• Hive Five
  • Posts
  • 🐝 Hive Five 110 - Nuclei Foundation Series, OWASP needs to evolve, and Share the Spotlight

🐝 Hive Five 110 - Nuclei Foundation Series, OWASP needs to evolve, and Share the Spotlight

Hi friends,

I hope you had a delightful weekend. I’ve decided to learn more about Dev(Sec)Ops, so I’ve been keeping myself busy.

What have you been learning more about?

Let’s take this week by swarm!

🐝 The Bee’s Knees

  1. Introduction to Nuclei. This is the first video in the Nuclei Foundation Series, a series dedicated to the community powered vulnerability scanner, Nuclei. more

  2. An open letter to the OWASP directors: OWASP needs to evolve. The community asks for a response within 30 days, with a plan of action to address the five points they outline. more

  3. Awesome Reinforcement Learning for Cyber Security. General machine learning methods applied to cyber security are not included in this list. more

  4. Escaping misconfigured VSCode extensions is a two-part blog series that will cover how they found and disclosed three vulnerabilities in VSCode extensions and one vulnerability in VSCode itself (a security mitigation bypass assigned CVE-2022-41042 and awarded a $7,500 bounty). more

  5. Another great post by Leif, Share the spotlight: Creating a culture where everyone shares their work. How to encourage others at your company to write blogs, appear on podcasts, and speak at conferences and meetups. more

️💪 Sponsor

Sponsor the Hive Five and reach a highly engaged community of engineers, security researchers, and ethical hackers who are at the forefront of the industry.

🔥 Buzzworthy


  1. Chaos by ProjectDiscovery is now available in beta for everyone. more

  2. Truffle Security’s XSSHunter supports optional e2e encryption. more

📅 Events

  1. tmp.0ut Volume 3 Call For Papers. This edition is set to be released on June 23rd 2023. more

  2. Monke asking for Ireland-based hackers to participate in the Hackerone Ambassador World Cup. more | USA

  3. Nicolas Gregoire’s Mastering Burp Suite Pro (On Site). This training is focused on experienced Web hackers who want to master their toolbox. more

🎉 Celebrate

  1. ScorpVayne has been nominated for and award at school on behalf of the student org @WiCySorg. Well deserved! more

  2. ramsexy crossed 10k reputation on HackerOne. Let’s go! more

  3. Intigriti sharing the latest Hacker Portraits: foobar0x7, renniepak, and WonderU360. Congrats! more

  4. 2022 Detectify Crowdsource Awards winners. Great job all! more

💰 Career

  1. sk3rts is looking for student roles for anything cybersecurity related, preferably pentesting or vulnerability research. more

  2. So you want to be a SOC Analyst? A blog series for someone wanting to get a start as a SOC Analyst. more

  3. Developer Roadmaps is a community effort to create roadmaps, guides and other educational content to help guide the developers in picking up the path and guide their learnings. more

  4. Security Certification Roadmap. more

⚡️ Community

  1. Peter doesn’t understand why many fuzzing wordlists contain “logout”, “logoff” etc. right near the top. Come to think of it, I don’t either. more

  2. STÖK feels like it’s time to get back to creating content for the community, but doesn’t know where to start. more

  3. d0nut is 1000% sold on copilot. more

  4. HVCK Magazine ONE:TWOZEROTWOTHREE - Wireless Edition. Featuring the people’s king of RFID: ICEMAN. more

  5. The “U Up?” Files With Joran Honig. He’s a Security Researcher @ ConsenSys Diligence and has become one of the most feared whitehats in the space. more

📰 Read

  1. Fortinet FortiNAC CVE-2022-39952 Deep-Dive and IOCs - PSIRT that details CVE-2022-39952, a critical vulnerability affecting its FortiNAC product. more

  2. Let’s build a Chrome extension that steals everything. Matt sets out to prove that regardless of Manifest v3, there’s still plenty left in the tank. more

  3. SSO Gadgets: Escalate (Self-)XSS to ATO. With the rise of Single-Sign-On (SSO) and especially OAuth 2.0 and OpenID Connect (OIDC), the attack surface of web applications has increased significantly. more

  4. An in-depth guide to subfinder: beginner to advanced. more

  5. An investigation into Ticket Fraud Scammers. more

📚 Resources

  1. People’s favorite engineering blogs that publish to an rss feed. more

  2. Paul Seekamp’s API endpoint one-liner. more

  3. Tuan using OpenAI to help choose a target for research and hunting bugs. more

  4. hahwul/DevSecOps is a roadmap for everyone who wants DevSecOps. more

  5. 100 Red Team Projects contains projects for security students. Red Teaming is one of the most attractive fields in offensive security or ethical hacking. more

🎥 Watch

  1. HackTheBox Awkward walkthrough. more

  2. Broken Access Control - Lab #5 URL-based access control can be circumvented. This website has an unauthenticated admin panel at /admin, but a front-end system has been configured to block external access to that path. more

  3. How to setup system-wide Mullvad DNS over HTTPS on iOS and macOS. more | why

  4. $3,133.70 XSS in golang’s net/html library, Greg’s first Google bug bounty. more

  5. Prototype Poisoning?! - Solution to February ’23 Challenge by drleek. more

🎵 Listen

  1. Day[0] Binary Exploitation Podcast 190 - Fuzzing cURL, Netatalk, and an Emulator Escape. This week they talk about more Rust pitfalls, and fuzzing cURL. more

  2. Hanselminutes Podcast 879 - Why We do Tech Outreach with Coding By Sophy. Sophy is a Software Engineer who is early in career and excited to get others into tech. She was the only afro-latina to graduate from the University of California Irvine in 2019 with a degree in computer science and engineering. more

  3. The Privacy, Security, & OSINT Show 290 - Extreme Privacy: Mobile Devices. In this episode they release their first digital guide as part of our new Extreme Privacy series, devote the bulk of the show to mobile device privacy and security, and offer some OSINT updates. more

  4. Critical Thinking - Bug Bounty Podcast S01 E08: PostMessage Bugs, CSS Injection, and Bug Drops. They drop some critical bugs which leak raw credit card info, and discuss some CSS Injection & PostMessage related techniques. more

  5. Malicious Life - Operation Ivy Bells. In the early 1970’s, US intelligence pointed at the possibility that the Russians have laid an underwater communication cable between two important naval bases in the Far East. more

Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.

Subscribe to the Hive Five to read the rest.

Become a paying subscriber of the Hive Five to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In

A subscription gets you:
Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
Experience continuously added NEW BENEFITS.