ToxSec - Bug Bounty Hunting
Subscribe
Sign in
Home
Notes
About
Latest
Top
Subdomain Takeover
A ToxSec Guide
just now
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
Subdomain Takeover
Copy link
Facebook
Email
Notes
More
IDOR Hunting
Insecure Direct Object Refence
6 hrs ago
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
IDOR Hunting
Copy link
Facebook
Email
Notes
More
Gandalf | AI CTF
A Prompt Injection Challenge
Aug 17
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
Gandalf | AI CTF
Copy link
Facebook
Email
Notes
More
May 2025
File Upload Vulnerabilities
File Upload for Bug Bounty
May 30
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
File Upload Vulnerabilities
Copy link
Facebook
Email
Notes
More
Systemctl SUID & Burp Sniper | VulnUniversity THM
The power of basics.
May 27
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
Systemctl SUID & Burp Sniper | VulnUniversity THM
Copy link
Facebook
Email
Notes
More
Hacking Common Services
A cheat sheet and reference guide for ethically hacking common services across diverse systems.
May 25
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
Hacking Common Services
Copy link
Facebook
Email
Notes
More
SweetRice CMS Exploitation | LazyAdmin TryHackMe
A TryHackMe machine featuring CMS enumeration, database extraction, remote shell upload, and privilege escalation.
May 19
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
SweetRice CMS Exploitation | LazyAdmin TryHackMe
Copy link
Facebook
Email
Notes
More
OSCP Proving Grounds – Levram Walkthrough
Web Exploitation & Linux Privilege Escalation Practice
May 18
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
OSCP Proving Grounds – Levram Walkthrough
Copy link
Facebook
Email
Notes
More
April 2025
Working with Linux Capabilities | Cap HackTheBox
A HackTheBox challenge focused on pcap analysis, service enumeration, and Linux capability exploitation.
Apr 19
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
Working with Linux Capabilities | Cap HackTheBox
Copy link
Facebook
Email
Notes
More
Game Zone - SQLi and Reverse SSH Tunneling
A TryHackMe box combining SQL injection, password cracking, reverse SSH tunneling, and Metasploit exploitation.
Apr 19
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
Game Zone - SQLi and Reverse SSH Tunneling
Copy link
Facebook
Email
Notes
More
March 2025
SSH Key Exploitation and SMB Recon: A CTF Walkthrough
A real-world-style Linux box. This one challenged me to use sharp enumeration, smart pivots, and creative thinking to gain and escalate access across…
Mar 18
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
SSH Key Exploitation and SMB Recon: A CTF Walkthrough
Copy link
Facebook
Email
Notes
More
February 2025
Windows Security: Abusing Access Tokens | A Practical CTF Walkthrough
Exploit misconfigured access tokens to impersonate SYSTEM and own the box.
Feb 18
•
Toxsec
Share this post
ToxSec - Bug Bounty Hunting
Windows Security: Abusing Access Tokens | A Practical CTF Walkthrough
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts