Intro Hey everyone! I hope you’re all doing well. This week, we’re diving into a variety of offensive application security topics, from bug bounty hunting, vulnerability exploitation techniques to AI prompt injection materials. We start with a great resource for beginners interested in bug bounty hunting — a search engine…