cookie

We use cookies to improve your browsing experience. By clicking Β«Accept allΒ», you agree to the use of cookies.

Advertising posts
39 063
Subscribers
+3724 hours
+2987 days
+1 45030 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

Show all...
Exploiting Android Client WebViews with Help from HSTS

TL;DR I discovered a one-click account takeover vulnerability in a popular Indonesian Android app called Tokopedia . Th...

πŸ‘ 3
L’OrΓ©al x YesWeHack: Why the cosmetics giant held a Live Bug Bounty https://www.youtube.com/watch?v=zTsXIzorAxs
Show all...
L’OrΓ©al x YesWeHack: Why the cosmetics giant held a Live Bug Bounty

Guillaume Kermarrec, who oversees L’OrΓ©al’s Bug Bounty Program and threat/vulnerability management generally for the iconic cosmetics brand, discussed L’OrΓ©al’s hopes for a live Bug Bounty it held in partnership with YesWeHack. Kermarrec, who works at L’OrΓ©al’s CyberDefense Center, reflected on the company’s preparations for the event, which took place in the summer of 2024 during LeHACK, France’s largest hacker convention. He also explained why they decided to open their scopes to some of Europe’s most talented ethical hackers in the context of an intensive, in-person competition. You can also watch highlights from this live hacking event πŸ‘‰

https://www.youtube.com/watch?v=wVSZ5lCDyr4

And read more about the event in our roundup of the scopes, final leaderboard, feedback from hunters, and the benefits of live Bug Bounties πŸ‘‰

https://www.yeswehack.com/news/loreal-live-hacking-event-lehack

πŸ‘ 2
Hacking GitLab Instances For A $5,000 Bounty (2 Examples) https://www.youtube.com/watch?v=KfoOl8RhlhQ
Show all...
Hacking GitLab Instances For A $5,000 Bounty (2 Examples)

πŸ‘€πŸ‘€ Signup for DevSecCon πŸ‘‰πŸΌ snyk.co/dscnahamsec LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! πŸ‘ πŸ“š If you want to learn bug bounty hunting from me:

https://bugbounty.nahamsec.training

πŸ’» If you want to practice some of my free labs and challenges:

https://app.hackinghub.io

πŸ’΅ FREE $200 DigitalOcean Credit:

https://m.do.co/c/3236319b9d0b

πŸ”— LINKS: πŸ“– MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -

https://amzn.to/3Re8Pa2

Hacking APIs: Breaking Web Application Programming Interfaces -

https://amzn.to/45g4bOr

Black Hat GraphQL: Attacking Next Generation APIs -

https://amzn.to/455F9l3

🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this -

https://youtu.be/z6O6McIDYhU

2023 How to Bug Bounty -

https://youtu.be/FDeuOhE5MhU

Bug Bounty Hunting Full Time -

https://youtu.be/watch?v=ukb79vAgRiY

Hacking An Online Casino -

https://youtu.be/watch?v=2eIDxVrk4a8

WebApp Pentesting/Hacking Roadmap -

https://youtu.be/watch?v=doFo0I_KU0o

MY OTHER SOCIALS: 🌍 My website -

https://www.nahamsec.com/

πŸ‘¨β€πŸ’» My free labs -

https://app.hackinghub.io/

🐦 Twitter -

https://twitter.com/NahamSec

πŸ“Έ Instagram -

https://instagram.com/NahamSec

πŸ‘¨β€πŸ’» Linkedin -

https://www.linkedin.com/in/nahamsec/

WHO AM I? If we haven't met before, hey πŸ‘‹! I'm Ben, most people online know me online as NahamSec. I'm a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker. FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.

πŸ‘ 2πŸ‘Ž 1
Vulnerabilities in Open Source C2 Frameworks - Include Security Research Blog https://blog.includesecurity.com/2024/09/vulnerabilities-in-open-source-c2-frameworks/amp/
Show all...
Vulnerabilities in Open Source C2 Frameworks - Include Security Research Blog

Hacking Hackers - Even the software used by teams of offensive security professionals is prone to standard web application vulnerabilities.

Advanced Frida Usage Part 10 – Instruction Tracing using Frida Stalker https://8ksec.io/advanced-frida-usage-part-10-instruction-tracing-using-frida-stalker/
Show all...
Advanced Frida Usage Part 10 – Instruction Tracing using Frida Stalker - 8kSec

Welcome to another blog in the series of Advance Frida Usage. This blog post demonstrates how to use Frida’s Stalker APIs to trace instructions as they execute in a app in real time.

πŸ‘ 2❀ 2
Show all...
DORA: What You Need to Know

Learn about DORA, the new EU regulation for digital operational resilience, and how to meet the requirements with pentesting.

πŸ‘Ž 3
255 - Iterating Exploits & Extracting SGX Keys https://dayzerosec.com/podcast/255.html
Show all...
Iterating Exploits & Extracting SGX Keys

We are back and testing out a new episode format focusing more on discussion than summaries. We start talking a bit about the value of learning hacking by iterating on the same exploit and challenging yourself as a means of practicing the creative parts of exploitation. Then we dive into the recent Intel SGX fuse key leak, talk a bit about what it means, how it happened. We are seeking feedback on this format. Particularly interested in those of you with more of a bug bounty or higher-level focus if an episode like this would still be appealing? If you want to share any feedback feel free to DM us (@__zi or @specterdev) or email us at media [at] dayzerosec.com

A bypass on GitLab’s Login Email Verification via OAuth ROPC flow. https://medium.com/@cybxis/a-bypass-on-gitlabs-login-email-verification-via-oauth-ropc-flow-e194242cad96
Show all...
A bypass on GitLab’s Login Email Verification via OAuth ROPC flow.

The Resource Owner Password Credentials(ROPC) is one of the Open Authentication(OAuth) flow with a β€œpassword” grant type. This grant type…

[2,500$ Bug Bounty Write-Up] Remote Code Execution (RCE) via unclaimed Node package https://medium.com/@p0lyxena/2-500-bug-bounty-write-up-remote-code-execution-rce-via-unclaimed-node-package-6b9108d10643
Show all...
[2,500$ Bug Bounty Write-Up] Remote Code Execution (RCE) via unclaimed Node package

What is Dependency Confusion?

Choose a Different Plan

Your current plan allows analytics for only 5 channels. To get more, please choose a different plan.