnerabilities across 3 different programs on @yeswehack
• Another Blind SQLi is currently Under Review
Types of bugs found:
🔸 0-Click Mass ATO
🔸[x3] Manual Blind SQLi
🔸[x3] IDOR with C:H & I:H— h0rus3c (@h0rus3c)
12:41 PM • Apr 18, 2025
New Burp Repeater Features for Power Users
🔗 Tweet by James Kettle
The latest release of Burp Repeater introduces 'Custom actions' that empower users to create personalized features, complete with sample actions provided.
View the tool →
Are you a Burp Repeater power user? The latest release introduces a new feature called 'Custom actions'. With these you can quickly build your own repeater features. Here's a few samples I made for you:
— James Kettle (@albinowax)
12:47 PM • Apr 17, 2025
Have something you want to Spotlight? Tell me.

The Bug Bounty Radar - The Latest Public Bug Bounty Programs
📓 Platform by bbradar.io
This website showcases the latest public bug bounty programs, featuring a dynamic list that refreshes every seven minutes. It highlights opportunities across platforms like HackerOne and Immunefi, categorized by type for easy access. This includes web programs and blockchain initiatives, promoting a diverse range of targets for researchers.
Read more →
Did I miss an important update? Tell me.

New AI Tool for Automated Pentest Reporting
🔗 Tweet by @garethheyes
The announcement introduces 'Document My Pentest', an AI extension that automates pentest reporting by documenting testing activities and integrating with existing workflows.
View the tool →
Enhance JavaScript Analysis with JXScout Plugin
🔗 Tweet by Caido
The JXScout plugin is launched for improved JavaScript analysis, enabling users to integrate requests from Caido for enhanced results.
View the tool →
GitHub - kevin-mizu/domloggerpp: A browser extension for monitoring JavaScript sinks
📁 Tool by kevin-mizu
The article introduces 'DOMLogger++', a browser extension that allows users to monitor, intercept, and debug JavaScript sinks using customizable configurations. It features dynamic debugging, extensive theme customization, and remote logging via webhooks.
View the tool →
GitHub - aliasrobotics/cai: Open Bug Bounty-ready AI
📁 Tool by Alias Robotics
The post highlights Cybersecurity AI (CAI), an open-source framework designed for bug bounty hunters. It emphasizes an agent-based architecture, modular design, and tools that streamline the vulnerability validation process for researchers.
View the tool →
Have a favorite tool? Tell me.


Escalating Impact: Full Account Takeover in Microsoft via XSS in Login Flow
📓 Blog by Asem Eleraky
This article explores a Cross-Site Scripting (XSS) vulnerability in Microsoft's login flow that facilitates full account takeover. It covers the complexities of Azure Active Directory authentication and presents the testing and exploitation methods, emphasizing the implications of both initial and escalated impacts.
Read more →
How I Hijacked OAuth Tokens Through a Parallel Auth Flow Race Condition — $8500 P1 Bug Bounty 💰
📓 Blog by Anmol Singh Yadav
The author details how they exploited a race condition in a popular cloud-based business management platform, allowing the hijacking of OAuth tokens. The write-up underscores the critical nature of reviewing OAuth implementations and discusses the steps of exploitation along with the $8500 bounty awarded.
Read more →
How I got a Zero-Click Account Takeover Bounty — Using Nothing But Logic
📓 Blog by Ahmed Atef
This article by Ahmed Atef discusses discovering a zero-click account takeover vulnerability leveraged through logical reasoning rather than tools. It delves into the bypassing of validation checks in OTP verification, detailing code flaws and mitigations necessary to prevent similar issues.
Read more →
Did I miss an important update? Tell me.

Abusing iframes from a Client-side Hacker (Ep. 119)
🎥 Video by Critical Thinking - Bug Bounty Podcast
In this episode, Justin delves into iframes, exploring their security ramifications and potential abuses from a client-side perspective.
Watch video →
The No BS Bug Bounty & Web Hacking Roadmap
🎥 Video by NahamSec
This video outlines a pragmatic roadmap for aspiring bug bounty hunters, stressing the importance of foundational skills like Linux and networking over certifications. Key tools and hands-on practice approaches are highlighted as essential for success.
Watch video →
Bug Bounty Tip: How I Hunt For GraphQL IDORs
🎥 Video by ChillingAndTalking
This video shares valuable techniques for identifying Insecure Direct Object References (IDORs) in GraphQL APIs through practical testing examples, using Yelp as a case study.
Watch video →
The Ultimate Guide to WAF Bypass Using SQLMap, Proxychains & Tamper Scripts
📓 Blog by coffinxp
This comprehensive guide provides strategies for bypassing Web Application Firewalls (WAFs) using SQLMap and associated tools against platforms like Cloudflare and ModSecurity, with a strong emphasis on ethical testing practices.
Read more →
Automating GraphQL Bug Bounty Hunting with GrapeQL
📓 Blog by Aleksa Zatezalo
The blog introduces GrapeQL, a tool designed to automate GraphQL security assessments, detailing its functionality for detecting vulnerabilities and generating comprehensive reports.
Read more →
Did I miss something? Tell me.

Earned P1 Bug Bounty for Full PII Access Vulnerability
🔗 Tweet by Walid Hossain
This tweet recounts earning a critical bug bounty for a vulnerability that exposed sensitive user information, with potential widespread implications.
View the tweet →
I earned $xxx for my submission on
@Bugcrowd
#ItTakesACrowd/partner/ -403
/partner/dynamic/ - 403
/partner/dynamic/trace.axd - 200- P1 - Full read trace.axd live log access lead to leakage of many users PII
— Walid Hossain (@walidhossain_)
1:30 PM • Apr 18, 2025
Effective LFI Hunting Tips for Ethical Hackers
🔗 Tweet by MahMoud Elko
This tweet recounts earning a critical bug bounty for a vulnerability that exposed sensitive user information, with potential widespread implications.
View the tweet →t
🔍 LFI Hunting Tips from Real Finds:
1️⃣ GET path injection: Try ///../../../../etc/passwd. Fuzz w/ Burp!
2️⃣ POST LFIs: Test endpoints like /router.jsp?../etc/passwd.
3️⃣ Hidden params: Brute-force w/ ParamSpider or check JS files.
💡 Bypass filters w/ %2e%2f or %00 Stay ethical!— MahMoud Elkot (@0xElkot)
6:47 PM • Apr 16, 2025
Evasion Techniques for Bypassing Spring Boot WAFs
🔗 Tweet by Shaurya Sharma
The tweet outlines evasion techniques to manipulate path filters and WAFs in Spring Boot applications, useful for identifying vulnerabilities in these frameworks.
View the resource →
Don't stop at /actuator — WAFs and path filters are easy to trick
Here's some spicy evasion sauce:/actuator%252fenv
/actuator/..;/env
/actuator%00/metrics
//actuator///heapdump
/actuator;/env
/actuator%2e%2e/#springboot#cybersecurity#bugbounty
— Shaurya Sharma (@ShauryaSharma05)
3:43 PM • Apr 19, 2025
Top Bug Bounty Blogs for New Hackers to Follow
🔗 Thread by Het Mehta
This tweet compiles essential blogs for new bug bounty hunters, focusing on techniques like XSS exploitation and tool recommendations to enhance their skills.
View the resource →
FROM INTERNET | List of Bug Bounty Blogs
1)$12,900 in Bounties in My First Month of Bug Hunting with Ax Framework
medium.com/@EthicalOffsec…2)How I Made $4,500 in My First Month Bug Hunting
3)Exploiting Blind XSS in a Signup Page: Admin Panel Takeover and
— Het Mehta (@hetmehtaa)
5:22 AM • Apr 22, 2025
Did I miss something? Tell me.
Did you like this week's drop?Please share feedback. |
Because Disclosure Matters: This newsletter was produced with the assistance of AI. While I strive for accuracy and quality, not all content has been independently vetted or fact-checked. Please allow for a reasonable margin of error. The views expressed are my own and do not reflect those of my employer.