Intigriti
banner
intigriti.com
Intigriti
@intigriti.com
Bug bounty & VDP platform trusted by the world’s largest organisations! 🌍

linktr.ee/hackwithintigriti
Day 16 of #BugQuest2025 (we're almost there!) 🤠

Yesterday, we showcased a simple way to test for DOM-based XSS. Today, we're sharing a collection of blind XSS payloads that you can use to catch those hidden XSS vulnerabilities! 😎
December 16, 2025 at 6:37 PM
Yesterday, we covered hunting for DOM-based XSS vulnerabilities. In today's #BugQuest2025 tip, we'll be covering CSP bypasses! 🤠

Many apps implement strict CSPs to block XSS, but if they whitelist trusted domains like Google, YT, or GH, you can often bypass these restrictions using JSONP endpoints!
December 15, 2025 at 6:37 PM
We're finally getting into the more practical exploitation phases of #BugQuest2025!

Today, we're tackling one of the trickiest vulnerability types: DOM-based XSS! 🤠

DOM-based XSS vulnerabilities are seemingly harder to spot due to their limited visibility.
December 14, 2025 at 6:37 PM
In yesterday's #BugQuest2025, we covered a simple method for finding exposed cloud buckets...

Today, we're focusing specifically on Cloudflare R2 buckets and a feature that's often misconfigured: R2 dev! 🤠
December 13, 2025 at 6:37 PM
Day 12 of #BugQuest2025! 🤠

Yesterday, we covered a simple method to enumerate backend technologies with high accuracy. Today, we're hunting for exposed cloud storage buckets using Google!
December 12, 2025 at 6:37 PM
We know that recon can be a tedious process, but the efforts are always rewarded with interesting findings! 🤠

Today marks day 11 of #BugQuest2025, and we're sharing a simple tip to enumerate backend services.
December 11, 2025 at 6:37 PM
Yesterday, on day 9 of #BugQuest2025, we shared a simple tip to elevate your privileges in services like Jira & Jenkins!

Today, we're learning how to bypass WAF protections by finding origin IPs! 🤠
December 10, 2025 at 6:37 PM
Hang in there! We're almost wrapping up our recon series for #BugQuest2025! 🤠

Yesterday, we shared how to find secrets in browser extensions. Today, we're continuing our recon journey and checking for something surprisingly common: open registration pages! 👀
December 9, 2025 at 6:37 PM
Logic flaws can result in various impactful outcomes 🤠

But you have to learn to identify them at first... 🥲

In our latest article, we explored how to identify & exploit logic flaws, including how to measure impact and distinguish them from the non-impactful, functional bugs.

Read the article! 👇
December 9, 2025 at 3:08 PM
Today marks day 8 of #BugQuest2025! And we're still trying to expand our attack surface to identify vulnerabilities! 🤠

In yesterday's issue, we expanded on content discovery to identify paths, API endpoints, and files that most bug bounty hunters miss.
December 8, 2025 at 6:37 PM
A full week into #BugQuest2025! 🔥

Yesterday, we shared a quick (and simple) tip to uncover hidden directories. Today, we're taking content discovery a step further by fuzzing with multiple HTTP methods! 🤠
December 7, 2025 at 6:37 PM
We're now 6 days into #BugQuest2025, and we're still maintaining our focus on assets that most hunters skip! 🤠

Yesterday, we shared a method to identify hidden assets related to your target. Today, we're tackling a common mistake: ignoring subdomains that redirect! 👀
December 6, 2025 at 6:37 PM
Today marks day 5 of #BugQuest2025, and we're still trying to uncover assets in the most unexpected places! 👀

Yesterday, we shared a simple method to find forgotten hosts. Today, we're using something even more hidden in plain sight: copyright notices! 🤠
December 5, 2025 at 6:37 PM
We're 4 days into #BugQuest2025, and are still attempting to expand our attack surface... 🤠

Yesterday, we explored a unique method to find hidden, related assets.

Today, we're diving into a goldmine that many bug bounty hunters often overlook: hosts with certificate issues! 👀
December 4, 2025 at 6:37 PM
Day 3 of #BugQuest2025 is live now! Yesterday, we shared an interesting method for discovering assets that have never been tested before. 👀

Today's tip further expands on identifying hidden assets with favicon hashes! 🤠

These seamless images that appear in your tab are much more than just icons..
December 3, 2025 at 6:37 PM
Day 2 of #BugQuest2025 is live now! And we knew you would make it, that's why we made today extra special! 🎁

The easiest way to find more bugs is to discover assets that have never been tested before 🤠

Virtual host fuzzing is one of the most underutilized methods for identifying such assets! 👇
December 2, 2025 at 6:37 PM
Are you still searching for your first security bug? 🤠

Join us in #BugQuest2025! Starting December 1st, we'll share bug bounty tips, techniques, and resources that anyone can use, no matter your experience level, background, or skill set, for 31 days. 🎁

#BugBounty #HackWithIntigriti
December 1, 2025 at 6:37 PM
You've identified a possible XSS 🤑

But CSP is in the way... 😓

What if you could just entirely bypass this CSP and execute your payload? 🤠

In our latest article, we documented multiple methods to bypass CSPs to execute malicious JS code!

Read the article today (link in next post)! 👇
November 30, 2025 at 5:08 PM
It's time for the monthly code challenge!

The administrator interface is finally ready, and according to the development team, proper authorization has been deployed, so only administrators have access. 🤠

Can you craft a working payload proving them otherwise? 😎
November 27, 2025 at 5:09 PM
In the world of JWTs, 'none' can sometimes mean everything... 🤠

As Intigriti 1125 wraps up, we're releasing the official write-up for this month's CTF challenge!

We crafted a vulnerable aquarium e-commerce platform where JWT manipulation and template injection chain together for full RCE
November 26, 2025 at 5:09 PM
Latest Bug Bytes is live! 🚀

This month's issue is as usual packed with bug bounty tips:
✅ Finding an RCE using AI in GitHub
✅ CORS exploitation cheat sheet
✅ Scanning codebases with AI
✅ Bypassing paywalls
✅ SSTIs in AI models

+ monthly hacking challenge & much more! 😎
November 21, 2025 at 5:08 PM
DOM-based XSS vulnerabilities are tricky to test for, especially at scale, which often makes them go unnoticed for years... 😬

Yet, these seamless DOM-based bugs can sometimes even lead to account takeovers 👀

In our comprehensive article, we explore how you can identify and exploit this XSS type.
November 11, 2025 at 5:08 PM
Most JWT vulnerabilities go unnoticed as they're notoriously tricky to test for 😬

Yet, when present, they can allow for account takeovers, SQL injections and in-app privilege escalations 🤠

In our latest article, we break down every common JWT attack vector with practical exploitation techniques.
November 7, 2025 at 5:08 PM
Latest Bug Bytes is live! 🚀

This month's issue is as usual packed with bug bounty tips:
✅ Cool trick to find disclosed secrets in internal web extensions
✅ A repository full of WAF bypasses
✅ Hacking Intercom misconfigurations
✅ Wayback Machine for hackers

+ monthly hacking challenge & much more!
October 31, 2025 at 5:09 PM
It's time for the monthly code challenge!

This developer has just completed this new MFA implementation, which provides an added layer of security to protect against credential stuffing attacks! 🤠

Can you craft a working payload to evade this MFA implementation? 😎
October 30, 2025 at 8:09 PM