Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the weeks from October 23rd until October 30th.
Intigriti News
- Our hacker portraits from this quarter, congratulations to @jfoolish_22, @roysolberg and @0xtavi (bonus 0xConda’s hacker portrait arrived!)
- Breaking down our latest challenge
- Our best #bugbountytips
From my notebook
- We round up 1337up0822 with The Paranoids, check this video out to see everything you missed from Antwerp in August! – Shameless Intigriti promotion but this video is great to show off the energy in Antwerp when Inigriti and The Paranoids brought together the best hackers worldwide to hack, hang out and also see the Belgian GP!
- Minecraft:HACKED – This LiveOverflow series has really got me back into Minecraft oops but it’s a great intro to game hacking and more generally what used to be called “creative use of game mechanics.”
- Playing on the LiveOverflow Minecraft Hacking Server – Hacking and followed up with a write up of some of the challenges from the videos!
- Registrations Open for IWCON2022 Version 2.0 — the Online International Cybersecurity Conference
- Root cause analysis of 100+ DeFi Hacks (shared by @payloadartist, original by Sun and XREX security team) – Great resource if you are interested in DeFi hacking
- What functionalities are most often vulnerable to SSRFs? Case study & Exploiting SSRF Using Export PDF
Other Amazing Things

- zip files & hack… (CVE-2022-1271 zgrep/gzip)
- NEW Python 3.11 !!!
- Create Password Wordlists like a Pro!!
- Writing a BETTER Resume
- NullCon Cybersecurity Interview With Madhu Akula, Creator of Kubernetes GOAT
- HTB Stories 0x11 – Cyber Horror Stories w/0xdf & Dinosn
- GRC & Blue Team Careers
- I store ALL my Passwords in AWS
- Install Kali Linux 2022 on Raspberry Pi 4 B (Under 3 Minutes)
- HackTheBox – Trick
- RTX4090 is a Password Cracking BEAST
- How to Audit Smart Contracts

- Episode 346 – Security and working from home have terrible things in common
- EP93 CISO Walks Into the Cloud: Frustrations, Successes, Lessons … And Is My Data Secure?
- NO. 354 | THE NEWS & ANALYSIS SERIES
- Risky Biz News: GitHub aflood with fake and malicious PoCs
- Indicators of Compromise (noun) [Word Notes]Indicators of Compromise (noun) [Word Notes]
- 161 – XMPP Stanza Smuggling in Jabber and a Cobalt Strike RCE
- SN 894: Data Breach Responsibility – Firefox 106, KataOS and Sparrow, banking malware, CVSS 9.8 update
- Why Everyone Needs a Blog | THE IDEA SERIES
- 295: Slushygate, sextortion, and nano-targeting

- Finding P1 vulnerabilities: Tools and Resources @Aacle_
- Here are a couple things I always check when looking at a web application @rhynorater
- Malicious File Upload Checklist @0x0SojalSec

- Android Pentesting 101 — Part 1 & Android Pentesting 101 — Part 2
- SQL Injection: An Overview
- Burp Suite? No Thanks! Blind SQLi in DVWA With Python (Part 2) — StackZero
- Exposed .git Directory Exploitation
- Write-up: HTTP request smuggling, basic CL.TE vulnerability @ PortSwigger Academy
- OAuth and the flaws in its implementation
- HTTP request smuggling Explained and Exploited Part 0x3
- Burp Suite? No Thanks! Blind SQLi in DVWA With Python (Part 2) — StackZero
- Hacked Tathva ’22 Biggest Techno-Management Fest in South India
- Blind SSRF in Skype (Microsoft)
- HTML INJECTION DAN XSS PADA WEBSITE HOSTEKO.COM
- Broken Link Hijacking — My Second Finding on Hackerone!
- Hacking a parking system
- How I Found Three Credentials Leak on One Google Dork on Bugcrowd
- 5000$ for Apple Stored Xss And Another Blind Xss Still under review
- How I Found A Simple Stored XSS
- SSRF & LFI In Uploads Feature
- Stored XSS To Cookie Exfiltration
- A bug worth 1.75Lacs — AWS SSRF to RCE
- How I Found P1 in Bugcrowd with only Recon
- How I bypass the OTP of a well known website.
- How I Found P1 with Google Dork on Bugcrowd Program
- A 250$ CSS Injection — My First Finding on Hackerone!
- How i was able to get free money via sending negative tokens
- Walkthrough of Exploiting CVE-2022–42889 (Text4Shell/ACT4Shell)
- Old RCE worth $3362.

- githack – A .git/ folder disclosure exploit (pudsec’s recommendation)
- Faster your NMAP scan with “Agile Grabber”
- Cyber Security Control Validation Platform
- Dastardly, from Burp Suite – A lightweight web application security scanner for your CI/CD pipeline
- PSFuzz – ProvieSec Fuzz Scanner – Web path discovery
- Offensive Security Tool: LAZYPARIAH

- Basic Linux Commands
- The Best Vulnerability Disclosure Programs (Less Competitive Bounties)
- Some of the Best Search Engines used by Hackers/Security Researchers/Bug Bounty Hunters in 2022
- Simple DOM based XSS Trick
- Useful list of 25 Top Recon tools @ReconOne
- Chain AutoRepeater and Taborator to Automate SSRF Findings @bsysop via bugcrowd
- Your email address can contain much more than you expect! @WonderU360 via Intigriti
- Httpx can do directory fuzzing on all domains with one simple argument! @yeswehack

- HTB: Faculty & HTB: Trick
- TryHackMe writeup: Skynet | by Aleksey | Medium
- Devel From HackTheBox & Chatterbox Hackthebox
- Openzeppelin Ethernaut CTF Writeup
- Phoenix Challenges — Stack Two
- Vulnerable Code Sippet YesWeHack
