DEV Community

loading...
EdOverflow ๐Ÿธ profile picture

EdOverflow ๐Ÿธ

Web developer and security researcher.

โ€œCI Knew There Would Be Bugs Hereโ€ โ€” Exploring Continuous Integration Services as a Bug Bounty Hunter

โ€œCI Knew There Would Be Bugs Hereโ€ โ€” Exploring Continuous Integration Services as a Bug Bounty Hunter

Reactions 7
9 min read
The poor manโ€™s bug bounty monitoring setup

The poor manโ€™s bug bounty monitoring setup

Reactions 8
3 min read
Automating your reconnaissance workflow with meg

Automating your reconnaissance workflow with meg

Reactions 22
3 min read
An analysis of logic flaws in web-of-trust services

An analysis of logic flaws in web-of-trust services

Reactions 16
5 min read
Operation FGTNY ๐Ÿ—ฝ - Solving the H1-212 CTF.

Operation FGTNY ๐Ÿ—ฝ - Solving the H1-212 CTF.

Reactions 11
11 min read
Bypassing Server-Side Request Forgery filters by abusing a bug in Rubyโ€™s native resolver.

Bypassing Server-Side Request Forgery filters by abusing a bug in Rubyโ€™s native resolver.

Reactions 13
7 min read
A lightweight reconnaissance setup for bug bounty hunters

A lightweight reconnaissance setup for bug bounty hunters

Reactions 14
2 min read
A lightweight reconnaissance setup for bug bounty hunters

A lightweight reconnaissance setup for bug bounty hunters

Reactions 13
2 min read
Broken Link Hijacking - How expired links can be exploited.

Broken Link Hijacking - How expired links can be exploited.

Reactions 12
3 min read
Broken Link Hijacking - How expired links can be exploited.

Broken Link Hijacking - How expired links can be exploited.

Reactions 10
3 min read
GitHub for Bug Bounty Hunters

GitHub for Bug Bounty Hunters

Reactions 14
4 min read
GitHub for Bug Bounty Hunters

GitHub for Bug Bounty Hunters

Reactions 13
4 min read
loading...