[THE-BUG-HUNTER]
HOMECASE_STUDIESBLOGPROFILE
[6:02:10 PM] ONLINE

[BLOG_ARCHIVE]

Tutorials, writeups & security insights

Real-world vulnerabilities and exploitation techniques

3
TOTAL_POSTS
2
CATEGORIES
1
TUTORIALS
2
WRITEUPS

[FILTERS]

FOUND: 3 blog posts

WriteupIntermediate

When Protocol Parsing Leaks Into Application Logic

How I found a CRLF-based request header injection that let me poison the Host header and turn it into an open redirect on a GitLab instance.

Category:Writeup
Reading Time:6 min read
Published:12/27/2025
#CRLF Injection#Header Injection#Host Header Poisoning+3
STATUS:READ_more →
WriteupIntermediate

From Self-XSS to Reflected XSS: A CSRF Escalation Story

How I transformed a seemingly harmless self-XSS vulnerability into a critical reflected XSS by chaining it with CSRF, demonstrating the power of vulnerability escalation in bug bounty hunting.

Category:Writeup
Reading Time:8 min read
Published:11/10/2025
#XSS#CSRF#Vulnerability Chaining+3
STATUS:READ_more →
TutorialAdvanced

How I Passed the BSCP After 4 Attempts

The BSCP was harder than I expected. Here's what actually worked for me after failing three times and what I'd do differently if I started over.

Category:Tutorial
Reading Time:12 min read
Published:9/21/2025
#BSCP#PortSwigger#Certification+3
STATUS:READ_more →

[THE-BUG-HUNTER]

Documenting the art of ethical hacking and vulnerability research

Version: v2.1.0
Status: ACTIVE
Uptime: 99.9%

NAVIGATION

→ Home→ Case Studies→ Blog→ Profile

LINKS

→ Twitter→ HackerOne→ YesWeHack→ Email
[© 2025 thebughunter.blog]All rights reserved
Security: SECUREDConnection: ENCRYPTED●
root@thebughunter:~$ Thank you for visiting the matrix..._