Skip to content

rix4uni/medium-writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

46,073 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Time Title Feed IsNew IsToday
Wed, 06 May 2026 11:24:05 GMT SafeLens — CCTV & Security Systems WordPress Theme security, information-security, cyber-security-awareness Yes Yes
Wed, 06 May 2026 11:33:37 GMT 4. Patches: The Infinite Race for Resilience vulnerability, cybersecurity Yes Yes
Wed, 06 May 2026 11:07:34 GMT What is Fuzzing? How Hackers Discover Hidden Parameters. infosec, ethical-hacking, cyber-security-awareness Yes Yes
Wed, 06 May 2026 11:30:36 GMT The Rise of AI Cyber Attacks: How Criminals Deploy Claude Step-by... cybersecurity Yes Yes
Wed, 06 May 2026 12:04:51 GMT Be different cybersecurity Yes Yes
Wed, 06 May 2026 11:14:29 GMT My Journey to Passing the CKS: Certified Kubernetes Security Spec... security Yes Yes
Wed, 06 May 2026 10:58:32 GMT Digital Forensics in Kenya: cyber-security-awareness Yes Yes
Wed, 06 May 2026 11:11:30 GMT Claude Security Enters Public Beta: Automated Vulnerability Scann... security Yes Yes
Wed, 06 May 2026 11:19:19 GMT Someone Hacked Grok’s Wallet by Asking Grok to Do It. hacking Yes Yes
Wed, 06 May 2026 11:30:23 GMT AI Driven Security Operations: Transforming Modern Threat Managem... security Yes Yes
Wed, 06 May 2026 11:37:06 GMT The World Runs on Sand information-technology Yes Yes
Wed, 06 May 2026 12:03:40 GMT Defensive Security Intro (THM) Tryhackme Walkthrough cybersecurity Yes Yes
Wed, 06 May 2026 11:22:52 GMT Network-Level Vulnerabilities in Multi-Agent AI Systems: What Mic... vulnerability Yes Yes
Wed, 06 May 2026 11:51:20 GMT DeFi Doesn’t Remove Trust It Engineers cybersecurity Yes Yes
Wed, 06 May 2026 11:51:15 GMT Is Cyber Security Certification Worth the Cost in India? cybersecurity Yes Yes
Wed, 06 May 2026 11:45:49 GMT I call BS on Moniepoint CEO’s latest cybersecurity Yes Yes
Wed, 06 May 2026 11:30:53 GMT How Local Business Directory Listing Helps Attract Local Customer... directory-listing Yes Yes
Wed, 06 May 2026 11:38:03 GMT AI Powered Digital Marketing Services Auckland | Local Expert Ag... information-technology Yes Yes
Wed, 06 May 2026 11:27:15 GMT Cybersecurity & AI: The Future of Digital Protection is Already H... security, information-technology Yes Yes
Wed, 06 May 2026 11:27:39 GMT Success in eCommerce Has Less to Do With Products and More to Do... information-technology Yes Yes
Wed, 06 May 2026 10:59:05 GMT Master Key Systems in Dubai — How They Work and Why Every Build... security Yes Yes
Wed, 06 May 2026 11:06:41 GMT PestFix — Pest Control WordPress Theme bug-bounty Yes Yes
Wed, 06 May 2026 11:41:05 GMT How Hackers Map Your Entire Network in 15 Minutes. A Step-by-Step... cybersecurity, penetration-testing, hacking, information-security Yes Yes
Wed, 06 May 2026 11:31:01 GMT Most Passwords Are One Breach Away From Disaster (And How to Fix ... cyber-security-awareness Yes Yes
Wed, 06 May 2026 11:58:07 GMT Information Technology information-technology Yes Yes
Wed, 06 May 2026 11:03:21 GMT Deep Dive: Burp Suite infosec, ethical-hacking, cyber-security-awareness Yes Yes
Wed, 06 May 2026 11:31:01 GMT The Server Was Quiet… Until I Checked Outbound Connections cybersecurity Yes Yes
Wed, 06 May 2026 12:08:58 GMT I Cut Incident Triage Time by 70% Using These 25 Free AI Prompts ... cybersecurity Yes Yes
Wed, 06 May 2026 11:36:01 GMT Google Dorking penetration-testing, hacking, google-dorking, dorking Yes Yes
Wed, 06 May 2026 07:01:35 GMT IDOR (Insecure Direct Object Reference): Celah Kecil dengan Dampa... bug-bounty, web-security Yes
Wed, 06 May 2026 10:32:36 GMT The End of Diplomacy? U.S.-Iran Attacks and the Hormuz Threat security Yes
Wed, 06 May 2026 07:04:36 GMT Best Cyber Security Training Center Near Batra Hospital — Cours... ethical-hacking Yes
Wed, 06 May 2026 06:29:13 GMT CVE-2026–31431 — Copy Fail: Linux Privilege Escalation via Ke... cve Yes
Wed, 06 May 2026 07:34:38 GMT Can I Ever Be Like a Lighthouse? vulnerability Yes
Wed, 06 May 2026 04:31:07 GMT WAF Bypass Firewalls Ko Kaise Todein! Filters Se Aage Niklo! bug-bounty, penetration-testing, infosec, web-security Yes
Wed, 06 May 2026 05:02:54 GMT SendGrid Recon & Hidden Infrastructure Hunting — Real Bug Boun... bug-bounty Yes
Wed, 06 May 2026 08:30:47 GMT Ethical Hacking ethical-hacking Yes
Wed, 06 May 2026 06:52:24 GMT From DXE to Ring 0: Bypassing EDR/XDR through Stealth Kernel Manu... hacking Yes
Wed, 06 May 2026 01:23:03 GMT Insecure Service — Mobile Apps Security Static Analysis Part VI cyber-security-awareness Yes
Wed, 06 May 2026 09:42:04 GMT Best Institute for Ethical Hacking Course in Delhi with Certifica... hacking, ethical-hacking Yes
Wed, 06 May 2026 00:01:01 GMT Guía Definitiva GraphQL para Bug Bounty: Vulnerabilidades y Expl... bug-bounty Yes
Wed, 06 May 2026 07:12:19 GMT Indonesia di Persimpangan Informasi : Antara Kritik, Hoaks, dan M... information-technology Yes
Wed, 06 May 2026 02:56:12 GMT The Security Landscape Is Changing Faster Than Most Organizations... information-security Yes
Wed, 06 May 2026 08:31:13 GMT OpenAI lance un bug bounty pour sécuriser GPT-5.5 bug-bounty Yes
Wed, 06 May 2026 05:54:24 GMT HTB Broken Authentication — Skill Assessment Writeup penetration-testing, web-security, ethical-hacking Yes
Wed, 06 May 2026 10:01:38 GMT Best VAPT Service Provider in India | CERT-In Empanelled | ISO:... vulnerability, vapt Yes
Wed, 06 May 2026 01:53:55 GMT The MFA Advice You Got in 2020 Is Now the Reason You’ll Get Bre... information-security Yes
Wed, 06 May 2026 05:45:40 GMT Urgensi Keamanan Berbasis Identitas: Mengatasi Kerentanan Autenti... information-security Yes
Wed, 06 May 2026 05:26:18 GMT Forty Years With Her, and Never Once Knew Her vulnerability Yes
Wed, 06 May 2026 07:02:51 GMT Practical OSCP Certification Training in Mumbai for Real World Cy... cyber-security-awareness Yes
Wed, 06 May 2026 09:31:57 GMT Vers un système de santé intelligent : le rôle clé des donné... security Yes
Wed, 06 May 2026 06:49:55 GMT Kenapa Banyak Sistem Diretas? Memahami Celah Keamanan dari Hal-Ha... infosec Yes
Wed, 06 May 2026 04:51:10 GMT The Cybersecurity Certification Trap Nobody Talks About ethical-hacking Yes
Wed, 06 May 2026 09:32:30 GMT FIPS-Enabled Python on cx_Freeze: Challenges, the Mangling Proble... security Yes
Wed, 06 May 2026 08:09:17 GMT Protecting Your Linux System Against DPRK (North Korean) Cyber At... hacking Yes
Wed, 06 May 2026 08:20:54 GMT Secure Coding Practices Every Developer Should Know application-security Yes
Wed, 06 May 2026 04:54:51 GMT DAY : 1 INTRO DUCTION TO SOC infosec Yes
Wed, 06 May 2026 05:56:37 GMT Critical Apache HTTP/2 Vulnerability (CVE-2026–23918): Deep Tec... vulnerability, information-technology Yes
Wed, 06 May 2026 07:30:22 GMT Why Most Small Businesses in Oman Are Not Ready for a Cyber Attac... information-security Yes
Wed, 06 May 2026 10:32:46 GMT Cyber Security in 2026: Why You Might Be at Risk hacking Yes
Wed, 06 May 2026 08:05:33 GMT How Older PCs Compare With Current Models information-technology Yes
Wed, 06 May 2026 10:24:16 GMT I Knew the Theory. Doing It Was Different. (My Ethical Hacking Sp... ethical-hacking Yes
Wed, 06 May 2026 06:21:27 GMT Will Quantum Security Replace Traditional Cybersecurity Methods? information-technology Yes
Wed, 06 May 2026 04:43:14 GMT THE WISDOM TOOTH SOLUTION: Architecture of Digital Sovereignty in... information-security Yes
Wed, 06 May 2026 09:46:57 GMT Content Security Policy | TryHackMe vulnerability Yes
Wed, 06 May 2026 09:30:21 GMT From Scan to Shell: Exploiting vsftpd 2.3.4 on Metasploitable2 (B... penetration-testing, ethical-hacking Yes
Wed, 06 May 2026 08:04:53 GMT BUG-BOUNTY SERIES 10: SQL Injection (SQLi). bug-bounty Yes
Wed, 06 May 2026 09:48:36 GMT HackTheBox — Support | Walkthrough hacking Yes
Wed, 06 May 2026 10:01:01 GMT Supabase Row-Level Security in Flutter: The Policy Pattern I Use ... security Yes
Wed, 06 May 2026 02:41:33 GMT Fundamental Cybersecurity: Fondasi Keamanan Digital yang Wajib Di... cyber-security-awareness Yes
Wed, 06 May 2026 10:16:33 GMT How I Found My First $250 Stored XSS When I Almost Quit bug-bounty, infosec, web-security Yes
Wed, 06 May 2026 07:22:24 GMT When AI Learned to Fake Reality: The Deepfake Scam Problem cyber-security-awareness Yes
Wed, 06 May 2026 07:36:06 GMT Password Reset Flaws: The Easiest Account Takeover Vector infosec, web-security Yes
Wed, 06 May 2026 07:55:49 GMT BUG-BOUNTY SERIES 9: Memahami HTTP untuk Bug Bounty. bug-bounty Yes
Wed, 06 May 2026 10:26:18 GMT Upload Vulnerabilities | TryHackMe remote-code-execution Yes
Wed, 06 May 2026 07:12:43 GMT Crisis Management Is Not Response. It Is Leadership Under Uncerta... information-security Yes
Wed, 06 May 2026 06:54:28 GMT The Bug That Was Hidden in Plain Sight ethical-hacking Yes
Wed, 06 May 2026 01:50:34 GMT The AI Model That Changed the Economics of Hacking…And What It ... cyber-security-awareness Yes
Wed, 06 May 2026 08:29:54 GMT IDOR Hunting — Find Broken Authorization bug-bounty, hacking Yes
Wed, 06 May 2026 08:58:35 GMT Top Cybersecurity Solutions for Saudi Arabia Businesses information-technology Yes
Wed, 06 May 2026 07:36:01 GMT TPRM in the AI Era: Gartner Top Tech Trends Revealed web-security Yes
Wed, 06 May 2026 09:08:38 GMT How a Simple Payload Helped Me Discover a UI Redressing Vulnerabi... vulnerability Yes
Wed, 06 May 2026 00:25:42 GMT Breaking AES-GCM Systems (Without Breaking AES) information-security Yes
Wed, 06 May 2026 04:35:15 GMT Strategi Defensi Modern: Mengoptimalkan Firewall OPNsense dalam M... information-security Yes
Wed, 06 May 2026 08:28:31 GMT Reflected XSS in E-Commerce Search — Bug Bounty Writeup penetration-testing, hacking, web-security Yes
Wed, 06 May 2026 06:14:45 GMT PCI DSS 4.0 Pentesting Mistakes SaaS Companies Make penetration-testing Yes
Sun, 19 Apr 2026 11:31:54 GMT Search Engine Discovery & Google Dorking: Turning Google into a R... google-dorking
Mon, 17 Nov 2025 09:27:29 GMT 200 reports, 11 valid bugs, 0 critical issues. Here’s everythin... vdp
Sun, 03 May 2026 06:17:38 GMT SQL Injection Vulnerability file-upload
Tue, 14 Apr 2026 17:24:57 GMT PAM Cleanup in Practice: Discovery, Risk Triage and Lifecycle Gov... cyber-sec
Sat, 04 Apr 2026 17:32:35 GMT How I Earned $200 in 5 Minutes Using a Simple Broken Link Hijack... bug-bounty-hunter
Thu, 09 Oct 2025 18:33:05 GMT 0-click Account Takeover via Punycode bug-bounty-program
Fri, 06 Feb 2026 06:33:08 GMT 5 Ways to Bypass Email Verification Without Using Any Tool bug-bounty-program
Tue, 14 Apr 2026 16:41:14 GMT Is Bug Bounty a Good Long-Term Career? The Reality in 2026 bug-bounty-hunter
Thu, 30 Apr 2026 15:04:04 GMT I Almost Scrolled Past This URL… Then I Got Curious local-file-inclusion, lfi
Thu, 02 Apr 2026 17:35:36 GMT How I Found a Subdomain Takeover via BetterUptime subdomain-takeover
Wed, 18 Mar 2026 10:03:26 GMT Web Security Series #7 — Exploiting Blind SQL Injection via Ses... bug-bounty-hunting
Thu, 16 Apr 2026 10:24:30 GMT Why Every Business Needs a Penetration Test in 2026 pentest
Wed, 18 Feb 2026 21:56:48 GMT Chapter 14: Subdomain Takeover subdomain-takeover
Fri, 29 Aug 2025 04:43:21 GMT 9. The Secret Power of Google Dorking dorking
Thu, 30 Apr 2026 11:39:37 GMT IDOR in a Header Leads to a $$$ Bounty idor
Thu, 29 Jan 2026 05:03:15 GMT Subdomain Takeover: Understanding, Detecting, and Recovering from... subdomain-takeover
Sat, 02 May 2026 13:19:31 GMT Understanding SSRF: Concepts, Patterns and Practical Exploitation ssrf
Thu, 18 Sep 2025 05:45:26 GMT Data Accuracy in Directory Websites: Why Clean Listings = Loyal U... directory-listing
Sat, 11 Apr 2026 05:12:45 GMT Pentester Labs Recon 02 Writeup recon
Sun, 17 Aug 2025 17:58:45 GMT $$$ How I Exploited a Business Logic Flaw to Slash Product Prices... bug-bounty-program
Fri, 01 May 2026 09:40:56 GMT Excessive Data Exposure Leading to Unauthorized Access to Paid Fe... vulnerability-disclosure
Thu, 26 Dec 2024 15:23:03 GMT GitHub Dorking List: The Ultimate Guide to Exploring and Securing... github-dorking
Thu, 30 Apr 2026 22:03:21 GMT How to learn Autopsy quickly to pass any exams cybersecurity-tools
Mon, 27 Apr 2026 09:39:12 GMT Top Cyber Security Tools Every Beginner Should Learn in 2026 cybersecurity-tools
Wed, 08 Apr 2026 19:31:38 GMT Pentester Labs Recon 00 write up recon
Fri, 17 Apr 2026 15:39:41 GMT Bug Bounty 2026: Why the “End of the World” is Actually a $50... bounties
Mon, 20 Apr 2026 12:05:38 GMT CVSS 10.0. No Patch. The Admin Endpoint Is Just Open. ssrf
Sat, 02 Aug 2025 14:15:23 GMT The Silent Risk in Your ICS: Why S7 Protocol Needs Security Atten... censys
Tue, 28 Apr 2026 07:09:41 GMT owockibot: The Bounty Board Powering the Agent Economy bounty-program
Thu, 30 Apr 2026 12:27:10 GMT What is XSS (Cross-Site Scripting)? Explained Simply for Beginner... xss-attack
Thu, 20 Nov 2025 09:45:04 GMT Timber Doors in Surrey: Style, Durability, and Value Explained dorking
Tue, 24 Mar 2026 17:48:00 GMT The Ultimate Bug Bounty Course: From Zero to Advanced Hacker 1 bug-bounty-hunting
Fri, 03 Apr 2026 23:30:20 GMT Security Advisory: QuickLaunch SSO Platform — Unauthenticated C... information-disclosure
Sun, 03 May 2026 15:05:29 GMT File Upload and Download in Spring Boot (MultipartFile + Resource... file-upload
Tue, 05 Dec 2023 07:54:40 GMT LFI via SMTP log poisoning log-poisoning
Thu, 12 Mar 2026 18:45:23 GMT Pulse-Zero: Atomic Memory Slicing and Sub-Layer Evasion via x64 A... cyber-sec
Fri, 20 Mar 2026 23:01:01 GMT How I Automated Google Dorking with a Simple Bookmarklet google-dorking
Tue, 23 Sep 2025 06:36:22 GMT Mengamankan File Sensitif & Directory Listing website dengan .ht... directory-listing
Mon, 30 Mar 2026 12:28:22 GMT API Access Explained: Everything You Need to Know to Get Started api-key
Sun, 05 Apr 2026 20:11:41 GMT I Tried Logging In… and Accidentally Did Responsible Disclosure... vdp
Mon, 04 May 2026 16:05:38 GMT CVE-2026–31431 — Privilege Escalation via AEAD Crypto Socket... exploit, cve
Wed, 15 Apr 2026 10:36:07 GMT Claude AI Discovers Zero-Day RCE in Vim and Emacs: The Dawn of AI... rce
Fri, 01 May 2026 12:41:01 GMT How I Found Sensitive Data Exposure on Screenly’s API — A Bug... bugbounty-writeup, information-disclosure
Tue, 05 May 2026 13:45:34 GMT CVE-2026–7791: Amazon WorkSpaces’de Gizlenen Ayrıcalık Yük... cve
Mon, 04 May 2026 12:56:26 GMT Beyond alert(1): Advanced XSS Payload Crafting, Filter Bypasses &... xss-bypass
Sat, 28 Feb 2026 14:32:47 GMT TryHackMe CTF Walkthrough- Love at First Breach 2026: Valenfind lfi
Mon, 06 Apr 2026 13:55:29 GMT The 7 Golden Rules of Vulnerability Scanning vulnerability-scanning
Sun, 15 Feb 2026 09:26:13 GMT TryHackMe Walkthrough -Subdomain Enumeration subdomain-enumeration
Mon, 27 Apr 2026 04:11:56 GMT Cloudflare R2 + Custom Domain file-upload
Sat, 25 Apr 2026 14:46:05 GMT File Inclusion— Skills Assesment (HTB) file-inclusion
Sun, 24 Aug 2025 20:18:55 GMT How I found an Account Lockout Vulnerability Without Any Tools bug-bounty-program
Mon, 13 Apr 2026 22:53:20 GMT CVE-2023–6972 Wordpress Backup Migration ≤1.3.9 Arbitrary Fil... security-research
Sat, 28 Mar 2026 06:56:48 GMT The Definitive Guide to Secret Management in Python AI Projects api-key
Thu, 09 Apr 2026 17:39:27 GMT From 401 to BAC: How a Refresh Broke Workspace Authorization vulnerability-disclosure
Fri, 24 Apr 2026 21:44:10 GMT TryHackMe Recruit Writeup ssrf
Tue, 05 May 2026 06:15:31 GMT They Rejected My Bugs. I Came Back Same Day With 9 More. bugs
Fri, 01 May 2026 22:04:53 GMT From Source Code Review To Critical Vulnerability — Critical Fi... hackerone
Sat, 04 Apr 2026 04:41:46 GMT OpenTofu Security Scanner: How to Catch Misconfigurations Before ... vulnerability-scanning
Wed, 08 Apr 2026 13:31:24 GMT Hunting on Flipkart: When Product Specs Become Payloads google-dork
Mon, 27 Apr 2026 10:27:56 GMT Vulnerability Assessment and Penetration Testing Services in Indi... vapt
Fri, 01 May 2026 17:43:46 GMT TryHackMe (THM) MD2PDF Walkthrough ssrf
Fri, 28 Jun 2024 14:51:14 GMT X-Forwarded HTTP header-ləri : Qısa izah log-poisoning
Mon, 04 May 2026 07:35:39 GMT CPDoS via Content Negotiation Mechanism bug-bounty-tips, web-cache-poisoning
Thu, 12 Mar 2026 22:51:26 GMT Payment Bypass That Let Me Get a Premium Course for $0 [Business... bugcrowd
Wed, 25 Mar 2026 18:14:32 GMT Keterbukaan Informasi atau Terlalu Terbuka? information-disclosure
Sat, 10 Jan 2026 05:03:45 GMT Lab:Web cache poisoning via an unkeyed query parameter | Portswi... web-cache-poisoning
Sat, 28 Mar 2026 08:13:46 GMT How Exposed n8n Webhooks Become an Attack Surface shodan
Wed, 15 Apr 2026 22:10:26 GMT All It Took Was a Negative Number: A Price Manipulation Story | ... bug-bounty-hunter
Mon, 13 Apr 2026 03:31:01 GMT Google Dorks Google Ko Bana Do Apna Hacking Tool: Free Mein Bugs ... google-dork
Mon, 02 Feb 2026 11:59:59 GMT El cashback está en el aire bounty-program
Fri, 01 May 2026 15:55:32 GMT TryHackMe: MD2PDF Write-up application-security
Tue, 13 Jan 2026 13:27:13 GMT Hacking “Time”: When Critical Infrastructure Forgets to Set a... vulnerability-disclosure
Thu, 08 Jan 2026 09:02:50 GMT osint-Forgotten Ruins bounty $$ bounties
Tue, 05 May 2026 16:22:09 GMT One curl Command Returned Server Credentials — Here Is What I L... bugbounty-writeup
Tue, 05 May 2026 10:16:38 GMT Shift Left Security: From Concept to Practice — A Complete Guid... application-security
Thu, 23 Apr 2026 07:28:44 GMT Exploitation with Metasploit vapt
Tue, 28 Apr 2026 13:18:20 GMT 25 Open-Source Cybersecurity Tools That Work Even When Your Budge... cybersecurity-tools
Sat, 25 Apr 2026 02:19:00 GMT Yellow Cockatoo RAT (Jupyter’s Bro)Write-Up (CyberDefenders) remote-code-execution
Wed, 17 Dec 2025 09:57:30 GMT The Mother Lode: Hacking with GitHub Dorking github-dorking
Sat, 02 May 2026 16:49:25 GMT Beyond the Ping: Mastering Nmap for Network Reconnaissance in 202... vulnerability-scanning
Fri, 25 Jul 2025 16:41:01 GMT ️ SubDNS-UI: Build Your Own Subdomain + DNS Enumerator with a C... subdomain-enumeration
Wed, 23 Jul 2025 15:15:01 GMT TryHackMe Include walkthrough: SSRF, log poisoning & LFI2RCE, wit... log-poisoning
Wed, 18 Feb 2026 04:39:59 GMT ​"Beyond the Alert Box: Demonstrating Real-World XSS Impact" xss-bypass
Sun, 03 May 2026 09:14:45 GMT The Ghost in the Machine: A Bug Bounty Short Story bug-bounty-tips, bug-bounty-writeup, recon
Fri, 19 Sep 2025 07:40:16 GMT How I Tracked Our Clients’ Device Versions Without Direct Repor... zoomeye
Fri, 24 Jan 2025 09:34:52 GMT A new Holistic temple opening InLeeds web-pentest
Thu, 16 Apr 2026 14:58:15 GMT April 2026 Microsoft Security Update Cycle rce
Fri, 03 Apr 2026 08:19:32 GMT Why API Key Security Should Be Your Startup’s First Priority api-key
Thu, 30 Apr 2026 14:25:30 GMT How I Use AI to Find Bugs Faster — My Full AI-Augmented Bug Bou... bugbounty-writeup
Thu, 26 Feb 2026 13:54:44 GMT Poison — HTB lfi
Wed, 11 Mar 2026 08:12:14 GMT The Bug Bounty Hunter Roadmap (2026): From Curious Beginner to Re... bug-bounty-hunting
Tue, 05 May 2026 15:14:38 GMT Server Side Template Injection pentesting
Tue, 21 Apr 2026 04:56:55 GMT Before You Test Anything, Understand What the System Is Protectin... bug-bounty-hunter
Fri, 10 Nov 2023 03:38:01 GMT Apache error.log advanced Log poisoning RCE log-poisoning
Sun, 28 Dec 2025 08:13:44 GMT Subzy Tool subdomain-takeover
Thu, 23 Apr 2026 11:12:22 GMT One Missing Dictionary Key. One Production Cloud Identity. rce
Wed, 22 Apr 2026 13:21:41 GMT Pickle Rick Challenge — A Short Comprehension pentest
Sun, 13 Jul 2025 16:32:21 GMT ProConOS Exposed: What ICS Security Teams Need to Know censys
Tue, 05 May 2026 09:26:25 GMT HackTheBox Dancing: From Anonymous SMB Access to Root pentesting
Thu, 21 Aug 2025 10:04:08 GMT Dork Like a Demon: FOFA Edition for Hackers & Bug Bounty Hunters dorking
Fri, 24 Apr 2026 12:35:08 GMT Broken Authentication: A Critical Risk to User Identity and Appli... vapt
Sun, 26 Apr 2026 22:37:30 GMT Running a virtual iPhone for security research, no Jailbreak Requ... security-research
Sun, 26 Apr 2026 14:51:52 GMT How I Found a Reflected XSS in a Government Website xss-vulnerability
Mon, 16 Mar 2026 07:31:29 GMT How I hacked AI Agent and worth bounty of $$$$ bugcrowd
Sun, 26 Apr 2026 11:39:49 GMT How I Built an Automated Subdomain Monitor That Texts Me Every Ti... bugbounty-writeup
Fri, 01 May 2026 19:05:59 GMT IDOR Unveiled: Hashgate — picoCTF 2026 idor
Sun, 12 Apr 2026 02:19:51 GMT WHEN "NOT A VULNERABILITY" GETS PATCHED IN 72 HOURS By Ahmed Bata... security-research
Wed, 29 Apr 2026 03:25:26 GMT How a Simple Google Dork Led Me to an XSS on Ford Motor Company &... xss-attack
Thu, 02 Oct 2025 06:59:46 GMT Endless Cashback Glitch:How I Unlocked Unlimited Free Orders with... bug-bounty-program
Tue, 05 May 2026 20:34:26 GMT Milesight IP Camera Vulnerabilities: How 5 Critical CVEs Left 14,... cve
Sat, 07 Mar 2026 01:11:15 GMT The Silent Observer: A Deep Dive into Shodan Dorks for Security R... shodan
Thu, 28 Sep 2023 23:05:39 GMT Archangel — TryHackMe log-poisoning
Mon, 04 May 2026 11:34:52 GMT How I Found XSS by Understanding Context xss-vulnerability
Sun, 03 May 2026 07:01:01 GMT Sprocket Line (RXSS) WebVerse xss-vulnerability
Thu, 14 Aug 2025 10:54:38 GMT Unlocking the Hidden Power of Search Engines censys
Thu, 13 Feb 2025 03:29:37 GMT ZoomEye Meets DeepSeek: AI-Powered Cyberspace Intelligence zoomeye
Sun, 05 Apr 2026 13:27:30 GMT The Vault Sentry — A Startup’s Strategic Edge in Cybersecurit... api-key
Wed, 25 Mar 2026 10:55:24 GMT METASPLOIT EXPLOIT |TRYHACKME PREMIUM cyber-sec
Sat, 02 May 2026 12:05:05 GMT 10 Trusted Commercial Pest Control Specialists in Vancouver, Cana... bugs
Wed, 29 Apr 2026 11:19:12 GMT $500 OAuth Account Fusion Pre-Takeover Attack hackerone
Tue, 05 May 2026 18:29:45 GMT Applying AI to Application Security: What Works and What Doesn’... application-security
Wed, 29 Apr 2026 20:01:01 GMT The Form Is Soft. The Substance Is Not. information-disclosure
Mon, 27 Apr 2026 18:53:00 GMT We Are the Ones We Have Been Waiting For information-disclosure
Sat, 02 May 2026 07:21:38 GMT TryHackMe (THM) Agent T Walkthrough rce
Tue, 28 Apr 2026 11:47:05 GMT What Tools Do Cyber Security Experts Actually Use Every Day? (And... cybersecurity-tools
Wed, 29 Apr 2026 14:32:10 GMT Self-XSS + CSRF Leading to Account Takeover (50-Character Payload... xss-attack, bugbounty-writeup
Wed, 29 Apr 2026 01:59:00 GMT A Camping Trip… and My Orders Were Suddenly Exposed idor
Wed, 08 Apr 2026 08:46:11 GMT Practical JavaScript Recon for Bug Bounty: A Real-World Passive-F... recon
Tue, 31 Mar 2026 07:57:14 GMT How I Test API Keys Using Only Burp Suite api-key
Tue, 05 May 2026 14:54:31 GMT Unauthorized Workspace Deletion via Broken Access Control bug-bounty-writeup
Wed, 14 Jan 2026 09:06:30 GMT Lab: Web cache poisoning via an unkeyed query string | Portswige... web-cache-poisoning
Tue, 14 Apr 2026 10:19:13 GMT Pentester Lab Recon 07 Writeup recon
Tue, 05 May 2026 09:17:36 GMT Unauthenticated Access to AWS via Cognito Identity Pool ID bug-bounty-tips
Mon, 04 May 2026 18:26:59 GMT Bug Hunter Notebook (CHAPTER — 1) bug-bounty-tips
Sat, 02 May 2026 15:14:37 GMT Signature Bypass via Control Character Injection → Arbitrary F... bugbounty-writeup
Tue, 05 May 2026 05:51:37 GMT HackTheBox — TwoMillion: A Lesson in API Abuse and Privilege Es... bug-bounty-writeup
Mon, 16 Mar 2026 18:05:08 GMT xss0r V6 is Finally Released! xss-bypass
Sat, 06 Dec 2025 17:05:14 GMT GitHub Pages Subdomain Takeover on aiaa-dpw.larc.nasa.gov (NASA V... subdomain-takeover
Tue, 05 May 2026 16:46:53 GMT Title: Advanced WordPress Troubleshooting: Beyond the “Deactiva... bugs
Wed, 22 Apr 2026 23:39:11 GMT Authentication bypass via unauthenticated JWT generation on a tel... shodan
Thu, 09 Apr 2026 15:25:42 GMT The Real AI Concern Is Not Art or Jobs, It Is Cybersecurity cyber-sec
Tue, 05 May 2026 17:12:25 GMT Escalating Self-XSS with Disk Cache xss-attack
Tue, 05 May 2026 14:32:11 GMT Enterprise Applications Under Fire: MetInfo and Weaver E cology V... application-security
Mon, 04 May 2026 19:18:14 GMT LFI to RCE: Log Poisoning via PHP Sessions and Apache Logs local-file-inclusion
Fri, 17 Apr 2026 16:11:01 GMT Mirage (LFI) WebVerse lfi
Mon, 09 Mar 2026 18:49:55 GMT Walkthrough: Vulnerability Scanning w/ OpenVAS vulnerability-scanning
Sat, 02 May 2026 14:24:34 GMT Analytic Tools cyber-sec
Sun, 22 Oct 2023 19:57:30 GMT Performing a Log Poisoning Attack log-poisoning
Sun, 03 May 2026 14:34:15 GMT Random Bug Generator — A Fun Way to Discover Insects Instantly bugs
Tue, 28 Apr 2026 20:00:52 GMT Official Blind XSS Platform Update (2026) xss-attack, xss-bypass
Thu, 26 Mar 2026 00:32:02 GMT Révolution Lumière lfi
Tue, 05 May 2026 20:32:00 GMT “Supplier ADP Pilot Update” — SADP Content Now Live in CVE ... vulnerability
Tue, 28 Apr 2026 18:20:28 GMT AI Can Now Discover and Execute Exploits — What Does That Mean? exploit
Tue, 18 Nov 2025 13:26:47 GMT GitHub Dorking: The Hunter’s Guide to Finding Secrets in Public... github-dorking
Mon, 04 May 2026 09:31:01 GMT Love Letter Locker | TryHackMe Write-up idor
Mon, 20 Apr 2026 17:13:22 GMT PortSwigger Lab : Reflected XSS into HTML context with nothing en... xss-vulnerability
Sat, 25 Apr 2026 09:18:33 GMT Bug Bounty Series — Part 3 (HTTP Parameter Pollution) bug-bounty-hunter
Wed, 25 Feb 2026 00:40:05 GMT Icy “Doodle” Site | ATC CTF 2.0 | Google Dorking| CTFs google-dorking
Wed, 22 Apr 2026 07:32:56 GMT One Forged Packet, $292 Million Gone exploit
Wed, 19 Nov 2025 19:44:02 GMT The Pulse of Liquidity: How DorkFi’s Interest Rates Adapt in Re... dorks
Fri, 01 May 2026 16:26:26 GMT ️ 什麼是 Cross-Site Scripting (XSS)? cross-site-scripting
Wed, 05 Nov 2025 12:42:46 GMT How I Hacked Bank’s Admin Portal vdp
Tue, 04 Nov 2025 07:31:55 GMT Google Dorking dorks
Mon, 16 Mar 2026 14:32:42 GMT Web Security Series #5 — Exploiting Broken Access Control via T... bug-bounty-hunting
Wed, 18 Mar 2026 14:34:33 GMT File Inclusion Zafiyetleri: LFI ve RFI Nedir, Nasıl Çalışır ... file-inclusion
Tue, 14 Apr 2026 09:57:40 GMT Pentester Lab 06 Writeup recon
Tue, 05 May 2026 14:28:15 GMT Function Confution that leads too Full server Dirs disccluseed bugs
Thu, 14 Aug 2025 10:08:18 GMT Predictive Analytics and Voice Technology: A Winning Combination ... vdp
Fri, 17 Apr 2026 18:21:00 GMT The 12-Character Backdoor: How One Static Key in All-in-One WP Mi... remote-code-execution
Mon, 27 Apr 2026 07:12:30 GMT One Weird Query String That Let Anyone Hijack Any Account in Roc... bounties
Thu, 13 Mar 2025 18:09:56 GMT How I Found Sensitive Information using Github Dorks in Bug Bount... github-dorking
Sun, 21 Sep 2025 03:55:56 GMT Is it easy to discover a critical vulnerability [P1] ? directory-listing
Mon, 04 May 2026 18:34:41 GMT The Quiet Outage bugs
Fri, 27 Mar 2026 11:58:55 GMT Why Beginners Fail in Bug Bounty (And How to Fix It in 2026) bug-bounty-hunter
Wed, 25 Feb 2026 01:47:45 GMT How I Found a Path Traversal in the Rancher Dashboard via HAR Rep... web-pentest
Tue, 14 Apr 2026 04:51:21 GMT Top Cybersecurity Tools Experts Use cybersecurity-tools
Thu, 09 Apr 2026 19:37:25 GMT Pentest Aşamaları Nelerdir? pentest
Tue, 15 Jul 2025 12:15:58 GMT “Secure” OPC UA Setups Are Being Hacked — Here’s Why censys
Wed, 29 Apr 2026 07:27:12 GMT Hacking Buku Tamu: Eksperimen Sederhana Membedah Celah XSS xss-attack
Tue, 28 Apr 2026 07:24:56 GMT Cross-Site Scripting (XSS): Dari Celah Sederhana ke Ancaman Seriu... cross-site-scripting
Sat, 06 Dec 2025 23:06:15 GMT Big News from DorkFi — PreFi Rewards Drop + Contest Live! dorks
Sun, 15 Mar 2026 17:49:52 GMT TryHackMe — Takeover Writeup subdomain-takeover
Fri, 13 Mar 2026 14:55:26 GMT Web Security Series #2 — Bypassing Authentication via MFA Tampe... bug-bounty-hunting
Sun, 03 May 2026 16:41:01 GMT How I Broke a Travel Giant’s “Non-Refundable” Policy for a ... bug-bounty-tips
Sun, 17 Aug 2025 19:26:05 GMT bug-bounty-program
Thu, 05 Mar 2026 21:41:26 GMT Finding a P1 in NASA: The Power of Google Dorking google-dork
Wed, 12 Feb 2025 22:46:35 GMT https://www.express.co.uk/life-style/property/2012927/cleaning-ch... web-pentest
Sun, 05 Apr 2026 18:11:17 GMT Information Disclosure Through Unrestricted API Endpoints information-disclosure
Tue, 18 Nov 2025 18:12:40 GMT Dork Labs Awarded AWS Activate Startup Grant dorks
Fri, 24 Apr 2026 06:09:47 GMT Is Web Filtering Quietly Controlling Your Online Experience Witho... cybersecurity-tools
Fri, 24 Apr 2026 18:01:11 GMT Signed, Vulnerable, and Still Dangerous: What a BYOVD Research Pr... security-research
Thu, 23 Apr 2026 19:21:01 GMT Security Assessment: 23andMe Web Platform security-research
Wed, 03 Dec 2025 23:26:26 GMT TryHackMe-TakeOver-WriteUp subdomain-takeover
Fri, 03 Apr 2026 08:30:09 GMT Inside The Vault Sentry — How We Detect and Stop API Key Leaks api-key
Thu, 19 Mar 2026 22:46:44 GMT How I Earned $76,000 From a Single Program on Bugcrowd bugcrowd
Tue, 22 Apr 2025 10:38:20 GMT Trump’s Tariffs Cut Out Censys — ZoomEye Steps In Strong! zoomeye
Fri, 24 Apr 2026 15:44:54 GMT File Inclusion local-file-inclusion
Sat, 25 Jan 2025 23:20:10 GMT Full GitHub Dorking guide: for OSINT and BugBounty (Reconnaissanc... github-dorking
Tue, 24 Mar 2026 07:41:00 GMT How I Built a Directory Listing Site (ToolIndex.net) and What I L... directory-listing
Tue, 14 Apr 2026 04:36:01 GMT XSS Cross-Site Scripting Zero Se Hero: Browser Ko Apna Weapon Ban... cross-site-scripting
Wed, 08 Apr 2026 20:24:00 GMT Stop Guessing XSS Payloads cross-site-scripting
Wed, 01 Apr 2026 18:43:56 GMT Lab: SQL injection attack, listing the database contents on Oracl... web-pentest
Mon, 02 Feb 2026 17:05:37 GMT Lab: Web cache poisoning to exploit a DOM vulnerability via a cac... web-cache-poisoning
Mon, 13 Apr 2026 06:37:51 GMT File Inclusion on DVWA local-file-inclusion, file-inclusion
Tue, 21 Apr 2026 10:47:26 GMT Validating My External Attack Surface: A Production-Ready Nuclei ... vulnerability-scanning
Tue, 21 Apr 2026 17:44:36 GMT TuesdayTool 44: ThreatCaddy: A Modern Approach to Threat Intellig... cybersecurity-tools
Fri, 17 Apr 2026 04:53:23 GMT How I Found an Exposed Google Maps API Key on a Global Brand’s ... vdp
Mon, 04 May 2026 23:53:49 GMT Break The Syntax CTF — Web Challenge 2 Writeup lfi
Thu, 19 Mar 2026 22:19:50 GMT Vulnerability Scanning 101: How to Manage Your Vulnerabilities vulnerability-scanning
Mon, 04 May 2026 14:48:00 GMT I Found 150+ Vulnerabilities in DeFi Protocols. Here’s Why I C... bounties
Fri, 24 Jan 2025 00:08:47 GMT A majestic temple opportunity of wellbeing and wellness web-pentest
Mon, 16 Feb 2026 08:42:31 GMT Lab: Exploiting HTTP request smuggling to perform web cache poiso... web-cache-poisoning
Fri, 07 Feb 2025 05:12:28 GMT Do You Struggle Finding Internal/Hidden Subdomains? Recon part 5 subdomain-enumeration
Wed, 29 Apr 2026 16:56:27 GMT When a Git Redirect Carries Your Credentials With It: Finding an ... security-research
Sun, 08 Mar 2026 06:50:53 GMT XSS Inbound Attack: I Didn’t Steal Your Cookie. I Stole Your So... xss-bypass
Mon, 17 Nov 2025 23:45:18 GMT DorkFi: The Triumph of a Team You Can Trust dorks
Sat, 04 Jan 2025 17:20:23 GMT GitHub dork github-dorking
Thu, 25 Dec 2025 00:47:15 GMT Subdomain Takeover Explained: Complete Step-by-Step Guide (Recon ... subdomain-takeover
Tue, 05 May 2026 20:50:22 GMT Local Code Execution via Git Workspace Poisoning (FSMonitor) infosec
Thu, 02 Apr 2026 15:28:31 GMT O Primeiro passo é o mais importante! pentest
Tue, 03 Mar 2026 05:34:39 GMT Documenting my journey. cyber-sec
Mon, 04 May 2026 14:24:20 GMT Software Supply Chain Under Attack: Malicious npm Packages Target... application-security
Mon, 04 May 2026 18:31:01 GMT Nmap: How Hackers “See” Your Network Before Attacking It vulnerability-scanning
Tue, 23 Sep 2025 13:01:51 GMT Why Email Marketing Is the Secret Growth Tool for Directory Websi... directory-listing
Mon, 02 Mar 2026 00:00:27 GMT TakeOver | TryHackMe Write-up subdomain-takeover
Sat, 04 Apr 2026 09:10:35 GMT We’ve messed up, a lot. Here’s Why Scribble Still Exists to c... bounties
Tue, 05 May 2026 10:56:45 GMT WordPress Bug Hunting — A Practical Guide web-security, pentesting
Wed, 29 Apr 2026 14:14:58 GMT Part 2 : Cross-Site Scripting (XSS) xss-attack, xss-vulnerability, xss-bypass
Wed, 15 Apr 2026 10:48:09 GMT Cross-Chain Bridge Exploits: Why They’re Still Web3’s Biggest... exploit
Thu, 23 Apr 2026 14:41:01 GMT Stop Learning — Start Mastering These Cybersecurity Tools in 20... cybersecurity-tools
Sun, 03 May 2026 20:38:34 GMT ENSI CTF — Medrassa Web Challenge Writeup idor
Sun, 05 Apr 2026 08:08:21 GMT How I Built an Automated Recon Pipeline for Bug Bounty Hunting recon
Fri, 03 Apr 2026 07:21:16 GMT Why API Key Security Should Be Your Startup’s First Priority api-key
Mon, 04 May 2026 10:25:50 GMT IDOR | TryHackMe idor
Wed, 18 Feb 2026 01:09:03 GMT cURL’s Bug Bounty Is Dead. AI Killed It. bounty-program
Sat, 11 Apr 2026 18:05:11 GMT Ha0ker is the online identity of Gagandeep Singh, a professional ... bugcrowd
Sat, 02 May 2026 03:41:01 GMT Senior PHP Developers Make These Security Mistakes Too — And No... application-security
Sat, 28 Feb 2026 21:11:37 GMT I Shouldn’t Be Sharing This: The 2026 Google Dork Bible That St... google-dork
Mon, 06 Apr 2026 21:45:53 GMT Cookie(Çerez) Türleri ve Pentest Açısından Önemi web-pentest
Sun, 26 Jan 2025 19:08:11 GMT Matrix strike’s back against honesty from a power stance web-pentest
Fri, 24 Apr 2026 12:58:35 GMT When an Image Becomes an Attack: Exploiting SVG File Upload Vulne... file-upload
Mon, 11 Dec 2023 18:17:01 GMT Exploiting a Log Poisoning. log-poisoning
Tue, 05 May 2026 11:11:00 GMT Zero-Click ATO: How a Single Accent Mark Led to Account Takeovers pentesting, hackerone
Sat, 02 May 2026 14:01:14 GMT The Art of Finding Critical Vulnerabilities: Where Curiosity Beat... vapt
Sat, 11 Apr 2026 14:24:38 GMT ⭐ SOC287 — Arbitrary File Read on Checkpoint Security Gateway... lfi
Tue, 05 Aug 2025 00:19:11 GMT Breaking Recon with AMASS subdomain-enumeration
Fri, 10 Apr 2026 12:32:22 GMT How Soroban’s CAP-0066 Killed My LayerZero Finding bounty-program
Tue, 03 Feb 2026 17:12:47 GMT My First Week: 3 Business Logic Bugs in Major E-Commerce bug-bounty-program
Sun, 03 May 2026 03:59:58 GMT Metaspliotable 2 via ftp exploit
Mon, 06 Apr 2026 21:37:15 GMT Walkthrough: Executing Local File Inclusion and Remote Code Execu... remote-code-execution, local-file-inclusion
Tue, 05 May 2026 10:09:45 GMT OTP Is Not Always Secure: From a Simple Email Input to Account Co... vapt
Mon, 04 May 2026 23:33:37 GMT ️‍♂️ I Accidentally Stalked a Dead LinkedIn Page (And So ... bugs
Thu, 30 Apr 2026 19:03:31 GMT Fast Development, Hidden Vulnerabilities: The Downside of AI-Gene... application-security
Sun, 12 Apr 2026 02:23:24 GMT WHEN "NOT A VULNERABILITY" GETS PATCHED IN 72 HOURS By Ahmed Bata... security-research
Sun, 21 Sep 2025 07:02:30 GMT Affordable but Vulnerable? The Dark Side of CMORE HMI censys
Sat, 06 Dec 2025 08:29:35 GMT The Midnight Epiphany: How a News Notification Cracked My Stubbor... vulnerability-disclosure
Tue, 28 Apr 2026 21:23:12 GMT Prototype Pollution xss-vulnerability
Tue, 05 May 2026 02:56:01 GMT Beyond the Tool Trap: Moving from Automation to Adversarial Think... pentesting
Mon, 03 Nov 2025 19:42:12 GMT Announcing DorkFi Go-Live Date: Liquidity is Coming dorks
Sun, 15 Mar 2026 11:14:38 GMT Local File Inclusion (LFI) in Leave Application System (PHP & SQL... lfi
Mon, 20 Apr 2026 05:11:01 GMT Stop Hardcoding Your API Keys api-key
Sat, 18 Apr 2026 05:07:38 GMT We’re About to Stop Trusting What We See Online — And AI Is t... cyber-sec
Wed, 29 Apr 2026 13:59:27 GMT Finding an IDOR in Tesla From the Outside bugcrowd
Mon, 27 Apr 2026 20:32:13 GMT When Features Do More Than They Should bugcrowd
Sat, 28 Feb 2026 09:31:10 GMT Google Dork’un Pentest Yaşam Döngüsündeki Yeri google-dork
Tue, 23 Dec 2025 06:58:24 GMT How I Found Vulnerabilities in NASA and Got into the Hall of Fame vulnerability-disclosure
Mon, 16 Feb 2026 14:31:00 GMT BOUNTY | HTB | Windows |Walkthrough | Write up bounties
Tue, 05 May 2026 22:06:03 GMT LFI Automated Scanning: Finding and Fuzzing with ffuf penetration-testing, web-security, local-file-inclusion
Mon, 04 May 2026 07:36:49 GMT From Btech to Cybersecurity Engineer -Premkumar Reddy vapt
Mon, 04 May 2026 12:16:22 GMT Upload file and fill up HTML form with express multer backend file-upload
Tue, 28 Apr 2026 16:40:18 GMT How I Discovered a Cognito Misconfiguration That Bypassed Corpora... security-research
Sat, 20 Apr 2024 17:20:58 GMT TryHackMe — Brute Walkthrough | TheHiker log-poisoning
Fri, 24 Apr 2026 12:21:00 GMT Understanding Cross-Site Scripting (XSS): Reflected vs Stored Att... xss-vulnerability
Thu, 26 Feb 2026 00:47:58 GMT From Shodan Recon to Multiple Security Flaws in the Same Program shodan
Fri, 09 Jan 2026 05:50:02 GMT Caches, Edge, and Exploits web-cache-poisoning
Mon, 06 Apr 2026 18:35:09 GMT Manual vs Automated Security Testing in the Age of AI: A Security... vulnerability-scanning
Tue, 24 Feb 2026 07:38:15 GMT Glassdoor’s IDOR vulnerability to retrieve email addresses of a... bounty-program
Thu, 30 Apr 2026 02:04:17 GMT From Recon to Letter of Recognition | NASA VDP bugcrowd
Tue, 18 Nov 2025 08:33:41 GMT A Chain of Vulnerabilities Leading to Critical Information Disclo... bug-bounty-program
Sat, 11 Apr 2026 09:59:14 GMT The Symmetry of Recon: Active vs. Passive Discovery in Bug Bounty shodan
Tue, 05 May 2026 19:15:54 GMT How Secure Password Hashing Can Take Down Your Server bug-bounty-tips
Tue, 05 May 2026 16:21:01 GMT The “Infinite Discount” Glitch: How I Used a Race Condition t... pentesting, bug-bounty-writeup
Sat, 02 May 2026 14:02:00 GMT I Received an Official Bug Bounty Certificate from a Major Paymen... bugbounty-writeup
Fri, 12 Dec 2025 06:49:56 GMT How Variable Data Technology is Transforming Postcard & Brochure ... vdp
Fri, 10 Apr 2026 11:18:22 GMT What Happens If You Remove All Tools in Cybersecurity? cybersecurity-tools
Tue, 21 Apr 2026 15:05:26 GMT Web Security Series #17 — Exploiting Local File Inclusion (LFI)... file-inclusion
Fri, 20 Mar 2026 11:44:04 GMT #Searchlight OSINT Writeup google-dorking
Tue, 28 Apr 2026 12:31:02 GMT How to Upload Files in Next.js (Images & Documents) file-upload
Tue, 24 Mar 2026 13:18:44 GMT Information disclosure in version control history | Lab-05 information-disclosure
Thu, 23 Apr 2026 13:57:34 GMT Address Poisoning Attacks: How Hackers Exploit Your Copy-Paste Ha... exploit
Sat, 14 Mar 2026 01:59:36 GMT LFI/RFI lfi
Fri, 31 May 2024 13:29:16 GMT Map of the worlds best URLs 2025 log-poisoning
Fri, 01 May 2026 13:32:55 GMT I Mapped How Attackers Chain 5 API Vulnerabilities Into a Full Ad... idor
Sun, 08 Mar 2026 11:01:01 GMT I Paid $500 for AI Directory Listings. Here Is My Honest ROI Brea... directory-listing
Tue, 28 Apr 2026 07:04:36 GMT SQL Injection on MCP Server to Information Disclosure| Critical ... hackerone
Mon, 06 Apr 2026 10:39:59 GMT Bug Bounty / Web Application Security Hunting Checklist - 2026 XS... bug-bounty-hunter
Mon, 27 Jan 2025 16:51:28 GMT The man who suffered 11 years in hell for freedom has now been fr... web-pentest
Wed, 10 Dec 2025 12:06:41 GMT Strengthening Web3 Security: Recent Vulnerability Findings from Y... vulnerability-disclosure
Wed, 22 Oct 2025 14:11:32 GMT Mastering Subdomain Enumeration: A Beginner’s Guide to Expandin... subdomain-enumeration
Fri, 01 May 2026 05:49:29 GMT SERVER-SIDE REQUEST FORGERY (SSRF) in crAPI ssrf
Fri, 10 Apr 2026 14:53:24 GMT The Ultimate Guide to Proxying and Pentesting MCP Servers!! pentest
Tue, 21 Apr 2026 13:33:52 GMT Kioptrix: 2014 — VulnHub Walkthrough pChart LFI + PhpTax RCE to... lfi
Mon, 13 Apr 2026 06:20:22 GMT Veeam Plaintext Credential Exposure PoC: From Local Access to Pri... security-research
Sat, 02 May 2026 04:43:46 GMT Copy Fail: Easily gained root access in system. exploit
Mon, 04 May 2026 16:15:17 GMT CVE-2021–42013 Apache HTTP Server 2.4.49 2.4.50 Remote Code Exe... cve
Sat, 02 May 2026 18:26:11 GMT Find SQL injection with burp Suite scanner bug-bounty-writeup
Sun, 19 Apr 2026 15:57:12 GMT XSS Bypass urlparse filter evasion in Python xss-bypass
Mon, 04 May 2026 15:22:47 GMT Bug no YouTube consome muita RAM: como evitar o travamento bugs
Fri, 13 Mar 2026 00:00:04 GMT File Inclusion | TryHackMe Write-up file-inclusion
Tue, 05 May 2026 04:01:23 GMT How I Obtained CVEs in WordPress Plugins Using Static Analysis En... cve
Mon, 26 Jan 2026 07:25:06 GMT How Forgotten DNS Records Lead to Subdomain Takeovers subdomain-takeover
Mon, 04 May 2026 10:31:01 GMT Breaking Down CVE-2026–31431 (“Copy Fail”): What You Need t... exploit, cve
Sat, 14 Mar 2026 18:06:12 GMT Web Security Series #3 — Discovering Credentials Using Cluster ... bug-bounty-hunting
Fri, 24 Apr 2026 18:42:37 GMT The HTTP 303 Hack — From Python HTTP Client Defaults to AWS Cre... ssrf
Wed, 29 Apr 2026 23:27:52 GMT XSS Sistemi Nasıl Manipüle Eder? xss-attack
Thu, 23 Apr 2026 00:58:15 GMT CSP bypass and Dangling Markup Xss cross-site-scripting
Sat, 28 Mar 2026 17:58:43 GMT I Built a Remote Code Execution Engine. remote-code-execution
Thu, 02 Apr 2026 18:59:50 GMT File Inclusion (LFI/RFI) — Extracting Sensitive Data from confi... local-file-inclusion, file-inclusion
Mon, 13 Apr 2026 22:31:01 GMT The Cost of Trusting My Own Fingers bounties
Tue, 05 May 2026 21:01:12 GMT Silencing EDR Network Telemetry: WFP Callout Patching via BYOVD infosec, pentesting
Wed, 29 Apr 2026 14:47:41 GMT The Dorking Manifesto: Uncovering the Hidden Web google-dorking
Thu, 30 Apr 2026 20:08:40 GMT IDOR via Weak JWT Validation Leading to Unauthorized Data Access information-disclosure, idor
Sun, 26 Apr 2026 23:11:15 GMT From Data Dumping to Bug Hunting: Building a Recon Pipeline That ... recon
Sat, 11 Apr 2026 05:28:40 GMT Pentester Recon 03 Write Up recon
Sun, 03 May 2026 07:35:55 GMT Your AI Stack is Publicly Searchable bugbounty-writeup
Fri, 19 Dec 2025 20:23:57 GMT How I Found an Unauthenticated XXE That Allowed Arbitrary File Re... vulnerability-disclosure
Tue, 05 May 2026 18:07:02 GMT LAB: Insecure Direct Object References (IDOR) idor
Wed, 29 Apr 2026 20:58:20 GMT Laboratorio de vulnerabilidades en el lado del cliente xss-vulnerability
Tue, 05 May 2026 21:05:20 GMT TryHackMe: Brooklyn Nine Nine — Two Paths to Root penetration-testing
Sun, 26 Apr 2026 17:13:53 GMT DiceForge (RCE) Bugforge rce
Tue, 28 Apr 2026 14:44:17 GMT Cross-Site Scripting: Serangan Tersembunyi di Balik Input Penggun... cross-site-scripting
Wed, 08 Apr 2026 22:09:58 GMT How I Discovered a Blind SQL Injection in a Private program bugcrowd
Tue, 05 May 2026 09:32:07 GMT Google Dorks — Advanced Search google-dorking, google-dork
Mon, 04 May 2026 18:17:58 GMT SSRF to Remote Java SPI Plugin Injection leading to RCE rce, ssrf
Tue, 21 Apr 2026 14:42:50 GMT Web Security Series # 16— Exploiting Local File Inclusion (LFI) file-inclusion
Thu, 30 Apr 2026 12:20:17 GMT Lab: Reflected XSS into HTML context with nothing encoded xss-attack
Wed, 25 Mar 2026 08:34:09 GMT Improper Input Handling Leading to Client Side Code Execution and... bug-bounty-hunter, vulnerability-disclosure
Sat, 18 Apr 2026 16:02:30 GMT When the Protector Becomes the Vector: Exploiting Microsoft Defen... exploit
Wed, 11 Feb 2026 21:37:40 GMT From Course Notes to CVE: How a GXPN Study Session Uncovered a 40... vulnerability-disclosure
Mon, 27 Apr 2026 07:20:55 GMT From {{3*3}} to $$$$: One Payload Changed Everything vapt
Sun, 12 Apr 2026 10:48:18 GMT Ubah Keterampilan Anda Menjadi ALPH: Panduan Hadiah Alphland bounty-program
Mon, 04 May 2026 17:42:05 GMT The Ghost Email: How Weak Validation Broke Authentication bug-bounty-tips, bug-bounty-writeup
Sun, 03 May 2026 15:12:55 GMT I Opened One API Endpoint and Accidentally Found of Student Recor... bugs
Wed, 22 Apr 2026 20:24:32 GMT URL-Based XSS xss-vulnerability
Fri, 06 Mar 2026 12:01:01 GMT Salí de compras y terminé en Roma bounty-program
Tue, 05 May 2026 15:38:14 GMT Write-Up: BugForge Daily Challenge Cheesy Does It pentesting
Sun, 03 May 2026 16:31:12 GMT Real Estate CRM Pentest: Broken Auth + IDOR + Stored XSS — Full... bug-bounty-writeup
Wed, 30 Apr 2025 17:08:29 GMT Exploring Subdomains: What They Are and How to Find Them subdomain-enumeration
Fri, 01 Aug 2025 06:17:06 GMT 15,000 Critical Systems Are Exposed — Thanks to This Outdat... censys
Wed, 01 Apr 2026 09:33:58 GMT How to earn VDS in Vadeus Network [Rewards Center] bounty-program
Sun, 03 May 2026 16:47:45 GMT Chaining Logic Flaws: From KYC Bypass to Authenticated Time-Based... bug-bounty-tips, bug-bounty-writeup
Tue, 31 Mar 2026 08:17:14 GMT Exploiting OData Wildcards: How I Scraped Tesla’s Internal Empl... bugcrowd
Thu, 27 Mar 2025 23:46:11 GMT Make Break and Betrayal web-pentest
Wed, 21 Jan 2026 15:09:15 GMT Lab: Weak isolation on dual-use endpoint | Portswigger web-cache-poisoning
Sat, 11 Apr 2026 13:56:44 GMT Top Cybersecurity Tools for Beginners: A Complete List (2026) |K... cybersecurity-tools
Sat, 04 Apr 2026 05:31:01 GMT Shodan + Censys Internet Ka X-Ray: Bina Scan Kiye Sab Kuch Dekho!... shodan
Tue, 11 Nov 2025 16:43:14 GMT Beyond Google: Navigating the Hidden Internet with Shodan and Cen... censys
Tue, 05 May 2026 23:19:11 GMT Sauna — HTB Writeup pentesting
Wed, 29 Apr 2026 18:17:30 GMT The Rise of Hackbots: How AI Is Transforming Cybersecurity hackerone
Tue, 21 Apr 2026 12:21:13 GMT 95% of PII Redaction Doesn’t Need an LLM. The Other 5% Is Where... information-disclosure
Tue, 05 May 2026 05:22:22 GMT JBoss 6 RCE Exploitation and Privilege Escalation via Misconfigur... rce
Sun, 03 May 2026 11:10:19 GMT Sistemleri Savunmak İçin Saldırmak – Pentest 101 pentest
Mon, 30 Mar 2026 06:03:13 GMT Why Business Directory Listings Are the Secret Weapon of Off-Page... directory-listing
Thu, 30 Apr 2026 04:43:43 GMT Intigriti April 2026 XSS Challenge Writeup bugbounty-writeup
Wed, 29 Apr 2026 04:45:44 GMT How I Found My First RCE — CVE-2026–37748 remote-code-execution
Sun, 14 Dec 2025 06:37:06 GMT My Bug Bounty Diary subdomain-enumeration
Fri, 01 May 2026 20:23:15 GMT Shodan Facet Searches That Read Like Threat Intel Poetry shodan
Mon, 04 May 2026 17:36:51 GMT The Complete Guide to Managed Cyber Defense: Protecting Your Busi... cyber-sec
Fri, 20 Mar 2026 05:45:47 GMT Cloudflare WAF Bypass Leading to Reflected XSS via SVG Injection xss-bypass
Fri, 01 May 2026 15:14:40 GMT Stored XSS to Privilege Escalation in Azuriom CMS — When “Tru... cross-site-scripting
Fri, 13 Mar 2026 02:31:00 GMT How I Use Google Dorking to Find Hidden Vulnerabilities google-dorking, google-dork
Mon, 13 Apr 2026 14:14:34 GMT Zero‑Touch RCE (Remote Code Execution) Attack remote-code-execution
Sun, 03 May 2026 18:55:57 GMT LFI to RCE: Remote File Inclusion and How Servers Execute Your Sh... local-file-inclusion
Thu, 20 Nov 2025 17:16:47 GMT The Health Factor: How DorkFi Keeps Your Position Safe dorks
Mon, 27 Apr 2026 02:01:01 GMT The Backend Engineer’s SSRF Playbook: Attack Vectors and Fixes ... ssrf
Sat, 25 Apr 2026 23:23:58 GMT How to Avoid Hardcoding API Keys in mcp.json api-key
Sat, 07 Mar 2026 04:09:52 GMT Threat Intelligence Investigation — Dropbox Phishing Domain Ana... google-dorking
Fri, 06 Jun 2025 15:47:21 GMT ️‍♂️ GitHub Dorking for Bug Bounty: Hackers' Hidden Playg... github-dorking
Sat, 21 Mar 2026 20:37:31 GMT Using Nmap Scanner vulnerability-scanning
Fri, 17 Apr 2026 19:01:54 GMT The Ultimate Guide to Wayback Machine Dorking for Deleted Leaks google-dorking, dorking
Mon, 04 May 2026 14:31:50 GMT Internal window Walkthrough (Proving Ground-play-OSCP) cve
Sun, 26 Apr 2026 16:31:24 GMT ️‍♂️ How I Find Critical Data Leaks Using Just Google Sea... google-dork
Thu, 19 Feb 2026 12:53:45 GMT Lab: Web cache poisoning via HTTP/2 request tunnelling | Portswi... web-cache-poisoning
Tue, 14 Apr 2026 13:07:05 GMT My “Gemini” Is Named Mike dorks
Wed, 22 Apr 2026 16:29:29 GMT Chaining Origin IP Leak to Blind SSRF ssrf
Tue, 05 May 2026 15:17:09 GMT 732 Bytes to Root: How Copy Fail Silently Affects Linux Systems cve
Mon, 04 May 2026 07:21:47 GMT A Missed Bug that caused a Major Breach: Lessons from Lovable Hac... hackerone
Sat, 25 Oct 2025 12:23:25 GMT How to find leaks on GitHub as a beginner. Logic is main key github-dorking
Sat, 20 Dec 2025 18:21:40 GMT N0aziXss SubSpectre: Advanced Subdomain Discovery with Intelligen... subdomain-enumeration
Tue, 17 Mar 2026 09:18:53 GMT Web Security Series #6 — Exploiting SQL Injection to Extract Se... bug-bounty-hunting
Mon, 09 Mar 2026 06:56:21 GMT File Inclusion Vulnerability: Easy concept explanation file-inclusion
Tue, 05 May 2026 23:07:41 GMT Vulnerability Data Enrichment for CVE Records: 261 CNAs on the En... vulnerability, infosec
Tue, 05 May 2026 22:10:53 GMT LFI Prevention: How to Actually Fix File Inclusion Vulnerabilitie... penetration-testing, web-security, local-file-inclusion
Thu, 04 Dec 2025 04:45:36 GMT What is Google Dorking? dorking
Tue, 14 Apr 2026 18:22:58 GMT File Upload Vulnerabilities remote-code-execution
Wed, 29 Apr 2026 12:52:39 GMT Build a Simple File Upload Website Using Azure Blob Storage file-upload
Tue, 10 Feb 2026 23:04:46 GMT Effective Dorking Tools dorking
Sun, 05 Apr 2026 05:02:34 GMT Exploiting an IPv6 Remote Code Execution Vulnerability: A Practic... remote-code-execution
Thu, 16 Apr 2026 18:45:06 GMT PENTEST: A arte da invasão ética e o caminho para a Segurança ... pentest
Thu, 02 Apr 2026 20:20:02 GMT What a Real Autonomous Recon Pipeline Looks Like recon
Thu, 29 Jan 2026 21:21:39 GMT Turning Fuzzing Into $2,550: How a Simple Bug Gave Me Access to E... bounties
Sat, 02 May 2026 18:54:51 GMT Proving Grounds |Pelican | OSCP Preparation bug-bounty-tips
Mon, 23 Mar 2026 11:04:28 GMT P1 Vulnerability File Upload by RCE: Apache Tomcat Manager Exploi... remote-code-execution
Fri, 01 May 2026 10:41:06 GMT From a Simple Image Upload to Account Takeover: Stored XSS via Fi... vapt
Sun, 03 May 2026 17:07:54 GMT 5 Spring Boot Production Problems (With Battle-Tested Fixes) bugs
Tue, 05 May 2026 04:50:20 GMT Everyone is talking about AI taking people’s jobs and even repl... hackerone
Mon, 04 May 2026 19:01:35 GMT LFI to RCE: Weaponizing File Uploads with PHP Shells local-file-inclusion
Thu, 12 Mar 2026 18:11:47 GMT A Simple P4 Bug That Ended as Duplicate bug-bounty-hunting
Mon, 20 Apr 2026 01:34:13 GMT I Asked AI To Hack My PHP App. It Did. Here’s How I Fixed It. cross-site-scripting
Sun, 23 Feb 2025 11:17:25 GMT $1000-$10k worth Leaks via Github Secret Dorks github-dorking
Thu, 16 Apr 2026 11:14:18 GMT Finance in Nigeria Just Moved to WhatsApp bounty-program
Fri, 27 Mar 2026 11:01:08 GMT Finding XSS Through HTML Injection — Without Fuzzing Tools xss-bypass
Thu, 26 Mar 2026 03:31:59 GMT IDOR on Tesla Disclosing Users’ Emails bug-bounty-hunter
Fri, 17 Apr 2026 15:51:57 GMT The 2026 Shodan Dork Bible: Finding Exposed Jenkins, Grafana, and... google-dork, shodan
Fri, 27 Mar 2026 03:29:10 GMT TryHackMe — File Inclusion (Walkthrough) file-inclusion
Tue, 10 Mar 2026 09:59:23 GMT I Thought I Found 259 Exposed Systems in Bengaluru… I Was Wrong shodan
Wed, 11 Mar 2026 09:56:42 GMT Hardening Keycloak: Implementing Security Pentest Requirements as... pentest
Thu, 02 Apr 2026 12:05:48 GMT IoT Cihazlar: Evinizde ki Yabancı shodan
Wed, 16 Jul 2025 12:07:42 GMT Hackers Love This 1979 Protocol (Because It Can’t Defend Itself... censys
Fri, 24 Apr 2026 10:26:01 GMT ¿Estás emocionado por el próximo partido entre FC Barcelona y ... bounty-program
Sun, 03 May 2026 11:01:27 GMT Parameter Index Manipulation Leading to Unauthorized Field Inject... bug-bounty-tips, hackerone, bug-bounty-writeup
Fri, 01 May 2026 07:49:18 GMT T̶A̶X̶ WAF Evasion: Escalating User-Controlled Input to Cross... cross-site-scripting
Sat, 18 Apr 2026 20:01:01 GMT Natural Capital, Deep Time, and What Refuses to Be Measured information-disclosure
Wed, 07 Jan 2026 00:58:19 GMT Why Your Cache Rules are Leaking User Data (Web Cache Deception) web-cache-poisoning
Sun, 03 May 2026 19:06:32 GMT Hacker101 CTF Walkthrough — A Little Something to Get You Start... hackerone
Sun, 12 Apr 2026 12:29:45 GMT პიროვნების ძიების სრული... google-dork
Thu, 30 Apr 2026 03:16:01 GMT Discovering a Stored XSS Vulnerability in a Blog Feature (Respons... xss-vulnerability
Mon, 04 May 2026 19:15:10 GMT From Directory Brute-Forcing to Real-Time GPS Tracking: Exploitin... bug-bounty-writeup
Mon, 04 May 2026 05:58:35 GMT Zero to Hero DevSecOps Roadmap (Future-Ready Security Engineer G... application-security
Thu, 30 Apr 2026 13:32:10 GMT TryHack3M: Bricks Heist | TryHackMe Challenge Walkthrough rce
Fri, 20 Feb 2026 14:44:02 GMT XSS Attack Methodology: How Attackers Actually Exploit Your Brows... xss-bypass
Tue, 05 May 2026 12:01:27 GMT What Happens When You Log In to a Website?! pentesting
Thu, 11 Sep 2025 22:20:14 GMT It’s Coming: DorkFi Delivers PreFi Rewards Surge dorking
Tue, 14 Apr 2026 21:27:21 GMT Language-Specific File Upload Exploits and EXIF-Based Attacks rce
Sat, 25 Apr 2026 20:00:13 GMT IDOR….will help you to get bounty idor
Sat, 02 May 2026 01:22:29 GMT Penetration Testing Report: Authorized Security Assessment of Bit... pentest
Mon, 27 Apr 2026 06:17:15 GMT Upload รูปภาพขึ้น Google Cloud Storage แบ... file-upload
Sun, 22 Mar 2026 10:40:15 GMT DVWA: File Inclusion Vulnerability (Low Security) file-inclusion
Sat, 11 Apr 2026 04:30:12 GMT Introduction to Cross-Site Scripting (XSS) — TryHackMe Walkthro... cross-site-scripting
Tue, 28 Apr 2026 10:03:47 GMT Bypassing File Upload Limits via Race Condition hackerone, bugbounty-writeup
Sun, 07 Dec 2025 06:18:32 GMT Breaking the Perimeter: How My Custom Python Tool Bypassed a Fede... vdp
Sat, 25 Apr 2026 17:32:01 GMT Bug Bounty Automation with n8n Ep.1 ssrf
Mon, 20 Apr 2026 13:01:27 GMT AI-Driven Penetration Testing: Integrating Kali Linux Arsenal wit... pentest
Mon, 27 Apr 2026 02:31:01 GMT AI for Frontend Developers — Day 37 file-upload
Fri, 11 Jul 2025 16:20:24 GMT PC WORX: The Hidden Risk in Your Industrial Network censys
Tue, 05 May 2026 16:46:23 GMT Securing MCP Connectors application-security
Wed, 28 Jan 2026 07:31:37 GMT Lab: Targeted web cache poisoning using an unknown header | Port... web-cache-poisoning
Sun, 03 May 2026 14:59:22 GMT Your secrets deserve better than plaintext: why I designed Keyden... api-key
Fri, 01 May 2026 18:00:35 GMT Copy Fail: The 732-Byte Exploit That Roots Nearly a Decade of Lin... exploit
Mon, 04 May 2026 12:01:06 GMT Recon Is Never Useless: From a Simple Info Leak to Full Administr... vapt
Thu, 09 Apr 2026 17:40:41 GMT I Got Tired of Running 15 Different Nmap Commands. So I Built My ... vulnerability-scanning
Fri, 01 May 2026 18:07:44 GMT How I Turned $3 Into 8 Paid Bugs bug-bounty-hunter
Sun, 15 Mar 2026 16:45:35 GMT Web Security Series #4 — Discovering Unauthorized Resources via... bug-bounty-hunting
Fri, 01 May 2026 20:49:29 GMT Stop Hardcoding Bytes: file-upload
Fri, 23 May 2025 06:02:53 GMT Search Skills censys