skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.

Adventures in Reverse Engineering

One thing we like to highlight at Bugcrowd is creating lasting positive relationships between clients and talented researchers. Today one of our crowd, Duarte Silva, released some of his work on reverse engineering Aruba Networks ArubaOS Firmware package. Some time…

Read More

April 2015 Hall of Fame

Like Employee of the Month but better, I’m excited to tell you about the three Crowd members that earned top spots on the April 2015 Hall of Fame. We have a ton of amazing researchers contributing solid bugs every day, but these three ninjas earned the most Kudos points in Bugcrowd bounty programs from April 1 to April 30 2015. To thank them for their hard work, Bugcrowd is pleased to announce they’ll receive performance bonuses.

Read More

Researcher Interview: Fredrik “Almroot” Almroth

We’re joined by Fredrik “Almroot” Almroth, a Bugcrowd community member and highly skilled security researcher. Fredrik has been active in bug bounties since 2010, when he found his first Google vulnerability. Fredrik and his team at Detectify have found vulnerabilities in many of the top bug bounties in the world, including Google and Facebook. He’s one of the most prolific security researchers in the community and it was great to get Fredrik to share some of his tips and tricks.

Read More

Guest Blog: Writing Up a POC by Planet Zuda

Republished with permission from: http://planetzuda.com/2014/12/29/how-to-write-a-good-proof-of-concept-for-security-holes/ How To Write a Proof Of Concept For Security Holes December 29, 2014 by Planet Zuda   We find security bugs all the time and have to write proof of concepts. Unfortunately, we struggled with being able to…

Read More
Back To Top