Welcome to Disclosed.

(Note: This was written a few days ago at the airport, but I wasn’t able to publish this until now. Figured better late than never!)

Hey there!

I’m writing this from the airport as I head to Stockholm for H1-468 (HackerOne Live Hacking Event). From there, I’ll be flying straight to Singapore for another event before heading back home. It’s going to be a whirlwind two weeks.

And as if that wasn’t enough excitement, I have some big news: After three incredible years leading the pentest community at HackerOne, I’m stepping into a new role running the technical delivery of Live Hacking Events! I’m thrilled for the challenge, the travel, and the chance to connect with some of the brightest minds in the hacking world.

If you’ll be at either of these upcoming events, please come say hello!

Enough about me. Let’s dive in.

In This Issue

BSides Ahmedabad 2025 Wraps Up [🔗 Tweet]
by Romilpatel1988

The tweet summarizes experiences from the BSides Ahmedabad 2025, particularly focusing on the bug bounty competition.
Read the full thread →

Upcoming Live Hacking Event in Stockholm [🔗 Tweet]
by Hacker0x01

The tweet announces a live hacking event in Stockholm, urging followers to stay tuned for further information.
Read the full thread →

Bugcrowd Closes Applications for Hacker Showdown: Mind Cathedral [🔗 Tweet]
by Bugcrowd

Bugcrowd announced the close of applications for their “Hacker Showdown: Mind Cathedral” event, which featured $30K in prizes and exclusive swag. Registration ended on September 19 at 5pm PT.
Read the full thread →

Have something you want to Spotlight? Tell me.

EZVIZ opens full smart-home lineup for testing (up to US$5,000) [🔗 Tweet]
by YesWeHack

YesWeHack announced that EZVIZ has opened its entire smart-device ecosystem security cameras, doorbells, vacuums, and more for testing. All devices are in-scope for the next two months, and valid reports can earn up to US$5,000; hunters can also review EZVIZ’s Trust Center for details on their ongoing security practices.
Read the full thread →

Registration Opens for #GlassFirewall2025 [🔗 Tweet]
by Hacker0x01

Hacker0x01 announces that registration is now live for GlassFirewall 2025. The event promises real conversations on inclusion in cybersecurity, featuring diverse voices and fresh perspectives under the theme “Breaking bytes + barriers.”
Read the full thread →

BSides Ahmedabad Event Photos [🔗 Tweet]
by bsidesahmedabad

BSides Ahmedabad shared that photos from this year’s 0x06 edition are now available online. The collection captures highlights, community moments, and memories from the event. 
Read the full thread →

Did I miss an important update? Tell me.

Introducing Cero: A Tool for Subdomain Enumeration [🔗 Tweet]
by intigriti

This tweet introduces Cero, an open-source tool that employs SSL certificate scraping for subdomain enumeration.
Read the full thread →

Chrome Extension for Automated HTML Keyword Searching [📁 Tool]
by dirtycoder0124

A new Chrome extension automates the crawling and scanning of web pages for specified keywords, providing notifications and logging findings, making it an essential tool for bug hunters.
View the tool →

Introducing Ax Framework: Distributed Scanning for All [📁 Tool]
by AttackSurge

The Ax Framework is an open-source tool designed for efficient distributed scanning across cloud providers, optimizing processes for bug hunters and security experts.
View the tool →

GitHub - MayankPandey01/Jira-Lens: Fast and customizable vulnerability scanner For JIRA written in Python [📁 Tool]
by Mayank Pandey

This repository presents Jira-Lens, a customizable vulnerability scanner for JIRA, built in Python. It offers over 25 checks for known vulnerabilities and detailed scan outputs, with installation guides for accessible use among both bug bounty hunters and security professionals.
View the tool →

GitHub - Suryesh/Algopwn: Interactive Tool for Auditing Algolia API Keys [📁 Tool]
by Suryesh

Algopwn is an interactive Python tool that assists researchers and bug bounty hunters in auditing Algolia API keys, detecting ACLs, and identifying permissions, with responsible usage strongly emphasized.
View the tool →

jxscout Pro Update: Real-Time Findings for Better UX [🔗 Tweet]
by fneves97

The latest update to jxscout Pro brings significant improvements in user experience, especially with real-time updates on findings, enhancing the overall usability for security experts.
Read the full thread →

Introducing Ebka AI: A New Plugin for Caido Store [🔗 Tweet]
by CaidoIO

This tweet presents 'Ebka AI', a new tool aimed at analyzing requests to assist bug bounty tasks, including replay session management and scope organization.
Read the full thread →

Have a favorite tool? Tell me.

Exploring WAF Failures from Query Parameters to Cookie Poisoning [📓 Blog]
by Sarthak Saxena

This research reveals how Web Application Firewalls (WAFs) can be bypassed through cookie poisoning via query parameters, introducing persistent DoS risks on affected sites. The author shares insights from their bug bounty journey, highlighting vulnerabilities across various platforms.
Read more →

Exploit XSS to RCE in Opera for $8,000 Bounty [🔗 Tweet]
by mqst_

This tweet highlights an opportunity to earn $8,000 by exploiting an XSS vulnerability leading to RCE in the Opera browser, providing crucial insights for participants.
Read the full thread →

Discovering the Origin IP to Bypass WAF and Exploit SQL Injection [📓 Blog]
by Malek Mesdour

This post discusses a bug bounty engagement with a SQL injection vulnerability concealed by Cloudflare's WAF. It details a strategy to bypass the WAF through origin IP discovery and DNS techniques, with methodology for recognizing the vulnerability using payloads. Emphasis is placed on collaboration and alternative strategies when facing obstacles.
Read more →

WAF Bypass + XSS + Business Logic Flaw = Account Takeover [📓 Blog]
by Ali Hussain

This post details a critical vulnerability chain in a SaaS e-commerce application, leading to account takeover. It combines a business logic flaw, XSS via HTML comments, and a WAF bypass technique, underscoring effective exploitation methods and immediate fixes to mitigate risks.
Read more →

Simple POC That Earned a $10,000 Bug Bounty [📓 Blog]
by Ibtissam hammadi

This article narrates the author's experience in discovering an arbitrary file read vulnerability through a POC during an assessment of GitLab's project import feature, highlighting ethical hacking's role in identifying significant flaws with substantial bug bounties.
Read more →

Did I miss an important update? Tell me.

Crit Research Lab Update & Client-Side Tricks Galore (Ep. 140) [🎥 Video]
by Critical Thinking - Bug Bounty Podcast

In Episode 140, hosts Justin and Joseph provide an update from The Crit Research Lab while discussing various client-side tricks beneficial for bug bounty hunters.
Watch video →

Mastering Waymore for Bug Bounty & Recon [🎥 Video]
by XNL -н4cĸ3r

Covering Waymore: pulling archived endpoints from Wayback Machine, Common Crawl, AlienVault OTX, URLScan, VirusTotal and Intelligence X, plus downloading full archived responses. The speaker also demonstrates post-processing techniques used to uncover extra endpoints, potential secrets, and parameters
Watch video →

Fastest Way to Discover Vulnerabilities on Any Bug Bounty Program [🎥 Video]
by Lostsec

This video highlights practical recon steps, ethical hacking techniques, and real-world approaches to speed up your hunting process.
Watch video →

4 Recon Sources That Always Get Me Results [🎥 Video]
by NahamSec

Ben outlines four high-value recon sources and demonstrates how to use them to go wide (mass subdomain discovery) or go narrow (deep JS + docs digging). Covers Project Discovery Chaos, C99 (API + subdomain/Cloudflare resolver), Waymore for archived endpoints, and practical tips for stitching results together and post-processing to find parameters and secrets.
Watch video →

Mastering DOM XSS for Bug Bounties: DOM Invader & Real Reports [🎥 Video]
by Medusa

This video breaks down how the DOM works and shows practical DOM XSS exploitation using Burp’s DOM Invader extension, with live demos and real bug bounty reports. The video explains payload flow in the browser, why DOM XSS becomes critical, and how to turn findings into solid reports ideal for anyone wanting to sharpen web-hacking skills for bug bounties.
Watch Video →

Did I miss something? Tell me.

Latest Bug Bytes: Essential Bug Bounty Techniques and Tips [🔗 Tweet]
by Intigriti

The latest Bug Bytes issue covers crucial bug bounty techniques, including an SSRF attack vector in Next.js Middleware and payload exploitation in malicious PDFs, alongside platform updates.
Read the full thread →

A Guide To Subdomain Takeovers 2.0 | HackerOne [📓 Blog]
by Hackerone

This blog post updates readers on subdomain takeovers, providing guidance on identifying vulnerable services, automating detection with tools like Nuclei, and ethical disclosure practices. Significant insights into exploiting vulnerabilities in cookies, CORS, OAuth, and CSPs are included.
Read more →

Understanding Supply Chain Attacks on MCP Servers [🔗 Tweet]
by 0x0SojalSec

This tweet discusses vulnerabilities like prompt injection and credential exposure on MCP servers, highlighting their potential as targets for supply chain attacks.
Read the full thread →

Caido 101: Practical Guide to Features & Plugins [📓 Blog]
by Aituglo

This guide introduces Caido as a modern, lightweight alternative to Burp with both desktop and CLI clients. It walks through key features like Replay, Automate, Match & Replace, and HTTPQL filters, plus recommended plugins such as EvenBetter and Ebka AI. Perfect for bug hunters looking to level up their workflow.
Read more →

A Playbook For Integration Servers [📓 Blog]
by roll4combat

A researcher shares their experience delivering a first DEF CON talk at Recon Village. From nerves to preparation to the payoff of presenting, this piece gives encouragement to anyone considering public speaking in the security space.
Read more →

Hacking Plugin Ecosystems: Risks & Exploitation [📓 Blog]
by blackbird-eu

This article explores how plugin marketplaces expand attack surfaces. It covers seven common vulnerabilities, including sandboxing flaws, supply-chain risks, and overly-permissive APIs, with practical tips for adapting tests to platforms like GitHub Marketplace and Atlassian.
Read more →

Bug Bounty Blueprint: Rabhi’s Approach [📓 Blog]
by YesWeHack

Rabhi, a top hunter, shares his structured bug-hunting workflow. From recon strategies to time management and triage mindset, this blueprint mixes high-level thinking with practical tips for scaling results.
Read more →

Did I miss something? Tell me.

Tech-Aware Fuzzing [🔗 Thread]
by e11i0t_4lders0n

This tweet advocates for employing tech-aware fuzzing instead of blind fuzzing to uncover critical vulnerabilities such as P1s effectively.
Read the full thread →

NoSQL Vulnerability Causing Org-Wide UI Crash [🔗 Tweet]
by Masonhck3571

The tweet describes a NoSQL vulnerability resulting in a denial of service from sending unintended objects instead of strings, causing a crash for all users in the organization
Read the full thread →

Exploiting IDOR to Access Driver PII in Transportation Company [🔗 Thread]
by _ismailu

This tweet outlines a method for exploiting an IDOR vulnerability to access sensitive driver information within a transportation company, stressing the need for robust access control.
Read the full thread →

SQL Injection Found in API Authentication Header [🔗 Tweet]
by mase289

This tweet highlights a SQL injection vulnerability discovered in an API authentication header, emphasizing the critical need for header auditing during security assessments.
Read the full thread →

Critical Account Takeover via Password Reset Injection [🔗 Tweet]
by GodSpeed000123

The tweet discusses a severe vulnerability identified through password reset flow poisoning, leading to potential account takeover and recommends using the FakeIP extension for link poisoning checks.
Read the full thread →

Using Google Dorks to Discover Associated Domains [🔗 Tweet]
by Bugcrowd

This tweet shares a Google dork query to uncover new associated domains linked to specific companies, enhancing reconnaissance techniques.
Read the full thread →

Exploring API Versioning for Hidden Vulnerabilities [🔗 Tweet]
by Behi_Sec

A bug bounty tip emphasizing the necessity of testing older API versions, which may lack adequate authentication or validation, risking potential exposure of vulnerabilities.
Read the full thread →

Exploiting PuppetDB: Check /pdb/query/v4/resources [🔗 Tweet]
by GokTest

The tweet advises checking the PuppetDB endpoint /pdb/query/v4/resources for exploitable credentials, offering practical guidance for bug bounty hunters.
Read the full thread →

Did I miss something? Tell me.

Did you like this week's drop?

Please share feedback.

Login or Subscribe to participate

Because Disclosure Matters: This newsletter was produced with the assistance of AI. While I strive for accuracy and quality, not all content has been independently vetted or fact-checked. Please allow for a reasonable margin of error. The views expressed are my own and do not reflect those of my employer.

Keep Reading

No posts found