#bugBountyHunters

Negative PID Inc.negativepid
2025-10-21

Finding vulnerabilities in someone's system can be a full-time job and very well rewarded. You just need to know how to start and avoid some common faux pas.
Here's all you need to know about becoming a professional bug bounty hunter.

negativepid.blog/how-to-become
negativepid.blog/how-to-become

Negative PID Inc.negativepid
2025-08-19

Are you interested in deepening your cybersecurity experience and earning money while doing so? If you're up for challenges, bug bounty hunting might be the path to your success.

Here is how to get started and start cashing in. 👇

negativepid.blog/how-to-become

Negative PID Inc.negativepid
2025-07-09

🚀 Ready to dive into cybersecurity and earn rewards while learning? Discover the secrets to becoming a successful bug bounty hunter!✨In our blog, we break down the steps to help you start catching bugs and cashing in. Don't miss out—your adventure in ethical hacking awaits! 🔍💡

negativepid.blog/how-to-become

Negative PID Inc.negativepid
2025-05-12

🚀 Ready to dive into cybersecurity and earn rewards while learning? Discover the secrets to becoming a successful bug bounty hunter!✨In our blog, we break down the steps to help you start catching bugs and cashing in. Don't miss out—your adventure in ethical hacking awaits! 🔍💡

negativepid.blog/how-to-become

2023-08-12

After Lunch we have @Jhaddix session planned "Easy EASM - the zero dollar attack surface management tool". Would be interesting talk for #bugbountyhunters #pentesters and even #productsecurityengineers

undefined
2023-03-13

If you were to screenshot a bunch of URLs, how would you want the images organized?
#bugbountyhunters

2023-03-03

Sneak peek at the new ronin-web session-cookie command coming in ronin-web-1.1.0:

$ ./bin/ronin-web session-cookie "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c"
{
"sub": "1234567890",
"name": "John Doe",
"iat": 1516239022
}
$ ./bin/ronin-web session-cookie --verbose "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c"
Type: JWT
Header:

{
"alg": "HS256",
"typ": "JWT"
}

Params:

{
"sub": "1234567890",
"name": "John Doe",
"iat": 1516239022
}

HMAC: "I\xf9J\xc7\x04IH\xc7\x8a(\\\x90O\x87\xf0\xa4\xc7\x89\x7f~\x8f:N\xb2%V\x9dB\xcb0\xe5"

#websecurity #sessioncookies #bugbountyhunters

2023-03-03

If you had a command that printed the contents of a serialized session cookie, how would you want to see the deserialized data displayed?
#bugbountyhunters #websec

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst