🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Bug Hunting

Focus Area: 🎯 Penetration Testing
18
Total Entries
17
Contributors

Top Contributors

Amol Naik(2) Anshuman Bhartiya(2) Abhishek Arya(1) Aditya K Sood(1) Amit Deokar(1)

All Entries (18 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-11-16TalkC0c0n Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape Dharani Sanjaiy#bug-hunting#exploit-delivery#security-strategy+1
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Video Nikhil Shrivastava, Charles Waterhouse#bug-hunting#bug-bounty#security-training+3
2023-12-06Tool demoBlackhat HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services Source Code Rohit Kumar#bug-hunting#data-loss-prevention#data-protection+4
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokar, Ali Ahmed, Brian Lee#bug-hunting#incident-management#security-strategy+4
2021-03-06TalkNullcon Bug hunter adventures Video Shreyas Dighe, Yuvraj Dighe#bug-hunting#application-pentesting#bug-bounty+3
2020-09-18TalkC0c0n Automation in Bug Bounties to Work Smarter Prerak Mittal#bug-hunting#bug-bounty#security-tools+4
2020-09-18TalkC0c0n My top 3 findings in bug Bounty journey | Aiming for high impact issues Ankit Giri#bug-hunting#bug-bounty#security-testing+3
2020-09-08TalkConfidence Software Zero-Day Discovery: A Journey from Main to Return Video Kushal Shah#zero-day#fuzzing#vulnerability-discovery+2
2018-09-27TalkRootcon Bug Bounty Hunting on Steroids Presentation Video Anshuman Bhartiya#bug-hunting#bug-bounty#security-tools+3
2018-08-11Tool demoDefcon Sh00t—An open platform for manual security testers & bug hunters Source Code Pavan Mohan#security-assessment#bug-hunting#secure-coding+1
2017-10-19TalkHacklu Bug hunting using symbolic virtual machines! Video Anto Joseph#bug-hunting#binary-analysis#fuzzing+2
2017-07-27Tool demoBlackhat Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes Source Code Anshuman Bhartiya#security-assessment#bug-hunting#cloud-workload-protection+3
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Sood#scada#hmi#security-assessment+4
2015-02-06TalkNullcon Analyzing Chrome crash reports at scale Presentation Video Abhishek Arya#fuzzing#bug-hunting#blueteam
2014-08-22TalkC0c0n Idle Machines doing Bounty Hunting (Behind your Back) Mrityunjay Gautam#bug-hunting#red-teaming#automated-scanning+3
2013-09-13TalkRootcon My Experiments with truth: a different route to bug hunting Presentation Devesh Bhatt#bug-hunting#bug-bounty#security-testing+3
2013-03-01TalkNullcon Bug Bounty Hunter’s confession Presentation Amol Naik#bug-hunting#security-training#ethical-hacking+3
2012-08-03TalkC0c0n Easy Money with UI-Redressing Amol Naik#bug-hunting#application-pentesting#dynamic-analysis+4