Bug Bounty & Agile Pentesting Platform

Attack surface management best practices: Intigriti’s top tips

While the cultural stereotype of a hacker sitting in front of a monochrome CRT tapping obscure terminal commands makes for interesting fiction, the damage real hackers do is far less entertaining. In this article, Intigriti discusses attack surface management best practices that help organizations stay one step ahead of malicious hackers. We’ll explain how using […]

Continue reading Continue reading

Bug Bytes #154 – URL parsing confusion, Forging cookies for almost $100k & Exploiting impossible Pickle deserialization

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources. This issue covers the week from January 03 to 10, 2022. Intigriti […]

Continue reading Continue reading

EyeWitness – Hacker Tools: Hacking through screenshots 👩‍💻

EyeWitness is an incredibly tool that allows you to quickly get a feel for what assets to target first. We all know hundreds of content discovery tools that give us vast amounts of data, but do we ever focus on efficiently parsing all that data? How do you go through hundreds of endpoints? If you’re doing it manually, then be sure to read this article as EyeWitness may be of great help to you!

Continue reading Continue reading

Visma’s “Mother of Hackers” speaks to Intigriti about running a successful virtual live hacking event 

Intigriti live hacking events involve bringing together a select team of security researchers, also known as ethical hackers, for a group bug bounty engagement. The invited researchers participate from across the globe, focusing on a particular target and set of assets. Hackers are chosen to take part in the event based on the skills and […]

Continue reading Continue reading
  • 1
  • 2
  • 3
  • ...
  • 29
  • Next →