
Burp Bounty
@BurpBounty
Followers
78
Following
4
Media
10
Statuses
23
Offensive Web Application Security Software
Joined May 2022
π₯ Black Friday is here! Get Burp Bounty Pro for just β¬79/year β save β¬40! Optimize your web vulnerability scans with advanced customization and faster audits. β³Offer valid until Cyber Monday! https://t.co/bxm2OKiC11
0
1
1
π Something big is coming! Introducing Burp Bounty Go, our new web security scanner built in Golang: β
Multi-step detection β
10k+ req/sec distributed scans β
Minimal resource usage β
Integrated blind host Teaser β‘οΈ https://t.co/miqdil6kcJ Launch: July 21st!
0
0
0
Happy New Year from Bounty Security Team! Wishing everyone a fantastic start to 2025 - this year is packed with exciting new developments. Letβs go for it! ππ
1
0
1
β³ Time is ticking! Black Friday is your chance to get Burp Bounty Pro for just β¬79/year β save β¬40. π―Advanced customization, faster audits, and the power to detect vulnerabilities with less effort. πDonβt wait! https://t.co/bxm2OKiC11
0
0
0
π Take your cybersecurity game to the next level this Black Friday! Burp Bounty Pro β now β¬79/year (save β¬40) β brings: β Advanced customization β Faster audits β Always updated tools Donβt miss out! https://t.co/bxm2OKiC11
0
0
1
π’ Attention pentesters and bug hunters! This Black Friday, Burp Bounty Pro is just β¬79/year (save β¬40). Be faster, smarter, and more efficient in your audits. π Grab this deal before Cyber Monday: https://t.co/bxm2OKiC11
0
0
0
π Update Alert! Burp Bounty Pro v2.8.1 is here! π πΉ Added {CURRENT_COOKIES} token for handling original cookie values πΉ Fixed profile reload issue πΉ Dependency updates Upgrade now and keep your security game strong! πͺ π https://t.co/10AMCTOZYP
#BurpBountyPro #BurpSuite
0
0
1
ππBounty Security has open-sourced GBounty Scanner, Multi-Step Profiles, and GBounty Profiles Designer under the MIT license. https://t.co/eA29exsrUi
#Cybersecurity #OpenSource #GBounty
1
0
1
π Optimizing Time-Based SQL Injection Detection Blog Post! π π‘οΈ Learn about efficient strategies, practical examples, and tips to enhance your web security testing. π https://t.co/LBtw0nP57h
#CyberSecurity #WebSecurity #SQLi
bountysecurity.ai
Time-based SQL injection involves inserting a payload that delays the server response by a specific time, allowing attackers to infer database behavior based on response times. By analyzing these...
0
0
3
Export to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner. https://t.co/7mRtT0KhZJ
github.com
Export to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty sc...
0
1
2
Exciting news! Bounty Security has open-sourced GBounty Scanner, Multi-Step Profiles, and GBounty Profiles Designer under the MIT license. https://t.co/eA29exsZJQ
#Cybersecurity #OpenSource #GBounty
0
2
8
π New Blog Post Alert! π‘οΈ Dive into our latest article on "Optimizing Blind SQL Injection Detection with Content-Length Differences". Learn about efficient strategies, practical examples, and tips to enhance your web security testing. π https://t.co/P6VmkfLfAI
#SQLi
bountysecurity.ai
Understanding the Vulnerability In a Blind SQL Injection attack that exploits content-length differences, the server's response size changes based on the injected payload. By carefully crafting the...
0
1
0
β‘We are thrilled to have @BountySecurity onboard as a Bronze Sponsor for HackerOne BUG HUNT 2024 - Bangladesh's Premier Cyber Security Competition & Conference! π https://t.co/O2yMJP1YOr
#bughunt2024 #TheHuntIsOn #turnupthehype
0
0
0
π New Blog Post Alert! π‘οΈ Dive into our latest article on "Optimizing Blind SQL Injection Detection with HTTP Status Code differences". Learn about efficient strategies, practical examples, and tips to enhance your web security testing. π https://t.co/YQeKofTCzp
#SQLi
bountysecurity.ai
Understanding the Vulnerability In this type of Blind SQL Injection attack, when a single quote (') or double quote (
0
2
4
π New Blog Post Alert! π‘οΈ Dive into our latest article on "Optimizing Time-Based SQL Injection Detection". Learn about efficient strategies, practical examples, and tips to enhance your web security testing. π https://t.co/LBtw0nPCWP
#CyberSecurity #WebSecurity #SQLi
bountysecurity.ai
Time-based SQL injection involves inserting a payload that delays the server response by a specific time, allowing attackers to infer database behavior based on response times. By analyzing these...
0
0
0
π New Blog Post Alert! π‘οΈ Dive into our latest article on "Optimizing XSS Vulnerability Detection". Learn about efficient strategies, practical examples, and tips to enhance your web security testing. π https://t.co/s5TcxTRXhP
#CyberSecurity #WebSecurity #XSS
bountysecurity.ai
Introduction to XSS Cross-Site Scripting (XSS) is a security vulnerability in web applications that allows attackers to inject malicious scripts into pages viewed by other users. This can result in...
0
2
3
β‘We are thrilled to have @BountySecurity onboard as a Bronze Sponsor for HackerOne BUG HUNT 2024 - Bangladesh's Premier Cyber Security Competition & Conference! π https://t.co/O2yMJP1YOr
#bughunt2024 #TheHuntIsOn #turnupthehype
0
0
1
π Discover how aΒ Pentest uncovered an "Unvalidated and Open Redirect" vulnerability, leading to a complete account takeover. π₯ Learn the steps taken to identify and exploit this common OAuth misconfiguration using tricks and a bit of JavaScript. https://t.co/Z0o0zIpunD
bountysecurity.ai
Discover how aΒ Pentest uncovered an
0
1
2