Skip to content

This repository updates latest Bug Bounty medium writeups every 10 minutes

Notifications You must be signed in to change notification settings

rix4uni/medium-writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

Time Title Feed IsNew IsToday
Fri, 24 Jan 2025 03:47:58 GMT Why I Stopped Hiding My Words vulnerability Yes Yes
Fri, 24 Jan 2025 02:01:21 GMT Tips Cyber Security Usaha Keci Tetap Aman dari Serangan cybersecurity Yes
Fri, 24 Jan 2025 00:46:47 GMT Saving Money Is Key in Life security Yes
Fri, 24 Jan 2025 00:28:07 GMT Unlocking Bitcoin’s Full Potential: Revisiting Truncated Opcode... security Yes
Fri, 24 Jan 2025 03:25:33 GMT DNS Misconfigurations and Security Risks cybersecurity, information-technology Yes
Fri, 24 Jan 2025 02:08:41 GMT CV-6 (Precision vs Recall) security Yes
Fri, 24 Jan 2025 03:27:01 GMT हमारे शरीर में खून 19312 किलà... bug-bounty-writeup Yes
Fri, 24 Jan 2025 02:27:53 GMT 10 Cybersecurity Predictions for 2025 cybersecurity, hacking, infosec Yes
Fri, 24 Jan 2025 01:46:31 GMT Managed vs. Unmanaged Google Cloud Service Mesh: Making the Right... security Yes
Fri, 24 Jan 2025 03:02:45 GMT Rugged Beauty in the Arctic vulnerability Yes
Fri, 24 Jan 2025 01:14:33 GMT Why I Switched Blog Platforms hacking Yes
Fri, 24 Jan 2025 00:50:55 GMT Making use of Javascript Source Maps (js.map) files in Bug Bounty... bug-bounty, bug-bounty-tips Yes
Fri, 24 Jan 2025 00:08:47 GMT A majestic temple opportunity of wellbeing and wellness google-dorking, web-pentest Yes
Fri, 24 Jan 2025 02:21:52 GMT Scam Yourself attacks: How social engineering is evolving security, cybersecurity, hacking Yes
Fri, 24 Jan 2025 01:40:54 GMT Tesla Wall Connector Hacked: Pwn2Own Automotive Uncovers Major Vu... vulnerability, hacking Yes
Fri, 24 Jan 2025 02:36:41 GMT Strengthening Android App Security: Unlocking Stronger Protection... cybersecurity Yes
Fri, 24 Jan 2025 02:02:05 GMT AWS PerSEStence: Investigating an AndroxGh0st-Inspired Attack cybersecurity Yes
Fri, 24 Jan 2025 03:42:00 GMT Cybersecurity Architecture: Server Threat modeling : a Compass m... cybersecurity Yes
Fri, 24 Jan 2025 02:02:25 GMT Applying a Tim Ferriss Exercise to Cybersecurity cybersecurity Yes
Fri, 24 Jan 2025 02:59:30 GMT Types of Ethical Hacking ethical-hacking Yes
Fri, 24 Jan 2025 03:11:12 GMT Google Chrome Security alert: 3 billion users must take action no... cybersecurity Yes
Fri, 24 Jan 2025 03:28:37 GMT Python Cheatsheet for Web App Testing: Automating Vulnerability S... vulnerability-scanning Yes
Fri, 24 Jan 2025 02:12:13 GMT Analisis Jaringan dan Deteksi Ancaman dengan Wireshark: Studi Kas... cybersecurity, information-technology Yes
Fri, 24 Jan 2025 03:38:34 GMT Open AI Operator —  a Security Nightmare? security Yes
Fri, 24 Jan 2025 01:18:25 GMT A Brief AI Identity Crisis hacking Yes
Mon, 10 Jun 2024 10:41:48 GMT Voice-Directed Picking Systems Enhance Efficiency in Supply Chain... vdp
Thu, 23 Jan 2025 21:16:21 GMT How is Your Cyber Hygiene? Essential Tips for 2025 information-technology, information-security, cyber-security-awareness
Fri, 17 Jan 2025 11:25:38 GMT DVWA Lab13 — Weak Session IDs | Pentest pentest
Thu, 23 Jan 2025 16:06:04 GMT Next.js, cache, and chains: the stale elixir bug-bounty, cve
Sat, 04 Jan 2025 15:44:20 GMT URGENT: First PoC Exploit of 2025 Targets Critical Windows Vulne... exploit
Sun, 22 Oct 2023 19:57:30 GMT Performing a Log Poisoning Attack log-poisoning
Wed, 20 Nov 2024 06:53:07 GMT Identify Infrastructure Linked To LockBit 3.0 Ransomware Affiliat... zoomeye
Tue, 21 Jan 2025 03:43:20 GMT Python Cheatsheet for XSS Vulnerability Scanning: Automating Cros... cross-site-scripting
Fri, 17 Jan 2025 14:16:07 GMT How I Hacked Hackers Account bugbounty-writeup, idor
Sun, 29 Dec 2024 07:49:04 GMT From Misconfigured CloudFlare to Information Disclosure via Debug... information-disclosure
Wed, 15 Jan 2025 03:44:29 GMT Playwright — Upload files file-upload
Mon, 13 Jan 2025 14:03:49 GMT Automated Reconciliation vs. Manual Processes: A Detailed Compari... recon
Mon, 06 Jan 2025 00:12:43 GMT Cybr Academy: Access Secrets Manager via Lambda Function with LFI... lfi
Sat, 11 Jan 2025 15:00:19 GMT Server-side request forgery (SSRF) ssrf
Tue, 24 Dec 2024 16:50:36 GMT IDOR: Who, What, Where, When, Why, How? idor
Fri, 17 Jan 2025 13:59:51 GMT Account Takeover via IDOR form JWT Programs HackerOne 2500$ hackerone, bugcrowd
Tue, 21 Jan 2025 04:04:25 GMT Navigating the Security Landscape: Network Security vs* Applicati... application-security
Fri, 04 Oct 2024 05:09:54 GMT Where do I start Bug Bounty Hunter? bug-bounty-hunting
Wed, 22 Jan 2025 09:52:37 GMT TryHackMe Sudo Security Bypass Walkthrough WriteUp pentest
Sun, 20 Oct 2024 17:17:53 GMT How to find the “SUB-DOMAINS� of any website through Xxxx.c99... subdomain-takeover
Sun, 26 May 2024 13:36:10 GMT Penetration Tester — Interview Question — 1 file-inclusion
Thu, 23 Jan 2025 13:35:05 GMT $5,000 Bug Bounty: The Hacker’s Unexpected Goldmine bug-bounty, infosec, ethical-hacking
Thu, 23 Jan 2025 12:09:32 GMT how to kick people off google meet not as owner information-security
Wed, 08 Jan 2025 14:44:17 GMT Russell Brand labeled by matrix back in 2023 a wrong un! That’s... google-dorking
Sat, 18 Jan 2025 19:30:18 GMT S3Bucket Enumeration and Takeover information-disclosure
Tue, 14 Jan 2025 11:30:24 GMT Why Continuous Penetration Testing is Essential? vapt
Sun, 19 Jan 2025 13:08:15 GMT Command Injection for Beginners: From Detection to Exploitation security-research
Tue, 24 Dec 2024 07:06:17 GMT Advanced Shodan Dorking Tutorial for Bug Hunters 2025 shodan
Wed, 22 Jan 2025 14:34:32 GMT How I Hacked a User Management System and Found 3 Critical GraphQ... infosec
Wed, 22 Jan 2025 13:32:07 GMT $4,000 Bug Bounty: How I Found This Critical Vulnerability infosec, bug-bounty-hunting
Sun, 29 Dec 2024 14:08:49 GMT CVE-2024-12209: Local File Inclusion Vulnerability in WP Umbrella... local-file-inclusion
Fri, 12 Jul 2024 12:09:30 GMT File Upload se kuch hatke : File Inclusion aur Path Traversal Vu... file-inclusion
Thu, 23 Jan 2025 13:25:06 GMT Social Engineering Penetration Testing: Techniques and Case Studi... cyber-security-awareness
Mon, 20 Jan 2025 04:32:02 GMT The Road to CRTP Cert — Part 17 vapt
Mon, 20 Jan 2025 16:44:26 GMT File Attacks: Type Filters file-upload
Sun, 22 Dec 2024 15:17:47 GMT SHODAN — INSECURE DESIGN BROKEN ACCESS CONTROL #2 — A... shodan
Mon, 09 Dec 2024 14:51:54 GMT How I Earned $$$ | Open Redirection bug-bounty-program
Thu, 23 Jan 2025 16:57:58 GMT Decoding LummaStealer cyber-security-awareness
Sat, 01 Jun 2024 18:27:24 GMT Unveiling the Sneaky CSV Injection: VDP vs. Objective-Based Offen... vulnerability-disclosure
Wed, 22 May 2024 15:04:48 GMT VulnLab — File Inclusion file-inclusion
Tue, 07 Jan 2025 18:35:35 GMT Thanks Elon’s escalation of Tommy’s narrative being shunned f... google-dorking
Wed, 25 Dec 2024 15:11:53 GMT Understanding Local File Include (LFI) Vulnerability and Its Impa... lfi
Tue, 17 Dec 2024 19:35:55 GMT I made an AI-powered no-code directory builder — MakeADir.c... directory-listing
Tue, 24 Dec 2024 09:45:23 GMT How to Actually Store API Keys Securely When Sending Request? api-key
Mon, 16 Dec 2024 21:39:28 GMT API-Authentifizierung: Wie sie funktioniert und warum sie so wich... api-key
Sun, 19 Jan 2025 06:18:10 GMT Unlimited XSS | This is the Dumbest Way to Find XSS Bug xss-attack
Thu, 23 Jan 2025 15:39:38 GMT SOC Fundamentals: The Heart of Cybersecurity! ethical-hacking
Wed, 08 Jan 2025 11:10:41 GMT Attacker Secrets | Hacking Dashboards Easily | Part5 google-dork
Sat, 27 Apr 2024 18:54:43 GMT Censys is out of control censys
Mon, 18 Mar 2024 09:32:40 GMT OT Hunt: Finding ICS/OT with Censys censys
Fri, 20 Dec 2024 05:50:49 GMT 19- google-dorking
Sat, 18 Jan 2025 10:54:48 GMT Learn Lo-Fi — TryHackMe Walkthrough local-file-inclusion
Fri, 17 Jan 2025 09:46:34 GMT Collected XSS Payloads �✌�⬇� idor
Mon, 11 Dec 2023 18:17:01 GMT Exploiting a Log Poisoning. log-poisoning
Mon, 20 Jan 2025 11:27:07 GMT Consigue un bonus de entrada o acumula los puntos bounty-program
Wed, 22 Jan 2025 09:48:03 GMT Recon | Subdomains bug-bounty-tips, recon
Tue, 21 Jan 2025 07:07:33 GMT Comprehensive Bug Hunting Methodology bugbounty-writeup
Thu, 26 Dec 2024 18:18:51 GMT How I found IDOR on Achmea idor
Sat, 18 Jan 2025 12:17:21 GMT (CVE-2024–8474); Severe Vulnerability: OpenVPN Connect for Andr... cve
Thu, 23 Jan 2025 15:51:34 GMT Top Cybersecurity Certifications to Boost Your Career cyber-security-awareness
Sun, 05 Jan 2025 17:24:30 GMT Siber Güvenlik Tehdit Unsurları exploit
Tue, 29 Oct 2024 13:43:50 GMT Web cache poisoning explained web-cache-poisoning
Fri, 20 Dec 2024 05:08:10 GMT RCE via LFI — OSCP Tactics for Code Execution and Gaining a... lfi
Tue, 17 Sep 2024 03:13:06 GMT Day 15: Remote Desktop Protocol (RDP) Abuse and Protection censys
Thu, 23 Jan 2025 21:37:28 GMT How I Found a Bug in Sony and Earned Exclusive Swag! bug-bounty, vulnerability
Wed, 22 Jan 2025 11:55:06 GMT Comprehensive Guide to Application Security Testing Software application-security
Thu, 12 Dec 2024 06:02:00 GMT Advanced Google Dorking | Part10 dorking
Mon, 16 Dec 2024 19:10:14 GMT "My Cybersecurity Journey: From Novice to Future-Ready Talent wit... vulnerability-scanning
Sat, 11 Jan 2025 22:50:44 GMT Tenable Nessus ile Zaafiyet Yönetimi ve Pentest -2 pentest
Thu, 23 Jan 2025 19:21:35 GMT Understanding Kerberos Authentication | Red Teamer’s Guide penetration-testing
Wed, 24 Jul 2024 20:52:37 GMT Web Cache Poisoning: What It Is and How to Protect Against It web-cache-poisoning
Tue, 21 Jan 2025 20:55:26 GMT DeAI� 보안성 향�: 1-day Case Research를 중심으로 security-research
Thu, 28 Nov 2024 10:17:15 GMT Valuable resources for business listings directory-listing
Thu, 28 Sep 2023 23:05:39 GMT Archangel — TryHackMe log-poisoning
Thu, 23 Jan 2025 17:44:21 GMT My DevOps Internship Experience: A Lonely Path information-technology
Thu, 23 Jan 2025 05:23:20 GMT TryHackMe Writeup — Racetrack Bank pentesting
Wed, 22 Jan 2025 09:13:10 GMT HOW I Hacked “Welcome to Secure Portal� — IDOR + BAC (P... bugbounty-writeup, bug-bounty-writeup
Fri, 10 Jan 2025 01:54:17 GMT Dorking for LearnPress WP Plugin google-dork, dorks
Mon, 13 Jan 2025 05:46:34 GMT Cybersecurity jobs gonna be very popular in the future life. cybersecurity-tools
Mon, 23 Dec 2024 10:33:13 GMT Maximize Your Online Lottery Wins with Bounty Game bounties
Thu, 23 Jan 2025 17:49:13 GMT From Ada Lovelace to Cloud Computing: A History of Computer Progr... information-technology
Mon, 20 Jan 2025 02:58:51 GMT Python Cheatsheet for Ethical Hacking: Exploring Security Loophol... vulnerability-scanning
Sat, 28 Dec 2024 15:48:50 GMT CVE-2024-50379: Apache Tomcat Race Condition Vulnerability Leads ... remote-code-execution
Thu, 23 Jan 2025 23:07:09 GMT CTI REPORT - LockBit 3.0: bug-bounty, hacking
Mon, 20 Jan 2025 08:47:35 GMT Mastering SSL Certificate Management: Ensure Continuous Web Secur... web-security
Sun, 12 Jan 2025 11:14:29 GMT XSS Saldırıları ve React’ın Bu Konuda Sağladığı Avantaj... cross-site-scripting
Sun, 19 Jan 2025 17:39:34 GMT Post Compromise Temelleri - 1 application-security
Fri, 20 Dec 2024 13:48:18 GMT Google Dorks: Unlocking the Secrets of the Web dorking
Mon, 20 Jan 2025 13:21:57 GMT Mengatasi Masalah Concurrency di Go dengan Solusi dari Rust bugs
Fri, 17 Jan 2025 09:54:17 GMT Focusing on Expired Sessions to Uncover IDOR Vulnerabilities bugbounty-writeup
Thu, 19 Dec 2024 17:11:25 GMT Tor browser google-dorking
Tue, 21 Jan 2025 08:56:10 GMT THM — Lo-Fi writeup local-file-inclusion
Fri, 03 Jan 2025 14:00:17 GMT How to Streamline Your Finance Operations with Reconciliation Aut... recon
Thu, 23 Jan 2025 09:16:38 GMT Exposed Credentials Guide: Not just in client javascripts || 10... infosec
Sun, 08 Dec 2024 13:18:39 GMT Don’t Overlook the Obvious: A Near Miss in Bug Hunting information-disclosure
Tue, 21 Jan 2025 19:56:12 GMT Secure Your NodeJS Applications with express-xss-sanitizer: Preve... xss-attack
Fri, 20 Dec 2024 02:43:20 GMT CVE-2024–50379 (RCE) & CVE-2024–54677 (DoS) Vulnerabilities i... remote-code-execution
Fri, 10 Jan 2025 12:22:29 GMT My Worst Informative Report //false positive Bug bounty-program
Thu, 02 Jan 2025 13:51:51 GMT Creating an IBM Cloud API Key for watsonx.ai api-key
Sat, 18 Jan 2025 20:14:00 GMT Zero Click Account Takeover — JWT Token Manipulation via Pr... hackerone, bugcrowd
Sat, 18 Jan 2025 10:41:14 GMT CVE-2025–21298: Ben Evimde Mail Okuyordum! rce, remote-code-execution
Sun, 12 Jan 2025 04:32:10 GMT The Road to CRTP Cert — Part 14 vapt
Thu, 23 Jan 2025 23:07:07 GMT The Future of Technology in Education information-technology
Wed, 15 Jan 2025 16:54:10 GMT I found Reflected XSS on another university’s website pentest
Mon, 23 Dec 2024 16:59:51 GMT Blazing-Fast Recon & Vulnerability Scanning with SubDomainRadar.i... bounty-program
Thu, 23 Jan 2025 06:27:37 GMT Easy $10,000 bounty using Wayback Machine bug-bounty-tips, hackerone, bug-bounty-writeup
Mon, 13 Jan 2025 23:42:38 GMT Local File Inclusion local-file-inclusion
Tue, 23 Apr 2024 05:21:16 GMT OT Hunt: Analyzing CODESYS Security with MITRE T0886 censys
Mon, 07 Oct 2024 12:46:28 GMT Step-by-Step Guide to Installing and Setting Jyton Jar File for A... vdp
Wed, 18 Dec 2024 21:47:52 GMT File Inclusion Vulnerabilities: Comprehensive Guide lfi, file-inclusion
Tue, 19 Nov 2024 17:26:48 GMT How to Install and Use dnsx for Subdomain Enumeration and DNS Rec... subdomain-enumeration, bug-bounty-hunting
Tue, 10 Dec 2024 01:58:08 GMT Understanding the Impact of XSS Attacks on Websites xss-bypass
Tue, 17 Dec 2024 21:25:11 GMT Automating API Gateway Key Rotation with AWS Lambda and Secrets M... api-key
Thu, 23 Jan 2025 21:24:25 GMT Phishing Defense: Blocking the Bait Before It Hooks You information-technology, information-security
Fri, 17 Jan 2025 13:58:10 GMT The rise of scammer bug bounty programs — and the reason I ... bugs
Fri, 20 Dec 2024 08:42:20 GMT Information Disclosure On Password cancel Endpoint information-disclosure
Sun, 12 Jan 2025 11:02:03 GMT “Include� ssrf, pentest
Sun, 12 Jan 2025 05:12:25 GMT OWASP Top 10 Simplified: SSRF ssrf
Thu, 23 Jan 2025 23:02:53 GMT ب�سْم� اللَّه� الرَّحْمَن� الرَّح�... penetration-testing
Sun, 22 Dec 2024 15:28:09 GMT What is Google Hacking? A Beginner's Guide to Advanced Search Tec... google-dorking
Wed, 08 Jan 2025 15:10:02 GMT CVE-2024–50603: Aviatrix Network Controller Command Injection V... remote-code-execution
Tue, 07 Jan 2025 01:54:41 GMT API Key Authentication Best Practices api-key
Thu, 09 Jan 2025 12:57:17 GMT Unlock the Ultimate Resource Hub for Security Researchers bug-bounty-hunter
Wed, 22 Jan 2025 15:14:57 GMT Easy File Upload Functionality Remote Code Execution rce
Fri, 17 Jan 2025 07:13:06 GMT VAPT Knowing the importance of Vulnerability assessment and Penet... vapt
Sat, 11 Jan 2025 21:44:46 GMT EXIF Metadata-Based XSS Attacks: A Web Security Research xss-vulnerability
Sun, 08 Dec 2024 19:09:40 GMT Unlocking Cybersecurity with Censys: A Guide to Ethical Hacking, ... censys
Thu, 23 Jan 2025 21:55:57 GMT Peer-to-Peer File Sharing Solutions security
Tue, 14 Jan 2025 19:58:17 GMT OpenSprinkler Misconfiguration: Because Who Doesn’t Want Their ... censys
Sat, 30 Sep 2023 20:51:33 GMT Hunt and bruteforce PLC: SIMENS LOGO! zoomeye
Thu, 26 Dec 2024 04:01:22 GMT Find XSS Vulnerabilities in Just 2 Minutes xss-bypass
Fri, 17 Jan 2025 15:53:49 GMT Day 5. The 100-Day Bug Bounty Challenge: Understanding SQL Inject... bugbounty-writeup, vapt
Mon, 16 Dec 2024 10:06:29 GMT OpenCart v4.0.2.3 — Server-Side Template Injection remote-code-execution
Wed, 18 Dec 2024 11:40:10 GMT 1800+ Directory Submission Sites | Boost Your SEO with High-Qual... directory-listing
Sat, 18 Jan 2025 19:59:54 GMT Cross-Site Scripting (XSS) attacks xss-vulnerability
Fri, 20 Dec 2024 23:42:24 GMT Securing Your API Keys: Local Storage with Gradle Properties (Mac... api-key
Thu, 23 Jan 2025 16:20:10 GMT The Great Fry Heist: How Noha Caught the Cyber Culprits infosec
Mon, 20 Jan 2025 18:09:41 GMT Mastering IaC and Secret Scanning: An Ultra-Extensive Guide to Se... application-security
Sun, 22 Dec 2024 23:32:02 GMT Getting Started with Nessus : Installation and First Steps in Vu... vulnerability-scanning
Tue, 07 Jan 2025 13:35:39 GMT TuesdayTool 26: PimEyes, The Photo Investigator cybersecurity-tools
Sat, 18 Jan 2025 14:59:07 GMT Multiple path traversal vulnerabilities in the Beryl AX GL-MT300 ... cve
Thu, 23 Jan 2025 12:46:47 GMT How VAPT Services Can Help You Comply with Industry Regulations pentesting
Sun, 05 Jan 2025 04:31:22 GMT LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domai... exploit
Thu, 16 Jan 2025 06:18:09 GMT CVE-2023–25136 [OpenSSH] remote-code-execution
Thu, 23 Jan 2025 05:35:28 GMT Create Your Free Red Teaming Lab at Zero Cost! pentesting
Thu, 23 Jan 2025 04:35:05 GMT Deep Dive into F5 ASM: Advanced Techniques for Securing Applicat... application-security
Sun, 19 Jan 2025 01:23:50 GMT From Path Traversal to RCE: A $40,000 Bug Bounty Journey remote-code-execution
Fri, 10 Jan 2025 15:46:07 GMT Behind the Scenes: How I Discovered Flaws in a Rewards and Recogn... idor
Wed, 08 Jan 2025 12:36:46 GMT Automate-XSS Five-In-One Tool xss-vulnerability, xss-bypass
Sun, 22 Dec 2024 06:26:44 GMT Advanced Shodan Dorking | Part9 shodan
Thu, 23 Jan 2025 03:38:03 GMT Vulnerability Access Control Apple $50,000 bounty flaw allows att... hackerone, bugcrowd
Thu, 23 Jan 2025 14:01:18 GMT Understanding Zero Trust Architecture in Cybersecurity cyber-security-awareness
Thu, 19 Dec 2024 10:13:19 GMT Variable Data Printing: Personalization Redefined vdp
Mon, 03 Jun 2024 16:02:25 GMT Directory Traversal Attacks: Exploiting and Bypassing Protections file-inclusion
Mon, 02 Dec 2024 14:55:27 GMT Why aDirectory is the Ultimate SEO-Friendly Directory Plugin directory-listing
Sun, 19 Jan 2025 17:09:31 GMT Achieving CVE-2024–55186: Unveiling an IDOR Vulnerability in th... cve
Sat, 19 Oct 2024 19:01:34 GMT How I Found a Subdomain Takeover Bug and Earned a $500 Bounty subdomain-takeover
Thu, 23 Jan 2025 18:02:58 GMT Setting Up Cookie-Based JWT Authentication in Spring Boot web-security
Mon, 13 Jan 2025 14:41:31 GMT MASS HUNTING TO FIND XSS(CROSS SITE SCRIPTING) cross-site-scripting
Sun, 05 Jan 2025 22:10:22 GMT Top 8 Bug Bounty Platforms in 2025 bug-bounty-program
Wed, 14 Aug 2024 23:50:11 GMT HTTP Request Smuggling ile Web Cache Poisoning | Deception SaldÄ... web-cache-poisoning
Mon, 07 Oct 2024 04:01:53 GMT Subdomain Enumeration | BBOT ✅>= Subfinder + Sublist3r + Asset... subdomain-enumeration, subdomain-takeover
Wed, 22 Jan 2025 20:32:27 GMT How I Found Critical Vulnerabilities in a Laravel Website: A Pen ... xss-attack, xss-bypass
Sun, 22 Dec 2024 16:44:15 GMT Advanced Google Dorking | Part16 google-dork, dorks
Wed, 07 Aug 2024 04:47:50 GMT Unraveling Web Cache Poisoning: A Deep Dive (Part 1) web-cache-poisoning
Thu, 23 Jan 2025 07:24:41 GMT Python Cheatsheet for Vulnerability Scanning: Identifying Weaknes... vulnerability-scanning
Thu, 23 Jan 2025 14:23:16 GMT Finding more subdomains.(part 2) bug-bounty, penetration-testing
Thu, 23 Jan 2025 18:37:30 GMT Discovering Hidden Details: Extract Mobile Numbers, IP Addresses,... pentesting, ethical-hacking
Tue, 31 Dec 2024 07:14:59 GMT How I Discovered a Leaked cAdvisor Panel Dashboard on a Website shodan
Thu, 23 Jan 2025 16:03:05 GMT The Ultimate Guide to Hacking AWS S3: Find Vulnerable Buckets and... bug-bounty, penetration-testing, ethical-hacking
Thu, 23 Jan 2025 10:21:36 GMT A Simple P2 Bug Via Forced Browsing bug-bounty-tips, bug-bounty-writeup
Mon, 13 Jan 2025 04:24:17 GMT HackTheBox | Heal remote-code-execution
Thu, 19 Dec 2024 19:27:07 GMT LFI: Identify the vulnerable endpoint and exploit that by reading... lfi
Tue, 10 Dec 2024 15:26:15 GMT Mastering Bug Bounty Recon: Essential Techniques for Ethical Hack... subdomain-enumeration
Tue, 21 Jan 2025 09:47:23 GMT 收�:盘点2024年�容错过的CVE高�严��洞� cve
Sun, 12 Jan 2025 12:48:19 GMT Day 3. The 100-Day Bug Bounty Challenge: Understanding DOM-Based ... cross-site-scripting
Wed, 03 Apr 2024 06:04:54 GMT PHP Framework Popularity Statistics zoomeye
Thu, 28 Mar 2024 06:19:31 GMT Writing a POC for the v2board authorization vulnerability zoomeye
Sun, 08 Sep 2024 14:59:02 GMT Why choose managed Vulnerability Disclosure Programs (mVDP)? vulnerability-disclosure
Tue, 05 Dec 2023 07:54:40 GMT LFI via SMTP log poisoning log-poisoning
Thu, 12 Dec 2024 09:45:15 GMT XWORM RAT 5.6 CRACKED LIFETIME cyber-sec
Mon, 20 Jan 2025 03:50:39 GMT Zero Click Account Takeover in ClassDojo’s Student Login System bugcrowd
Fri, 29 Nov 2024 17:47:23 GMT Why Dorking is One of the Most Important Aspects of OSINT dorking
Tue, 08 Oct 2024 01:00:46 GMT Race Condition leads to Cache Poisoning ?! web-cache-poisoning
Mon, 20 Jan 2025 12:55:59 GMT How to Turn Bug Bounty Scopes into Goldmines: Recon Techniques Th... security-research
Tue, 21 Jan 2025 22:32:53 GMT It’s Official: Node.js Just Dropped the Mother of All CVEs [CV... cve
Fri, 29 Mar 2024 06:28:39 GMT Unlocking the Power of ZoomEye: Innovative Features and Vibrant C... zoomeye
Tue, 26 Mar 2024 09:54:40 GMT Exploring Cybersecurity with ZoomEye: A Review of the Premium Lif... zoomeye
Thu, 23 Jan 2025 02:39:06 GMT Secrets Manager UI — can’t use a KMS key from another acc... bugs
Sat, 18 Jan 2025 11:33:34 GMT Zero-Click Account Takeover [Critical bug] bugs
Thu, 23 Jan 2025 18:57:58 GMT GraphQL Voyager — local usage information-security
Sun, 12 Jan 2025 11:00:53 GMT 10 Awesome Bug Bounty Platforms to Earn Money Online bug-bounty-program
Wed, 22 Jan 2025 18:02:12 GMT Bound Destiny bounties
Wed, 15 Jan 2025 06:41:45 GMT Bypassing Razer’s WAF for XSS cross-site-scripting
Wed, 20 Nov 2024 01:32:27 GMT How I was able to take over a Subdomain and got Hall of Fame subdomain-takeover
Mon, 22 Jan 2024 21:50:24 GMT The UK’s new PSTI Act for IoT devices: how it impacts you & how... vulnerability-disclosure
Fri, 13 Sep 2024 20:07:54 GMT Unleashing GitHub Dorks: The Ultimate Hack for Finding Hidden Sec... github-dorking
Wed, 15 Jan 2025 13:05:49 GMT CVE-2024–55471: Analyzing the IDOR Vulnerability in Oqtane Fram... idor
Wed, 16 Oct 2024 17:53:27 GMT Cybersecurity Books for hackers part 2 cyber-sec
Thu, 23 Jan 2025 23:59:59 GMT SOCIAL MEDIA HACKERS FOR HIRE | BEST PLATFORM TO HIRE A PROFESSI... hacking
Sat, 18 Jan 2025 20:44:08 GMT How My Brain Works When Dealing with Bugs? bugs
Fri, 20 Dec 2024 04:22:15 GMT Recon: PaaS, SaaS, and Static Hosting Platforms dorking
Thu, 23 Jan 2025 02:52:34 GMT 5 Steps to Crafting a Reverse Shell Plugin in WordPress [OSCP RC... rce
Fri, 17 Jan 2025 14:48:08 GMT File Management with API calls on Power Automate api-key
Sat, 11 Jan 2025 05:12:20 GMT AI in Cybersecurity: Friend or Foe? cyber-sec
Thu, 23 Jan 2025 20:21:04 GMT The Forbidden ‘Bounce-Back’ Method Top Coaches Are Hiding â... vulnerability
Thu, 23 Jan 2025 16:28:02 GMT A Comprehensive Guide to Penetration Testing: Steps, Tools, and C... vulnerability, penetration-testing, ethical-hacking
Thu, 09 Jan 2025 09:50:54 GMT From Exploit to Payday-Chaining Stored XSS in PDF Upload to Full ... bugcrowd
Mon, 06 Jan 2025 23:26:41 GMT How I Exposed IDOR and Path Traversal Vulnerabilities in a Parkin... idor
Sat, 20 Apr 2024 17:20:58 GMT TryHackMe — Brute Walkthrough | TheHiker log-poisoning
Sat, 11 Jan 2025 08:37:21 GMT Chaining Multiple Vulnerabilities to Achieve RCE in Kerio Control... exploit, rce
Thu, 19 Dec 2024 16:41:24 GMT Subdomain Takeover guides, methodology and exploit POCs subdomain-takeover
Thu, 23 Jan 2025 18:32:10 GMT Biggest innovation in Penetration Testing so far bug-bounty, penetration-testing, ethical-hacking
Sun, 14 Jul 2024 11:56:11 GMT How I Can Get P1 Nasa easily — Dorking web-pentest
Thu, 26 Sep 2024 06:16:59 GMT In-Depth Walkthrough of TryHackMe “TEAM� Room: Subdomain Enum... subdomain-enumeration
Thu, 23 Jan 2025 02:05:43 GMT HOW TO MANAGE SCOPE CREEP WITH A PENTEST MANAGEMENT PLATFORM pentest
Thu, 16 Jan 2025 18:55:15 GMT Injecting Shellcode and bypassing NX with ROP and Pwntools THM -T... remote-code-execution
Mon, 06 Jan 2025 13:19:31 GMT Mastering Python’s Magic Methods: Build a Shodan Search Tool shodan
Tue, 02 Apr 2024 01:31:31 GMT Java Framework Popularity Overview zoomeye
Tue, 21 Jan 2025 16:00:53 GMT XSS Attacks: Stored and Reflected xss-attack
Thu, 23 Jan 2025 13:45:56 GMT “Sentinel SIEM & Honeypot Lab w/ Microsoft Azure� information-security
Tue, 31 Dec 2024 08:02:37 GMT How I Discovered Exposed .env Files on a Subdomain of a Popular ... information-disclosure
Wed, 22 Jan 2025 11:04:01 GMT IDOR (Insecure Direct Object References) Zafiyeti Nedir? idor
Sat, 02 Nov 2024 11:05:09 GMT How I secured Lupin: Leading global pharmaceutical company in Ind... subdomain-takeover
Thu, 23 Jan 2025 23:21:17 GMT How to Remote Your Cheating Spouse’s Snapchat Account Without a... hacking
Wed, 22 Jan 2025 18:21:44 GMT $200K Log4Shell Exploit: The Zero-Day That Paralyzed Big Tech infosec
Tue, 21 Jan 2025 15:39:54 GMT Bug Bounty Insights: 10 Key Findings - ZeroClick Account Takeover... bugbounty-writeup
Sun, 19 Jan 2025 16:20:13 GMT CVE-2024–57767: Critical Server-Side Request Forgery (SSRF) Vu... ssrf
Thu, 23 Jan 2025 09:33:08 GMT Types of VPN infosec
Thu, 23 Jan 2025 08:39:19 GMT 10 reCAPTCHA Alternatives for Google in 2025 web-security
Mon, 13 Jan 2025 21:13:55 GMT Bug Bounty vs VDP: Building Effective Security Programs with Hack... bugcrowd
Mon, 14 Oct 2024 02:30:07 GMT OAuth: A Backdoor in Disguise — a $7500 Study Case cyber-sec
Thu, 23 Jan 2025 21:36:06 GMT Secure Your Blog With WordPress Security Plugins security
Wed, 22 Jan 2025 15:18:15 GMT Vulnlab:XSS xss-attack
Thu, 23 Jan 2025 11:24:22 GMT How a Vulnerability in Cinema Booking Systems Can Block Seats and... bug-bounty-writeup
Sun, 05 Jan 2025 23:52:37 GMT The Smartwatch Heist: When a Gift Comes with Malware and a Side o... exploit
Wed, 15 Jan 2025 20:42:51 GMT How i found RXSS in href Attribute xss-vulnerability
Sun, 19 Jan 2025 05:44:44 GMT [RXSS] on Login/Registration ref Parameter hackerone, bugcrowd
Fri, 17 Jan 2025 07:09:54 GMT How to Bypass Vercel’s 4.5MB Body Size Limit for Serverless Fun... file-upload
Tue, 24 Dec 2024 09:06:37 GMT Discover 92Jeeto: Pakistan’s Premier Online Gaming Platform bounty-program
Thu, 15 Feb 2024 14:36:19 GMT Github Dorking: A Beginner’s Guide to Finding Secrets in Reposi... github-dorking
Thu, 23 Jan 2025 16:39:03 GMT Wireshark for Beginners: Detect and Prevent XSS, SYN Scan, and SQ... xss-attack
Fri, 20 Dec 2024 00:40:52 GMT CSRF On Delete Profile: High Severity(7.1) HackerOne bug-bounty-program
Thu, 07 Nov 2024 05:50:19 GMT Google Dorking in Bug Hunting: Uncovering Hidden Vulnerabilities dorking
Thu, 21 Mar 2024 12:43:13 GMT Vulnerability Disclosure vs Bug Bounty: What’s the difference a... vulnerability-disclosure
Mon, 13 Jan 2025 13:54:57 GMT Config Editor — Android RCE Challenge Writeup rce
Sun, 12 Jan 2025 07:12:02 GMT Fake LDAPNightmware exploit on GitHub spreads infostealer malware exploit
Wed, 22 Jan 2025 15:52:42 GMT CVE-2025–0411 — zero day - Z-lib Mark-of-the-web bypasss cve
Sun, 30 Jun 2024 17:38:55 GMT Exploiting Cache Poisoning via Unkeyed Parameters and Headers in ... vulnerability-disclosure, web-cache-poisoning
Tue, 07 Jan 2025 13:38:56 GMT [Blibli Bug Bounty] RXSS Bypass WAF Cloudflare pada Search URL ... xss-bypass
Tue, 21 Jan 2025 17:20:40 GMT Why Ignoring Bugs Will Ruin Your Product? bugs
Thu, 23 Jan 2025 13:31:19 GMT OSINT (Reconnaissance) section: What is GitDorking ? pentesting, recon
Thu, 23 Jan 2025 13:06:55 GMT Inside of Securing Cloud Ecosystem information-security
Thu, 23 Jan 2025 11:42:13 GMT $600 Vulnerability: My First Bug Hunting Journey bug-bounty-writeup
Tue, 24 Dec 2024 17:25:47 GMT Mastering Google Dorking for Red Teaming google-dork
Fri, 28 Jun 2024 14:51:14 GMT X-Forwarded HTTP header-ləri : Qısa izah log-poisoning
Thu, 23 Jan 2025 19:32:20 GMT Understanding Encryption in Oracle Cloud Infrastructure (OCI) security
Thu, 23 Jan 2025 21:56:31 GMT Java Deserialization Vulnerability, CVE-2015–7501 . Tony the Ti... penetration-testing, information-technology
Tue, 21 Jan 2025 04:59:08 GMT HOW I Hacked “Welcome to Secure Portal� — IDOR + BAC (P... bug-bounty-hunter
Sat, 04 Jan 2025 11:06:03 GMT Katana Dork Scanner google-dork, dorks
Thu, 19 Dec 2024 09:54:08 GMT POC — CVE-2024–9935 — PDF Generator Addon for Eleme... lfi
Thu, 23 Jan 2025 13:44:00 GMT Where does cyber security begin and end? cyber-security-awareness
Tue, 03 Dec 2024 11:18:34 GMT Tricky & Simple EXIF protection Bypass information-disclosure
Sun, 05 Jan 2025 14:53:22 GMT Unsafe Deserialization in PHP: How to Create Your Own Exploit exploit
Wed, 21 Aug 2024 06:39:23 GMT Advanced Web Cache Poisoning Techniques (Part 2): Tools, Methods,... web-cache-poisoning
Thu, 26 Dec 2024 18:31:34 GMT Find Secrets in Hidden Directories Using Fuzzing � bounty-program
Wed, 04 Dec 2024 12:22:32 GMT Looking for gaps in GIT information information-disclosure
Wed, 22 Jan 2025 11:40:11 GMT Confidential CTF Tryhackme cybersecurity-tools
Tue, 21 Jan 2025 09:30:55 GMT All You Need To Know About WordPress Security Plugins web-security
Sat, 04 Jan 2025 17:20:23 GMT GitHub dork github-dorking
Mon, 16 Sep 2024 11:24:15 GMT Web Application Vulnerabilities Overview bug-bounty-hunting
Mon, 30 Dec 2024 13:41:04 GMT Bug Bounty Insights: 10 Key Findings - Email Verification Flaws -... security-research
Thu, 23 Jan 2025 07:02:42 GMT Top Cybersecurity Search Engines You Should Know shodan
Sun, 08 Dec 2024 12:09:08 GMT What is a Bug Bounty Program? How It Works bug-bounty-program
Mon, 06 Jan 2025 17:39:46 GMT Understanding API Keys: Your Gateway to the Digital World api-key
Thu, 23 Jan 2025 22:09:31 GMT Useful Sandboxes for Windows Malware Developers pentesting
Sun, 22 Dec 2024 19:05:38 GMT Hack Misconfigured Endpoints Easily | Part 2 google-dork
Mon, 20 Jan 2025 17:03:06 GMT Lo-Fi-THM-Walkthrough-By-Reju-Kole lfi
Fri, 01 Nov 2024 11:29:10 GMT Mastering Subfinder for Bug Bounty: Ultimate Guide to Subdomain E... subdomain-enumeration
Thu, 29 Jun 2023 15:48:47 GMT HOGWARTS: BELLATRIX (walkthrough) log-poisoning
Mon, 13 Jan 2025 15:33:48 GMT Server-Side Request Forgery (SSRF) ssrf
Fri, 31 May 2024 13:29:16 GMT Map of the worlds best URLs 2025 log-poisoning
Mon, 06 Jan 2025 04:58:45 GMT Day 28 of 30 Day — 30 Vulnerabilities | DOM-based XSS xss-bypass
Thu, 23 Jan 2025 15:13:25 GMT 5 Essential Reasons Video Game Studios Should Perform Penetration... penetration-testing
Mon, 20 Jan 2025 06:04:46 GMT Insecure Direct Object Reference (iDOR) via Programs HackerOne hackerone
Mon, 06 Jan 2025 05:35:15 GMT How I Found PII at NASA Using Google Dorking bug-bounty-hunter, bug-bounty-program
Wed, 22 Jan 2025 03:02:51 GMT WhatsApp Jadi Target Hacker Rusia! Ini Cara Lindungi Akun WhatsAp... application-security
Wed, 15 Jan 2025 10:48:13 GMT Microsoft January 2025 Patch Tuesday: 159 Vulnerabilities Fixed, ... rce
Sat, 18 Jan 2025 11:49:41 GMT Top 10 Ways To Improve Your Node.js Application’s Security application-security
Mon, 20 Jan 2025 05:56:01 GMT Day 6: Create a File Upload API in Node.js Without Multer file-upload
Sun, 12 Jan 2025 20:56:57 GMT Exploring DVWA : A Walkthrough of The File Inclusion Challenge (... local-file-inclusion
Fri, 27 Dec 2024 15:25:05 GMT Best Vulnerability Management Tools: Comprehensive Guide vulnerability-scanning
Sat, 18 Jan 2025 00:37:48 GMT Python Cheatsheet for Bug Bounty Hunters: Automating Vulnerabilit... cybersecurity-tools
Thu, 23 Jan 2025 11:46:32 GMT How to Reset Windows 10 Password If You Forgot It (Using Utilman.... pentesting, vapt
Mon, 20 Jan 2025 18:13:26 GMT Google Dorking: Unlocking Hidden Insights google-dorking
Mon, 13 Jan 2025 15:33:48 GMT Flying to sit on the wall google-dorking
Wed, 22 Jan 2025 05:39:45 GMT Mirai Variant Murdoc Botnet Exploits AVTECH IP Cameras and Huawei... exploit
Sat, 11 Jan 2025 14:03:19 GMT Top XSS Payloads to Bypass Filters xss-vulnerability, xss-bypass
Thu, 02 Jan 2025 20:13:27 GMT Bypassing WAFs: A Unique XSS Exploit Journey and Insights xss-bypass
Fri, 03 Jan 2025 23:24:20 GMT How I Found an Open AWS S3 Bucket and Used It to Take Over a Subd... subdomain-takeover
Thu, 23 Jan 2025 20:14:14 GMT Daily Update on Cybersecurity Threats and Potential Remediation information-security
Tue, 14 Jan 2025 15:13:24 GMT TCS HackQuest Season 9 Is Here | All About This Competition bug-bounty-hunter
Thu, 26 Dec 2024 15:23:03 GMT GitHub Dorking List: The Ultimate Guide to Exploring and Securing... dorking, github-dorking
Sun, 15 Dec 2024 18:11:20 GMT Instant — HackTheBox Writeup local-file-inclusion
Thu, 12 Dec 2024 05:10:05 GMT XXE Injection — TryHackMe ssrf
Thu, 23 Jan 2025 18:52:26 GMT The RFID Badge Capture: A Penetration Tester’s Perspective on P... penetration-testing
Fri, 27 Dec 2024 01:38:30 GMT Security Research and Reverse Engineering on iOS security-research
Sat, 16 Nov 2024 14:45:59 GMT File Inclusion vulnerability local-file-inclusion, file-inclusion
Mon, 26 Feb 2024 15:25:33 GMT OT Hunt: Finding ICS/OT with ZoomEye zoomeye
Wed, 23 Oct 2024 15:33:49 GMT Vehicle Investigations: Tracing the Vehicle Using Plate Numbers w... cyber-sec
Tue, 07 Jan 2025 14:03:58 GMT Advanced Tools and Techniques for Privilege Escalation bug-bounty-hunter
Thu, 16 Jan 2025 07:37:30 GMT Python-Based Malware Powers RansomHub Ransomware to Exploit Netwo... exploit
Thu, 16 Jan 2025 20:08:41 GMT Exploring CORS Misconfiguration Vulnerabilities in Modern Applica... pentest
Thu, 16 Jan 2025 15:29:06 GMT Using Go Channels to Retrieve Images and PDFs from AWS S3 Storage... file-upload
Thu, 23 Jan 2025 07:45:34 GMT Escalate P3 SSRF TO P1 bug-bounty-tips, bug-bounty-writeup, bug-bounty-hunter
Mon, 20 Jan 2025 15:55:51 GMT HTML Injection At Email Via Programs HackerOne hackerone, bugcrowd
Tue, 26 Nov 2024 04:28:26 GMT Advance Searching Using Google Dorking dorking
Sun, 19 Jan 2025 19:25:23 GMT Les recherches googles Dorks dorks
Sat, 04 Jan 2025 13:28:52 GMT Basic SSRF (Server-Side Request Forgery) Attacks Against Local Se... ssrf
Thu, 23 Jan 2025 09:07:51 GMT Tutorial Nginx #3: Konfigurasi Nginx untuk Meningkatkan Keamanan ... web-security
Tue, 21 Jan 2025 06:42:24 GMT Comprehensive XSS Learning Roadmap cross-site-scripting
Sun, 15 Dec 2024 11:13:48 GMT SQL Injection 2025 ? bug-bounty-program
Wed, 15 Jan 2025 08:23:32 GMT Getting Started With Malware Development security-research
Thu, 23 Jan 2025 13:27:19 GMT How to Have a Screen Like Hackers in the Movies? penetration-testing, ethical-hacking
Thu, 23 Jan 2025 17:30:47 GMT Are You Safe from the Digital Yodha? Here’s How to Protect Your... cyber-security-awareness
Fri, 27 Dec 2024 07:42:14 GMT Attacker Secrets | Hacking Dashboards Easily | Part1 google-dork
Wed, 06 Nov 2024 16:56:47 GMT GrabThePhisher Write-up cyber-sec
Sat, 21 Dec 2024 09:15:40 GMT Dorks Sandal: Kenyamanan dan Gaya dalam Satu Langkah dorks
Wed, 08 Jan 2025 08:33:23 GMT best hacking apps programs for android cybersecurity-tools
Mon, 30 Dec 2024 15:06:36 GMT How to Find Origin IP of any Website Behind a WAF recon
Tue, 21 Jan 2025 06:00:48 GMT Meson Expedition — Enroll in Community Bounty Program bounty-program
Thu, 23 Jan 2025 17:18:25 GMT How To Convert Your Android Device In A Recon Device ? bug-bounty, bug-bounty-tips
Sun, 19 Jan 2025 20:23:00 GMT “Oops, We Broke the Internet… Before the Internet!â€� —â€... bugs
Sat, 11 Jan 2025 06:42:29 GMT LFI Bug can help you make $500 and more.(Noob-Advance) lfi
Mon, 20 Jan 2025 13:19:29 GMT Best Practices for Payment Reconciliation in High-Transaction Bus... recon
Wed, 15 Jan 2025 14:25:30 GMT Stored XSS Found in Query Parameters of dhtmlxGrid.js on NASA.gov... cross-site-scripting, bugcrowd
Sat, 28 Dec 2024 11:21:43 GMT How I was able to delete MFA of any user without Authentication bug-bounty-hunter
Wed, 01 Jan 2025 14:31:13 GMT The Ultimate Guide to Reconnaissance Tools for Bug Bounty Hunters bug-bounty-hunting
Thu, 26 Dec 2024 03:21:58 GMT Scanning IP/CIDR Ranges for Open Ports Using Shodan and Python shodan
Thu, 23 Jan 2025 11:42:50 GMT What Should You Know About Disappointment? vulnerability
Thu, 23 Jan 2025 21:27:51 GMT Understanding Vault Panda and Volt Typhoon: A Cybersecurity Persp... cyber-security-awareness
Sun, 15 Sep 2024 10:46:35 GMT Automating Subdomain Enumeration to Discover Critical Vulnerabili... subdomain-enumeration
Wed, 15 Jan 2025 16:42:33 GMT Vulnerability Assessment Services: The Key to Strengthening Your ... vapt
Thu, 09 Jan 2025 18:59:32 GMT Prototype Pollution: Exploiting DOM XSS + Solve portswigger lab xss-vulnerability
Thu, 23 Jan 2025 15:06:50 GMT Cyber Briefing: 2025.01.23 infosec
Tue, 21 Jan 2025 11:36:04 GMT How to Use Proxies with FoxyProxy: A Comprehensive Guide web-security
Wed, 27 Nov 2024 11:22:23 GMT UNESCO Hall of Fame Listesine Nasıl Girdim? bug-bounty-program
Mon, 13 Jan 2025 03:36:37 GMT Blackview Tab 18 Comprehensive Review for IT Professionals and Cy... cybersecurity-tools
Thu, 16 Jan 2025 07:51:21 GMT Understanding File Upload Vulnerabilities: A Deep Dive file-upload
Wed, 22 Jan 2025 14:00:14 GMT Top 15 Dark Web Monitoring Tools: Insights, Pros, and Cons security-research
Thu, 23 Jan 2025 23:32:29 GMT What kind of bug are you? bugs
Wed, 22 Jan 2025 16:53:05 GMT Shuhari Researchers Challenge — 3 xss-attack, rce, file-upload
Tue, 24 Dec 2024 11:36:05 GMT Bug Bounty Journey — Valid Report 1 vdp
Fri, 15 Nov 2024 18:28:00 GMT Path Traversal Vulnerabilities: Exploitation Techniques and Defen... local-file-inclusion
Mon, 23 Dec 2024 06:44:26 GMT Google Dorks to Find Bug Bounty Programs dorks
Sun, 12 Jan 2025 21:02:54 GMT Injection Vulnerabilities (1998–2015) xss-vulnerability
Sun, 24 Nov 2024 12:43:36 GMT DVWA: File Inclusion file-inclusion
Sat, 18 Jan 2025 23:17:24 GMT What is Cross-Site Scripting (XSS)⚠�? xss-attack, cross-site-scripting
Fri, 17 Jan 2025 17:01:05 GMT Hacker Metodolojisi google-dorking
Thu, 31 Oct 2024 03:20:52 GMT Understanding Local File Inclusion (LFI) Testing with Python local-file-inclusion
Sun, 12 Jan 2025 21:32:34 GMT Exploring DVWA : A Walkthrough of The File Upload Challenge (Par... file-upload
Sun, 08 Dec 2024 13:37:06 GMT CVE-2024–12209: WP Umbrella Eklentisinde Uzaktan Dosya Çalış... file-inclusion
Tue, 17 Dec 2024 03:11:13 GMT OSINT AND DORKING TOOLS dorks
Fri, 13 Dec 2024 17:46:27 GMT A Beginner’s Guide to Testing for Server-Side Request Forgery (... ssrf
Sun, 19 Jan 2025 20:36:05 GMT How to Find Open Root Shells Online Using Censys: A Global Securi... censys
Wed, 15 Jan 2025 15:51:11 GMT Web Cache Poisoning: Turning Speed into a Security Nightmare web-cache-poisoning
Fri, 27 Dec 2024 11:50:37 GMT How I Chained a File Upload Vulnerability with IDOR to Exploit XS... idor
Sun, 11 Aug 2024 18:53:45 GMT Web for Pentester-File Include Çözümleri file-inclusion
Tue, 31 Dec 2024 22:12:13 GMT Burlando segurança contra XSS (Cross Site Scripting) — Par... bounty-program
Tue, 31 Dec 2024 18:36:45 GMT Unleashing My Recon Weapon: A Custom Bash Tool for Bug Bounty recon
Thu, 23 Jan 2025 16:05:17 GMT Writing Feels Like Suffering vulnerability
Tue, 21 Jan 2025 10:31:52 GMT Easy MFA Setup bypass Lead to unauthorized access to PII data Of ... bugbounty-writeup
Mon, 20 Jan 2025 08:17:00 GMT TryHackMe tomghost CTF WriteUp pentest
Wed, 11 Dec 2024 09:32:21 GMT 150+ Directory Submission Sites for SEO in 2025 directory-listing
Fri, 15 Dec 2023 09:08:18 GMT CENSYS censys
Thu, 23 Jan 2025 12:52:10 GMT How To Become a Cybersecurity Expert Without Formal Education ethical-hacking
Mon, 16 Sep 2024 16:59:52 GMT A VDP szerepe a NIS 2 megfelelésben: Amit a sérülékenység kÃ... vdp
Sat, 09 Sep 2023 09:26:12 GMT GitHub Dorking github-dorking
Thu, 23 Jan 2025 18:59:17 GMT Pdf upload in Angular using DomSanitizer through api. file-upload
Thu, 23 Jan 2025 18:55:08 GMT Oscar Nomination 2025 information-technology
Mon, 06 Jan 2025 15:18:00 GMT Chasing Bugs, Finding Purpose: My Journey to the First Bounty! information-disclosure, security-research
Sat, 16 Nov 2024 08:59:28 GMT Heroku Subdomain Takeover subdomain-takeover
Sat, 18 Jan 2025 15:31:49 GMT Zero day RCE — CVE-2025–21298 cve
Wed, 22 Jan 2025 00:10:47 GMT Implementing CAPTCHA To Thwart Brute Force Attacks web-security
Thu, 23 Jan 2025 11:29:44 GMT Ethical Hacking: How White Hats Are Winning the War ethical-hacking
Sun, 20 Oct 2024 06:34:58 GMT How I Found My First P1 Bug ?? vdp
Wed, 27 Nov 2024 21:36:17 GMT Continuing Momentum in the World of Automated Vulnerability Discl... vulnerability-disclosure
Tue, 21 Jan 2025 12:41:02 GMT *Fuzzing a C-Based PDF Parser with AFL++ security-research
Fri, 03 Jan 2025 05:52:15 GMT Welcome 2025 with Code! Join Starknet Development Activities and ... bounties
Wed, 22 Jan 2025 15:06:16 GMT Cyber Briefing: 2025.01.22 infosec
Wed, 22 Jan 2025 17:21:55 GMT How Reachability Analysis can help with open source vulnerabiliti... application-security
Sun, 22 Dec 2024 12:24:17 GMT Day 24 of 30 Days — 30 Vulnerabilities | Web Cache Poisoni... web-cache-poisoning
Sat, 07 Sep 2024 07:42:54 GMT The Easiest Way to Find CVEs at the Moment? GitHub Dorks! github-dorking
Mon, 06 Jan 2025 19:13:43 GMT Hidden Dangers of XSS Vulnerabilities — Real Case xss-bypass
Sun, 24 Nov 2024 21:53:16 GMT Bug Bounty Success in 2025: A Comprehensive Guide to Finding Your... bug-bounty-hunting
Sun, 19 Jan 2025 16:02:01 GMT How I Found a SQL Injection Vulnerability in website pentest
Sat, 18 Jan 2025 18:27:44 GMT xss0rRecon: The Best Recon Tool for Bug Bounty Hunters ��♂... recon
Tue, 21 Jan 2025 03:16:31 GMT CROSS-SITE SCRIPTING web-security
Thu, 09 Jan 2025 08:36:54 GMT Finding subdomains using goole dorking. dorking
Thu, 23 Jan 2025 13:30:48 GMT Why are penetration testing and vulnerability assessments essenti... cyber-security-awareness
Wed, 15 Jan 2025 20:44:40 GMT Introducing NS Record Exploiter: A Free, Open-Source Toolkit for ... cybersecurity-tools
Wed, 18 Dec 2024 19:27:33 GMT Siber Güvenlik: Dijital Dünyanın Kalkanı cyber-sec
Wed, 22 Jan 2025 17:31:25 GMT Easy Hacking with Google Dorking — Finding NASA High P2 Vul... bug-bounty-tips, bugcrowd, bug-bounty-writeup
Thu, 02 Jan 2025 05:51:31 GMT A Recon Tool That Uses AI to Predict Subdomains recon
Thu, 23 Jan 2025 19:54:11 GMT Five things scientists can do to fight the rise of fascism. information-technology
Mon, 13 Jan 2025 07:51:09 GMT Top 10 Cybersecurity Tools In 2025 cybersecurity-tools
Sat, 28 Sep 2024 05:49:35 GMT How to Find All Subdomains of a Website (A Step-by-Step Guide) subdomain-enumeration
Wed, 22 Jan 2025 13:14:42 GMT My Bug Bounty Journey: A Middle-Class Kid’s Quest for Free and ... web-security, bug-bounty-writeup
Tue, 07 Jan 2025 23:47:19 GMT OSINT in Crime Analysis: 4 Real Cases Where OSINTers Made the Imp... bounty-program
Mon, 02 Dec 2024 20:19:13 GMT Master Advanced Subdomain Enumeration with AlterX: A Bug Bounty H... subdomain-enumeration
Thu, 23 Jan 2025 09:12:23 GMT Security Risks of Medium Paywall Bypass Methods. bug-bounty-tips, bug-bounty-writeup
Tue, 21 Jan 2025 18:19:28 GMT My First Medium Post Alert! Let’s Talk Vulnerabilities… and ... application-security
Tue, 14 Jan 2025 00:36:39 GMT Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backd... remote-code-execution
Mon, 23 Dec 2024 12:01:45 GMT WBT para los titulares de WhiteBIT Nova bounty-program
Tue, 21 Jan 2025 03:01:13 GMT Python Cheatsheet for Web Application Pentesting: Uncovering Vuln... vulnerability-scanning
Mon, 23 Dec 2024 11:41:05 GMT Secure Your Project by Fixing Vulnerabilities in Transitive Depen... vulnerability-scanning
Thu, 23 Jan 2025 12:31:25 GMT Insecure Deserialization Vulnerability: From Theory to Practice vulnerability, vapt
Thu, 23 Jan 2025 18:10:44 GMT TryHackMe | SQL Injection Walkthrough pentesting
Mon, 06 Jan 2025 13:00:24 GMT Introducing DorkHub: A Comprehensive Collection of Google Dorks f... dorking, dorks
Thu, 26 Dec 2024 05:43:42 GMT Web2 Uncommon Title Endpoints dorks, shodan
Thu, 23 Jan 2025 23:27:10 GMT Essential Tools and Technologies Every SOC Analyst Must Master to... bug-bounty, hacking
Sun, 19 Jan 2025 07:03:34 GMT Finding my First SQL Injection On HackerOne hackerone
Thu, 03 Oct 2024 13:07:03 GMT Subdomain Enumeration & Takeovers  (Part-2: Active Enumeration) subdomain-enumeration
Thu, 26 Dec 2024 16:14:12 GMT A Comprehensive Guide for Pentesting Grafana bug-bounty-hunting
Fri, 11 Oct 2024 18:37:37 GMT Cosmote’s Neo Service Domain Takeover Vulnerability Disclosure subdomain-takeover
Mon, 09 Dec 2024 08:23:23 GMT Ports and Protocols — A Quick Guide You Need to Know! cyber-sec
Thu, 23 Jan 2025 22:56:42 GMT Watch Out for Fake Homebrew Websites: Hackers Are Targeting Mac a... hacking
Thu, 23 Jan 2025 15:06:46 GMT Authentication Under Attack: Privilege Escalation in a CIRT Techn... information-security
Thu, 23 Jan 2025 04:19:03 GMT Advanced Threat Detection: Exploitation Tactics from a CIRT Techn... information-security
Fri, 10 Jan 2025 10:18:23 GMT Why VAPT Analysis is Crucial for Companies of All Sizes: A Call f... vapt
Thu, 23 Jan 2025 09:50:35 GMT Get sonyliv free subscriptions pentesting, bugbounty-writeup
Fri, 20 Dec 2024 08:50:47 GMT System Hacking -Apache Flink ~ CyberExam lfi
Fri, 06 Dec 2024 07:10:48 GMT 109 Best Directory Submission Sites List in 2025 directory-listing
Sun, 29 Dec 2024 10:59:35 GMT Best XSS payloads for bypassing Cloudflare cyber-sec
Thu, 23 Jan 2025 02:40:38 GMT Understanding Decoy Apps: A Guide for Parents pentesting
Tue, 21 Jan 2025 04:21:16 GMT These Hackers Earn 7 figure income hackerone
Tue, 31 Dec 2024 09:28:54 GMT My First Year in Bug Bounty Hunting bug-bounty-hunter
Fri, 17 Jan 2025 20:12:16 GMT Lo-Fi-THM-Walkthrough local-file-inclusion
Thu, 16 Jan 2025 22:59:07 GMT Optimize E-Commerce Deliveries and Cut Customer Support Costs wit... api-key
Wed, 22 Jan 2025 15:46:26 GMT The Biggest Bug Bounty Payouts of All Time and What We Learned bug-bounty-tips
Thu, 23 Jan 2025 16:53:20 GMT Purple Teaming: Turning Frenemies into Allies cyber-security-awareness
Thu, 19 Dec 2024 04:33:35 GMT Enhancing Application Security: Scanning and Remediating Third-Pa... vulnerability-scanning
Wed, 22 Jan 2025 07:57:20 GMT Malicious Bots Over the Internet: What They Want and How to Fight... application-security
Sat, 18 Jan 2025 07:08:30 GMT This 200 Dorks cheats can change your life. google-dork
Tue, 14 Jan 2025 22:54:06 GMT Server Side Request Forgery (SSRF) ssrf
Fri, 17 Jan 2025 14:34:24 GMT XSS: Bypass CloudFront WAF cross-site-scripting
Wed, 15 Jan 2025 12:07:08 GMT Analysis I got from other TCS HackQuest Season’s to Prepare for... bug-bounty-hunter
Mon, 16 Dec 2024 07:37:49 GMT Unmasking a Privacy Oversight: A Deep Dive into Persistent User D... information-disclosure
Mon, 06 Jan 2025 04:02:13 GMT Critical Cleo File Transfer Vulnerability Exploited — Mitig... exploit
Mon, 20 Jan 2025 00:40:37 GMT SecureSTC: My Cybersecurity Journey cybersecurity-tools
Fri, 10 Nov 2023 03:38:01 GMT Apache error.log advanced Log poisoning RCE log-poisoning
Tue, 14 Jan 2025 22:43:19 GMT Ignored Vulnerability? The story of XSS discovery on Rozee.pk xss-vulnerability
Tue, 06 Feb 2024 17:01:45 GMT Social Cyber Lab: Vulnerability Management and Bug Bounties vulnerability-disclosure
Tue, 21 Jan 2025 09:29:16 GMT How to Upload Files on TeraBox: A Step-by-Step Guide file-upload
Mon, 20 Jan 2025 10:13:04 GMT CVE-2024–45231 | Django — Information Disclosure Vulnera... cve
Tue, 07 Jan 2025 19:12:22 GMT Humorous XSS Vulnerabilities in a Movie Website xss-vulnerability
Thu, 23 Jan 2025 07:36:58 GMT EC-Council CCISO exam costs: What You Need to Know information-security
Thu, 14 Nov 2024 09:12:27 GMT Basics of Stored XSS and Demo bug-bounty-hunting
Thu, 23 Jan 2025 23:25:51 GMT Empathy and kindness go a long way. vulnerability
Sun, 01 Dec 2024 08:49:26 GMT From Minor Bug to Major DoS: My Journey with Web Cache Poisoning web-cache-poisoning
Sun, 13 Oct 2024 16:03:13 GMT Mastering Web Security with PortSwigger Labs: A Complete Guide fo... bug-bounty-hunting
Sat, 18 Jan 2025 15:19:56 GMT Unlocking the Doors: How I Took Over Accounts with a Single Flaw! bugs
Sat, 18 Jan 2025 05:01:15 GMT How to Prevent Cross-Site Scripting: Best Practices for Developer... cross-site-scripting
Fri, 22 Nov 2024 08:35:18 GMT File path traversal, validation of file extension with null byte ... lfi
Thu, 23 Jan 2025 15:30:14 GMT Hashing web-security
Sun, 22 Dec 2024 05:19:42 GMT Advanced Shodan Dorking | Part8 dorks, shodan
Wed, 22 Jan 2025 14:39:31 GMT Security Bulletin CVE-2025–0411 cve
Sun, 22 Dec 2024 20:43:03 GMT Creating API Key Authentication to secure your APIs in Node.js api-key
Tue, 24 Dec 2024 04:27:59 GMT Advanced Google Dorking | Part17 google-dork
Mon, 20 Jan 2025 01:34:49 GMT How I Turned a $10 RFI Bug into a $300 RCE Bounty (Step-by-Step G... rce
Mon, 13 Jan 2025 23:19:15 GMT RCE in Microsoft SQL Server: Exploring Misconfigurations and Gain... rce
Thu, 21 Dec 2023 08:32:29 GMT Determine Target OS Through Passive Footprinting censys
Sat, 18 Jan 2025 14:15:13 GMT Master Bug Bounty Recon: Using GoWitness and Eyeballer to Uncover... recon
Wed, 18 Dec 2024 03:39:55 GMT Easiest P1 $$$$$! bug-bounty-hunter, bug-bounty-program
Tue, 19 Nov 2024 18:10:58 GMT HOW I FOUND A BUG IN NASA vdp
Fri, 05 Jul 2024 14:49:02 GMT How I Found Critical Bugs :: SQL Injection → Compromised 10+ G... vdp
Sun, 12 Jan 2025 13:02:32 GMT IDOR & UUIDs to leak PII idor
Tue, 24 Dec 2024 18:45:58 GMT Identifying and Exploiting a Reflected XSS Vulnerability xss-bypass
Wed, 22 Jan 2025 18:58:33 GMT The Sticker Shop TryHackMe Writeup xss-attack
Fri, 06 Sep 2024 15:36:42 GMT NIS 2 irányelv — Mit kell tudnia a magyar cégeknek? vdp, vulnerability-disclosure
Mon, 30 Dec 2024 21:44:55 GMT Cybr Academy: Exploiting Lambda SSRF to Access S3 Buckets — wal... ssrf
Sat, 11 Jan 2025 09:22:19 GMT Exploring New Scenarios of XSS Attacks and Their Potential Danger... xss-vulnerability
Thu, 31 Oct 2024 17:27:08 GMT CompTIA Security + 701 1.4 Digital Signatures & Blockchains cyber-sec
Tue, 13 Aug 2024 15:14:05 GMT How I Discovered a Directory Listing Vulnerability on a NASA Subd... vulnerability-disclosure
Sun, 15 Dec 2024 07:01:31 GMT ⚡� Found a security vulnerability in any site? vulnerability-scanning
Fri, 03 Jan 2025 12:39:58 GMT What is a Hacker? bounty-program
Sat, 18 Jan 2025 08:02:26 GMT AI-Powered Recon: Unearthing PII from Non-English Files bugbounty-writeup
Fri, 03 Jan 2025 08:16:51 GMT Electronic Keys: Elevating Data Security to New Heights security-research
Sat, 04 Jan 2025 15:47:40 GMT Generating and Searching Favicon Hashes for Clearweb and Darkweb ... shodan
Fri, 10 Jan 2025 17:31:05 GMT Using Google Dorks for Brand Protection google-dork
Sun, 06 Oct 2024 13:31:51 GMT 4o4 not found* == bounty?! bug-bounty-hunting, subdomain-takeover
Wed, 05 Jun 2024 07:43:13 GMT Leveraging Censys for Effective Pentesting censys
Sun, 05 Jan 2025 05:51:52 GMT Dorking Tools for OSINT and Cyber Threat Intelligence (CTI) Work dorking
Fri, 13 Dec 2024 02:49:02 GMT bWAPP Containerized Docker Vulnerability Scan with Nessus Essenti... vulnerability-disclosure
Fri, 17 Jan 2025 13:30:15 GMT Remote Code Execution (RCE) via Telerik Dialog Handler Exploit rce
Tue, 07 Jan 2025 23:18:59 GMT Find the Best Local Business Listings with Detailed Directory â... directory-listing
Sat, 14 Dec 2024 13:44:03 GMT Git Information Leak: How to Exploit an Exposed .git Repository ... directory-listing
Thu, 23 Jan 2025 20:38:22 GMT Affordable Torrenting VPNs with WireGuard: Speed and Security security
Mon, 20 Jan 2025 07:58:45 GMT Securing Web Applications: Part 4 – Testing and Hardening xss-attack
Wed, 15 Jan 2025 12:35:47 GMT A Thorough Exploration of Server-Side Template Injection (SSTI) E... vapt
Mon, 01 Apr 2024 05:56:59 GMT Django vs. Flask: Who Has More Users? zoomeye
Sat, 04 Jan 2025 05:20:10 GMT Flying Sitting on the wall google-dorking
Mon, 21 Nov 2022 22:42:17 GMT Explorando XSS no lugar do meu nome. web-pentest
Fri, 10 Jan 2025 06:36:13 GMT PortSwigger Lab Write-up: Information Disclosure Vulnerabilities information-disclosure
Mon, 20 Jan 2025 12:36:18 GMT 250 Directory Submission Sites List in 2025: Boost Your Websiteâ€... directory-listing