๐Ÿงช Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Bug Bounty

Focus Area: ๐Ÿ” Vulnerability Management
22
Total Entries
24
Contributors

Top Contributors

Devesh Bhatt(2) Sandeep Singh(2) Aanchal Gupta(1) Abhijeth Dugginapeddi(1) Amit Deokar(1)

All Entries (22 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-01TalkNullcon The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties Video Anto Joseph#bug-bounty#secure-development#security-testing+2
2024-12-11Tool demoBlackhat Agneyastra - Firebase Misconfiguration Detection Toolkit Source Code Bhavarth Karmarkar, Devang Solanki#cloud-pentesting#misconfiguration#bug-bounty
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Video Nikhil Shrivastava, Charles Waterhouse#bug-hunting#bug-bounty#security-training+3
2024-05-09TalkRsac The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft Video Aanchal Gupta, Katie Moussouris#bug-bounty#risk-management#security-governance
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokar, Ali Ahmed, Brian Lee#bug-hunting#incident-management#security-strategy+4
2022-09-08TalkNullcon Hack the Source: Securing Open Source Software โ€“ One bug at a time Video Sandeep Singh, Laurie Mercer#open-source-security#supply-chain#code-review+4
2022-09-07TalkNullcon Scale hacking to secure your cloud and beyond Video Anand Prakash#cloud-pentesting#cloud-security-posture-management#container-security+4
2022-09-06PanelNullcon Consumer Tech Bug Bounty Panel: Hear from the Program Managers Video Sandeep Singh, Rishika Hooda, Omar Benbouazza#bug-bounty#security-testing#application-hardening+3
2021-03-06TalkNullcon Bug hunter adventures Video Shreyas Dighe, Yuvraj Dighe#bug-hunting#application-pentesting#bug-bounty+3
2020-09-18TalkC0c0n Automation in Bug Bounties to Work Smarter Prerak Mittal#bug-hunting#bug-bounty#security-tools+4
2020-09-18TalkC0c0n My top 3 findings in bug Bounty journey | Aiming for high impact issues Ankit Giri#bug-hunting#bug-bounty#security-testing+3
2019-09-23TalkRootcon Identity crisis: war stories from authentication failures Presentation Video Vishal Chauhan#authentication#identity-management#vulnerability-assessment+3
2018-09-27TalkRootcon Bug Bounty Hunting on Steroids Presentation Video Anshuman Bhartiya#bug-hunting#bug-bounty#security-tools+3
2018-03-02PanelNullcon Should all ciso promote hall of fameโ€ within their organizations Video Burgess Cooper, Durga Dube, Thom Langford, Harish Pillay#security-training#cybersecurity-strategy#bug-bounty+1
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddi#vulnerability-assessment#bug-bounty#network-pentesting+1
2015-08-07TalkDefcon Hacker’s Practice Ground Video Lokesh Pidawekar#security-assessment#ethical-hacking#vulnerability-assessment+2
2013-11-07TalkGroundzerosummit How I built a pentest lab in under 70 USD Swaroop Yermalkar#security-assessment#ethical-hacking#bug-bounty+1
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil Prabhakar#red-teaming#bug-bounty#ethical-hacking+3
2013-09-13TalkRootcon My Experiments with truth: a different route to bug hunting Presentation Devesh Bhatt#bug-hunting#bug-bounty#security-testing+3
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawe, David Wagner, Matthew Finifter#bug-bounty#software-security#risk-management+2
2013-05-28TalkConfidence My Experiments with truth: a different route to bug hunting Video Devesh Bhatt#security-assessment#vulnerability-assessment#secure-development+2
2012-08-03TalkC0c0n Easy Money with UI-Redressing Amol Naik#bug-hunting#application-pentesting#dynamic-analysis+4