bugcrowd Profile picture
The leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world...Unleash Ingenuity™
May 1, 2024 20 tweets 2 min read
19 questions @JR0ch17 asks himself when looking through requests in order to identify and document potential vulnerabilities:

1. What methods of authentication are supported? @JR0ch17 2. Is caching used?
Feb 25, 2024 10 tweets 2 min read
Dupes.

No one likes them.

Here are 8 ways to avoid them👇 1️⃣ Weird Places

Don't just test common features. Explore lesser-known areas like Twitter's ad campaigns or developer tools. This approach leads to unique bug discoveries.

🧵 1/8