Reward your researchers fairly – try our bug bounty calculator today!
Researchers’ blog
How AI is leveraged to enhance the Intigriti platform
News
December 1, 2025
At Intigriti, we believe AI is a powerful ally to, not a replacement of, our community of security researchers. We will use AI to empower our researchers to hunt for bugs smarter, faster, and more efficiently, while recognizing the value of human creativity and ingenuity that machines cannot replica
Bypassing Content Security Policy (CSP)
Hacking Tools
November 30, 2025
Content Security Policies (CSPs) are often deployed as the last line of defense against client-side attacks such as cross-site scripting (XSS) and clickjacking. Since their first introduction in 2012, they've enabled developers to control which and what resources are allowed to load and evaluate wit
November CTF Challenge: Exploiting JWT vulnerabilities to achieve RCE
Hacking Tools
November 26, 2025
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security research community. This month, we've decided to take on a challenge ourselves as a way to give back to the community. In response to one of our recent articles, we decided to focus on JSON
Intigriti Bug Bytes #230 - November 2025 🚀
Bug Bytes
November 21, 2025
Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: Finding an RCE using AI in GitHub CORS exploitation cheat sheet Scanning codebases with AI Bypassing paywalls SSTIs in AI models And so much more! Let’s dive in! We are thrilled to announce that Inti
Intigriti wins ‘Security Innovation of the Year’ at the 2025 UK IT Industry Awards
Awards
November 18, 2025
We are thrilled to announce that Intigriti has won Security Innovation of the Year at the UK IT Industry Awards 2025. The UK IT Industry Awards are designed to celebrate organizations, teams, projects, technologies, and individuals who continue to help shape the future of IT. This accolade is a test
Hunting for DOM-based XSS vulnerabilities: A complete guide
Hacking Tools
November 11, 2025
Traditional cross-site scripting (XSS) vulnerabilities were prevalent when server-side rendering (with languages like PHP, JSP, and ASP) was the norm. However, as applications become more complex and developers continue to shift application logic to the client-side, more complex client-side vulnerab
Exploiting JWT vulnerabilities: A complete guide
Hacking Tools
November 7, 2025
Before JSON Web Tokens (JWTs) became popular in today's app development landscape, web applications predominantly used server-side sessions, which presented horizontal scalability issues. JWTs solved this by moving authentication data from the server to the token itself. They are self-contained, sta
Intigriti Bug Bytes #229 - October 2025 🚀
Bug Bytes
October 31, 2025
Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: Cool trick to find disclosed secrets in internal web extensions A repository full of WAF bypasses Hacking Intercom misconfigurations Wayback Machine for hackers And so much more! Let’s dive in! October’s
Intigriti partners with Shield to empower security within healthcare
News
October 23, 2025
Antwerp, Belgium, Oct. 23, 2025. Intigriti, a global crowdsourced security provider, is delighted to announce its latest partnership with non-profit Shield vzw within the framework agreement with the Federal Public Service (FPS) Health in Belgium. This partnership provides essential support and se
Hunting for reflected XSS vulnerabilities: A complete guide
Hacking Tools
October 20, 2025
Cross-site scripting vulnerabilities are, by no doubt, one of the vulnerability types that'll keep haunting applications for a long time. This seamless injection bug can often be further escalated to allow attackers to perform malicious actions on behalf of the victim, or even worse, on behalf of a
Hunting for secrets in bug bounty targets
Hacking Tools
October 5, 2025
It is no secret that bug bounty hunters who spend lots of time on information gathering are always rewarded well for their efforts. As developers continue to in-deliberately push secrets to production or to other public-facing resources, hunting for secrets remains invaluable for security researcher
Hunting for SSRF vulnerabilities in Next.js targets
Hacking Tools
September 28, 2025
Next.js is a powerful open-source React framework that enables developers to build fast, interactive, and SEO-friendly web applications. With almost 13 million weekly downloads via NPM, and the framework being complex by nature, it makes it a prime target for unfriendly intruders. In this article, w
Intigriti Bug Bytes #228 - September 2025 🚀
Bug Bytes
September 12, 2025
Hi hackers, Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: A common (yet unknown) SSRF attack vector in Next.js Middleware Exploiting PDF processors by generating and uploading malicious PDF payload files A full reconnaissance breakdown on how to approach
Hacking plugin ecosystems: A complete guide
Hacking Tools
September 2, 2025
Add-on (or plugin) ecosystems unlock an entire new world of integration possibilities while also complementing the platform's extensibility to developers. However, in practice, finding the right balance between adding extensibility and maintaining security often proves to be difficult. The root caus
August CTF challenge: Exploiting SSRF via NextJS Middleware
Hacking Tools
August 27, 2025
At Intigriti, we hold monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security research community. This month's challenge, presented by @0xblackbird, featured an interesting server-side request forgery (SSRF) vulnerability affecting web applications that make use of t
Intigriti Bug Bytes #227 - August 2025 🚀
Bug Bytes
August 15, 2025
Hi hackers, Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: Evading WAFs like Cloudflare, Akamai & AWS Cloudfront Creating your complete bug bounty automation system A powerful, targeted backup file scanner Bypassing CSP to achieve XSS via a cool trick w
Hacking misconfigured Firebase targets: A complete guide
Hacking Tools
August 13, 2025
Google Firebase is a popular back-end application development platform that provides several built-in components and services, allowing developers to seamlessly build interactive web and mobile applications. But as with any development platform and framework, security always proves to be difficult.
Identifying the server's origin IP behind popular reverse proxies
Hacking Tools
July 29, 2025
Most of your targets often resort to using content delivery networks (CDNs) or other anti-DDoS reverse proxies to mask their origin IP, protecting the origin server from possible (injection) attacks while also improving content delivery speed. However, when access is misconfigured, it makes it possi
Intigriti Bug Bytes #226 - July 2025 🚀
Bug Bytes
July 18, 2025
Hi hackers, Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: Exploiting Log4Shell (Log4J) in 2025 An indispensable GitHub recon tool (not the one you have in mind) A repository full of bug bounty tips, resources and tools One of the most comprehensive gui
GitHub dorking for beginners: How to find more vulnerabilities using GitHub search
Hacking Tools
July 13, 2025
Bug bounty hunters who spend time in content discovery and reconnaissance are always rewarded well for their efforts, as they often come across untested and hidden assets or endpoints. GitHub dorking is another way to leverage public search engines to discover hidden assets, endpoints and even secre
