Skip to content

rix4uni/medium-writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

45,511 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Time Title Feed IsNew IsToday
Wed, 08 Apr 2026 22:49:37 GMT Project Glasswing and Claude Mythos: AI That Finds Bugs Humans Mi... cybersecurity Yes Yes
Wed, 08 Apr 2026 22:40:22 GMT The Helpful Internal Adversary: How AI threatens your data penetration-testing, hacking Yes Yes
Wed, 08 Apr 2026 22:32:00 GMT The Human-in-the-Loop Illusion: Why Your AI “Safety Gate� is ... cybersecurity Yes Yes
Wed, 08 Apr 2026 22:54:56 GMT What Is SkyeProfile? Eight Experts, One Call, Complete Wallet Tru... security Yes Yes
Wed, 08 Apr 2026 22:52:46 GMT Git Leaks — Quais seus benefícios? security Yes Yes
Wed, 08 Apr 2026 22:30:54 GMT 20 Linux Commands That Will Make You Look Like a Pro (Even If You... cybersecurity Yes Yes
Wed, 08 Apr 2026 21:14:38 GMT O risco de ser verdadeiro vulnerability Yes
Wed, 08 Apr 2026 16:25:52 GMT Claude Mythos Preview: When Your AI Can Find Bugs Better Than You... cyber-security-awareness Yes
Wed, 08 Apr 2026 08:14:57 GMT Why Session Management Fails and How to Fix It Properly web-security Yes
Wed, 08 Apr 2026 15:21:31 GMT Designing Organizations for Failure, Not Just Defense cyber-security-awareness Yes
Wed, 08 Apr 2026 18:32:01 GMT Episode 1: Why Hackers Love Linux (The Hacker’s Path Series) hacking, ethical-hacking Yes
Wed, 08 Apr 2026 06:04:12 GMT Docker Pentesting: Types of Vulnerabilities You Must Know pentesting Yes
Wed, 08 Apr 2026 10:02:26 GMT Why Do You Still Use Google Antigravity? bugs Yes
Wed, 08 Apr 2026 19:46:01 GMT The Identity Illusion in AI Integration vulnerability Yes
Wed, 08 Apr 2026 20:05:29 GMT Wawasan Dunia: Kunci Memahami Perubahan Global dan Menjadi Indivi... information-technology, information-security Yes
Wed, 08 Apr 2026 21:49:47 GMT The Hidden Dangers of Uploading Sensitive Documents to Online PDF... security Yes
Wed, 08 Apr 2026 03:08:04 GMT Book lists I recommend pentesting Yes
Wed, 08 Apr 2026 20:43:49 GMT How I Became an Organization Owner via Invite Manipulation (Privi... penetration-testing, bug-bounty-tips, bug-bounty-writeup Yes
Wed, 08 Apr 2026 05:32:44 GMT Deliberately Vulnerable Android App Covering Every OWASP Mobile T... pentesting Yes
Wed, 08 Apr 2026 11:57:00 GMT Building Phishing Detection That Works: 3 Steps for CISOs cyber-security-awareness Yes
Wed, 08 Apr 2026 06:30:12 GMT Temodar Agent: Opening the Door to AI‑Powered WordPress Securit... bug-bounty-writeup Yes
Wed, 08 Apr 2026 08:46:11 GMT Practical JavaScript Recon for Bug Bounty: A Real-World Passive-F... web-security, recon Yes
Wed, 08 Apr 2026 11:28:59 GMT Massive Data Leak Surfaces on the Dark Web: Multiple Companies Ex... cyber-security-awareness Yes
Wed, 08 Apr 2026 03:36:21 GMT The Importance of Security: How VAPT by TrustLayerLabs Protects M... vapt Yes
Wed, 08 Apr 2026 13:55:16 GMT Phishing Basics (THM) Tryhackme Walkthrough With Answer penetration-testing Yes
Wed, 08 Apr 2026 20:11:40 GMT Java or Python? The Question Every Student Asks, I Was Confused T... information-technology Yes
Wed, 08 Apr 2026 01:23:56 GMT I Found a “Hidden� API Bug That Could Have Paid $2,000+ — ... bug-bounty-writeup Yes
Wed, 08 Apr 2026 13:28:47 GMT Wgel CTF — TryHackMe WriteUp penetration-testing Yes
Wed, 08 Apr 2026 18:42:31 GMT Anthropic has leaked data information-technology Yes
Wed, 08 Apr 2026 15:01:39 GMT The Model That Broke the Patch Cycle: Why Anthropic is Terrified ... vulnerability Yes
Wed, 08 Apr 2026 17:36:17 GMT Hacked Routers Expose Microsoft 365 Logins cyber-security-awareness Yes
Wed, 08 Apr 2026 13:41:55 GMT Observations with my Right Eye — Day 10 — In the Head and in ... vulnerability Yes
Wed, 08 Apr 2026 18:21:10 GMT SMB Enumeration & Exploitation: From Zero to Full Access by Mert ... penetration-testing, ethical-hacking Yes
Wed, 08 Apr 2026 21:01:01 GMT Unfiltered Restart — Day 44: Test Prep, Day 3 information-technology Yes
Wed, 08 Apr 2026 12:49:05 GMT Android APK Vulnerability Research Complete Guide vulnerability Yes
Wed, 08 Apr 2026 16:09:23 GMT Information Technology: Meaning, Importance, Uses, and Future Tre... information-technology Yes
Wed, 08 Apr 2026 05:52:04 GMT Getting Started with Cybersecurity: A Beginner’s Guide by Ranje... vapt Yes
Wed, 08 Apr 2026 18:48:14 GMT Day 13: Hacking the Human — The Psychology of Social Engineerin... ethical-hacking Yes
Wed, 08 Apr 2026 10:38:42 GMT Cognitive Adaptive Self-Healing Security: Building a Security Pol... cyber-security-awareness Yes
Wed, 08 Apr 2026 19:15:50 GMT Water Bottle Tryhackme Writeup bug-bounty Yes
Wed, 08 Apr 2026 11:54:16 GMT Your Vibe-Coded App Almost Certainly Has Security Holes. Here’s... application-security Yes
Wed, 08 Apr 2026 09:52:07 GMT The 2026 RBI VAPT Mandate cyber-security-awareness Yes
Wed, 08 Apr 2026 22:01:45 GMT SOC Journey — Lab 5: Process Tracking (Windows) cybersecurity Yes
Wed, 08 Apr 2026 15:41:49 GMT Making Users Strong Again: How Rainbow Secure Is Making Phishing ... cyber-security-awareness Yes
Wed, 08 Apr 2026 22:11:52 GMT Five Ways to Build a Security Roadmap with AI — The Last One Ch... cybersecurity Yes
Wed, 08 Apr 2026 12:34:49 GMT Reversing XAMARIN Mobile Applications hacking Yes
Wed, 08 Apr 2026 16:02:00 GMT The First Analysts information-technology Yes
Wed, 08 Apr 2026 13:17:34 GMT Modern NDR: What to Look for (and What to Avoid) cyber-security-awareness Yes
Wed, 08 Apr 2026 14:12:11 GMT Attack Surface Management (ASM): Kendi Varlıklarını Bir Hacker... bug-bounty, pentesting Yes
Wed, 08 Apr 2026 10:52:05 GMT McAfee technical support Australia information-security Yes
Wed, 08 Apr 2026 20:12:15 GMT When Real-Time Becomes Real Risk: A WebSocket Security Lesson fro... security, vulnerability Yes
Wed, 08 Apr 2026 13:09:08 GMT PoC: Nginx UI CVE-2026–27944 hacking Yes
Wed, 08 Apr 2026 15:46:01 GMT CI Testing is Broken — Here’s How We Fixed It with 10x Smarte... penetration-testing Yes
Wed, 08 Apr 2026 18:27:53 GMT How I Found 2 Path Traversal CVEs in PraisonAI Using AI ethical-hacking Yes
Wed, 08 Apr 2026 22:09:58 GMT How I Discovered a Blind SQL Injection in a Private program bug-bounty, hacking, hackerone, bugcrowd, bugbounty-writeup Yes
Wed, 08 Apr 2026 12:20:35 GMT Rockets and Feathers: An Economic Theory That Explains Your Bigge... infosec Yes
Wed, 08 Apr 2026 20:24:00 GMT Stop Guessing XSS Payloads bug-bounty, web-security, cross-site-scripting, ethical-hacking Yes
Wed, 08 Apr 2026 15:52:36 GMT McAfee Antivirus Technical Support Phone Number UK information-technology, information-security Yes
Wed, 08 Apr 2026 19:12:42 GMT Understanding Dark Web AI Scams and Emerging Online Risks infosec Yes
Wed, 08 Apr 2026 12:35:53 GMT How I Created and Shared a Vulnerable EXE Lab (Step-by-Step Setup... information-security Yes
Wed, 08 Apr 2026 07:42:10 GMT 10 Recent Exploits Every Cybersecurity Professional Should Know (... bug-bounty-writeup Yes
Wed, 08 Apr 2026 18:41:35 GMT Anthropic ทำข้อมูลหลุด information-technology Yes
Wed, 08 Apr 2026 16:49:12 GMT Powering the Future: Why India’s Latest Nuclear Milestone is a ... information-technology Yes
Wed, 08 Apr 2026 19:31:38 GMT Pentester Labs Recon 00 write up pentesting, recon Yes
Wed, 08 Apr 2026 20:38:15 GMT Alpine vs Distroless : quelle image Docker choisir pour la produc... security Yes
Wed, 08 Apr 2026 12:21:39 GMT You Don’t Need an IP API to Know Where Your Users Are information-security Yes
Wed, 08 Apr 2026 14:08:24 GMT API Security: Modern Web’in Görünmez Saldırı Yüzeyi infosec Yes
Wed, 08 Apr 2026 22:02:40 GMT AI, Deepfakes and the Dark Web - WiCyS 2026 (Women in Cybersecuri... cybersecurity Yes
Wed, 08 Apr 2026 13:31:24 GMT Hunting on Flipkart: When Product Specs Become Payloads penetration-testing, google-dork Yes
Wed, 08 Apr 2026 21:30:32 GMT WHAT NOW, NIGERIA? (A CREATIVERSAL PUBLICATION) security Yes
Wed, 08 Apr 2026 10:52:46 GMT Post 11: CSRF, CORS & Open Redirects (Manipulating User Actions) bug-bounty-tips Yes
Wed, 08 Apr 2026 22:01:42 GMT My SC-900 Learning Journey (Day 10) — Understanding the Microso... security, cybersecurity Yes
Wed, 08 Apr 2026 16:12:06 GMT Southampton now join City, Chelsea, and Leeds in the last four ... information-security Yes
Wed, 08 Apr 2026 11:13:41 GMT Cross Site Template Injection xss-attack Yes
Wed, 08 Apr 2026 16:53:40 GMT Testing .NET MAUI Android Apps: A Penetration Tester’s Guide penetration-testing Yes
Wed, 08 Apr 2026 14:30:58 GMT SOC LEVEL 2: SPLUNK FULL GUIDE. information-security Yes
Wed, 08 Apr 2026 11:51:49 GMT Goodbye S3 SDK! AWS Just Turned Every Bucket Into a High-Speed Ha... file-upload Yes
Wed, 08 Apr 2026 19:01:49 GMT eJPT Exploitation CTF 2 - Walkthrough penetration-testing, infosec, ethical-hacking Yes
Wed, 08 Apr 2026 13:36:15 GMT WP FILE UPLOAD PLUGIN file-upload Yes
Wed, 08 Apr 2026 19:43:48 GMT State Management + Security: Why Sensitive Data Needs a Runtime, ... security Yes
Wed, 08 Apr 2026 12:05:06 GMT Web-RTA Certification: A Hands-On Journey in Modern Web Exploitat... application-security Yes
Wed, 08 Apr 2026 16:02:24 GMT Yahoo Technical Support Services UK information-technology, information-security Yes
Wed, 08 Apr 2026 13:19:16 GMT When AI Finds What Humans Missed for 13 Years vulnerability Yes
Wed, 08 Apr 2026 12:45:36 GMT Unauthorized Access to Premium Content via Client-Side Security F... bug-bounty-tips, bug-bounty-writeup Yes
Wed, 08 Apr 2026 18:50:10 GMT Day 14: Intercepting the Wire — Packet Sniffing and Man-in-the-... ethical-hacking Yes
Wed, 08 Apr 2026 14:59:07 GMT Let’s Break Stuff: Why Minimizing Disruption is the Biggest Myt... vulnerability Yes
Wed, 08 Apr 2026 12:06:01 GMT Turbo Intruder: The Burp Suite Extension That Makes Community Edi... web-security Yes
Wed, 08 Apr 2026 04:41:38 GMT Evolved Scanning based on LLM technologies — From .env web-security Yes
Wed, 08 Apr 2026 16:23:25 GMT Shodan Recon Important Stuff bug-bounty Yes
Wed, 08 Apr 2026 12:56:29 GMT The Dawn of AI Hackers: What Anthropic’s Claude Mythos Means fo... infosec Yes
Wed, 08 Apr 2026 12:28:21 GMT JADX + MCP: I let the AI read the APK so I don’t have to application-security Yes
Wed, 08 Apr 2026 21:25:12 GMT Tryhackme Write-up: Corp Website (Romance and Co) 2026 bug-bounty Yes
Wed, 08 Apr 2026 11:59:48 GMT WordPress Plugin Vulnerabilities in 2026: The Attack Surface Most... web-security Yes
Wed, 08 Apr 2026 08:00:36 GMT Building a SOC Tool From Scratch as a Cybersecurity Student cybersecurity-tools Yes
Wed, 08 Apr 2026 19:12:52 GMT Thinking Like an Attacker: Inside APT28’s Silent War cyber-security-awareness Yes
Wed, 08 Apr 2026 07:56:14 GMT The Most Expensive Line of Code I Ever Deployed bugs Yes
Wed, 08 Apr 2026 18:41:50 GMT HackTheBox OverWatch CTF Writup hacking Yes
Wed, 08 Apr 2026 17:42:20 GMT Cookies Theft | Hire Professional Hacker | Hacking Services hacking Yes
Wed, 08 Apr 2026 20:11:01 GMT Smart Leaders Treat AI Like Fire security Yes
Wed, 08 Apr 2026 16:02:55 GMT CVE-2026–0233 The Fliegenfalle: Turning a THOR Alert into SYSTE... rce, cve Yes
Wed, 08 Apr 2026 16:08:34 GMT From Zero to Bug Bounty Hunter in 59 Days (Day 01) bug-bounty, infosec Yes
Wed, 08 Apr 2026 15:23:38 GMT The Shared Emotional Field of Senior Living vulnerability Yes
Wed, 08 Apr 2026 18:20:08 GMT Top 5 Beginner Vulnerabilities Every Bug Bounty Hunter Should Lea... bug-bounty, web-security, ethical-hacking Yes
Wed, 08 Apr 2026 19:09:21 GMT CVE-2026–23398: PoC — A NULL Pointer in ICMP Tag Validation, ... hacking, exploit Yes
Wed, 08 Apr 2026 07:46:28 GMT Token Theft: The Attack That Bypasses Login Completely web-security Yes
Wed, 08 Apr 2026 22:02:38 GMT Prompt Injection Is the New SQL Injection — And Most AI Apps A... cybersecurity Yes
Wed, 08 Apr 2026 17:46:20 GMT When Favoriting Goes Rogue: Broken Access Control Flaw. � bug-bounty, bug-bounty-tips, ethical-hacking, application-security Yes
Wed, 08 Apr 2026 21:59:25 GMT Ciberseguridad en el campo: el nuevo riesgo que muchos productore... cybersecurity Yes
Wed, 08 Apr 2026 11:18:51 GMT My 2026 Q1 Pentesting Arsenal: Custom Tools & Scripts pentesting, information-security Yes
Wed, 08 Apr 2026 10:40:06 GMT HTTP vs HTTPS — What Really Changes When That Lock Appears? infosec Yes
Wed, 08 Apr 2026 01:23:59 GMT From Low Bug to $1000 Bounty — The Privilege Escalation Playbo... bug-bounty-writeup Yes
Wed, 08 Apr 2026 16:07:57 GMT Custom C2 Agents for Red Team Operations hacking, infosec, pentesting Yes
Wed, 08 Apr 2026 16:19:52 GMT Welcome �♂�| Hack Smarter Walkthrough penetration-testing, information-security, ethical-hacking Yes
Wed, 08 Apr 2026 22:03:33 GMT Why TTX Should Be Your Worst Nightmare - WiCyS 2026 (Women in Cyb... cybersecurity, infosec Yes
Wed, 01 Apr 2026 07:55:42 GMT CVE-2026–24018: A Logic flaw to Local Privilege Escalation 0day... exploit, security-research
Tue, 31 Mar 2026 13:47:32 GMT Cybersecurity Trends in 2026: Protecting the Digital Future cybersecurity-tools
Sun, 15 Mar 2026 17:49:52 GMT TryHackMe — Takeover Writeup subdomain-takeover
Tue, 31 Mar 2026 14:47:06 GMT Web Security Series #13 — Command Injection Exploitation (Rever... cross-site-scripting
Fri, 20 Feb 2026 17:56:31 GMT TryHackMe — Include — Walkthrough local-file-inclusion
Mon, 30 Mar 2026 16:47:34 GMT Domain Spoofing via Unicode Homoglyphs: A Practical Breakdown vapt
Thu, 20 Nov 2025 17:16:47 GMT The Health Factor: How DorkFi Keeps Your Position Safe dorks
Thu, 13 Mar 2025 18:09:56 GMT How I Found Sensitive Information using Github Dorks in Bug Bount... github-dorking
Wed, 25 Feb 2026 14:23:06 GMT Lo-Fi TryHackMe Writeup lfi, file-inclusion
Tue, 07 Apr 2026 20:21:51 GMT Production’da Yaşanan Bir Bug Nasıl Günlerce Bulunamaz? bugs
Tue, 18 Nov 2025 13:26:47 GMT GitHub Dorking: The Hunter’s Guide to Finding Secrets in Public... github-dorking
Tue, 31 Mar 2026 21:48:32 GMT Venus Protocol: THE Market Donation Attack exploit
Wed, 07 Jan 2026 00:58:19 GMT Why Your Cache Rules are Leaking User Data (Web Cache Deception) web-cache-poisoning
Mon, 16 Feb 2026 04:16:35 GMT Gratuité des transports au Mans : une promesse audacieuse de LFI lfi
Thu, 13 Feb 2025 03:29:37 GMT ZoomEye Meets DeepSeek: AI-Powered Cyberspace Intelligence zoomeye
Thu, 04 Dec 2025 05:32:24 GMT ChainBounty Rewards & Bonus Guide — December 2025 bounties
Thu, 02 Apr 2026 12:05:48 GMT IoT Cihazlar: Evinizde ki Yabancı shodan
Thu, 19 Mar 2026 22:46:44 GMT How I Earned $76,000 From a Single Program on Bugcrowd bugcrowd
Sat, 04 Jan 2025 17:20:23 GMT GitHub dork github-dorking
Mon, 30 Mar 2026 12:28:22 GMT API Access Explained: Everything You Need to Know to Get Started api-key
Wed, 04 Mar 2026 20:13:26 GMT How I Got 3 Bugs No Automation, Just Logic information-disclosure
Mon, 26 Jan 2026 02:10:21 GMT The Truth About Internet Capital Markets bounty-program
Tue, 07 Apr 2026 18:10:50 GMT 7 Mistakes That Are Killing Your Bug Bounty Progress (Fix Them N... bug-bounty-tips
Mon, 21 Jul 2025 14:07:41 GMT “403 Forbidden? vdp
Mon, 30 Mar 2026 03:28:04 GMT Understanding API Security by Building, Exploiting, and Hardening... ssrf
Thu, 11 Sep 2025 22:20:14 GMT It’s Coming: DorkFi Delivers PreFi Rewards Surge dorking
Mon, 30 Mar 2026 13:22:15 GMT Web Security Series #12 — Cookie Theft via Stored XSS cross-site-scripting
Sat, 14 Feb 2026 19:47:58 GMT Pentest+ in 90 Days or Less (Hopefully) pentest
Thu, 02 Apr 2026 20:20:02 GMT What a Real Autonomous Recon Pipeline Looks Like recon
Fri, 03 Apr 2026 07:21:16 GMT Why API Key Security Should Be Your Startup’s First Priority api-key
Thu, 26 Mar 2026 03:31:59 GMT IDOR on Tesla Disclosing Users’ Emails bug-bounty-hunter
Sun, 28 Dec 2025 08:13:44 GMT Subzy Tool subdomain-takeover
Mon, 17 Nov 2025 09:27:29 GMT 200 reports, 11 valid bugs, 0 critical issues. Here’s everythin... vdp
Tue, 24 Mar 2026 17:48:00 GMT The Ultimate Bug Bounty Course: From Zero to Advanced Hacker 1 bug-bounty-hunting
Tue, 06 Jan 2026 16:02:54 GMT Spider-Man, Google Dorks e OSINT: quando cercare diventa un super... google-dorking
Thu, 19 Feb 2026 12:53:45 GMT Lab: Web cache poisoning via HTTP/2 request tunnelling | Portswi... web-cache-poisoning
Fri, 06 Jun 2025 15:47:21 GMT ��♂� GitHub Dorking for Bug Bounty: Hackers' Hidden Playg... github-dorking
Wed, 03 Dec 2025 23:26:26 GMT TryHackMe-TakeOver-WriteUp subdomain-takeover
Sun, 05 Apr 2026 14:45:38 GMT Lab: Stored XSS into HTML context with nothing encoded xss-attack
Sun, 29 Mar 2026 20:36:11 GMT XSS (Cross-Site Scripting) cross-site-scripting
Tue, 24 Feb 2026 07:38:15 GMT Glassdoor’s IDOR vulnerability to retrieve email addresses of a... bounty-program
Wed, 03 Dec 2025 18:29:09 GMT How I Discovered a Flaw That Let Me Access Enterprise-Only Featur... bounty-program
Wed, 19 Nov 2025 19:44:02 GMT The Pulse of Liquidity: How DorkFi’s Interest Rates Adapt in Re... dorks
Fri, 12 Dec 2025 06:49:56 GMT How Variable Data Technology is Transforming Postcard & Brochure ... vdp
Mon, 16 Mar 2026 16:35:28 GMT Hackerlar Nasıl Düşünür? security-research
Sun, 05 Apr 2026 10:00:47 GMT CVE-2024–48061 Walkthrough (Proving Ground-OSCP) cve
Sat, 14 Feb 2026 05:46:19 GMT CVE-2025–4406 Writeup: Stored XSS on wpForo Forum xss-bypass
Sat, 28 Feb 2026 09:31:10 GMT Google Dork’un Pentest Yaşam Döngüsündeki Yeri google-dork
Sun, 22 Mar 2026 10:40:15 GMT DVWA: File Inclusion Vulnerability (Low Security) local-file-inclusion, file-inclusion
Sun, 22 Feb 2026 20:52:28 GMT How I Became a PAPA (Practical AI Pentest Associate) by TCM pentest
Mon, 06 Apr 2026 21:18:18 GMT CVE-2024–27292 Walkthrough (Proving Ground-OSCP) cve
Tue, 03 Mar 2026 05:34:39 GMT Documenting my journey. cyber-sec
Fri, 03 Apr 2026 11:33:28 GMT SameSite Strict Bypass via Sibling Domain (CSWSH) — Practical W... xss-attack
Sat, 07 Mar 2026 12:52:14 GMT The God-Mode Leak: How One JavaScript Variable Toppled an Entire ... bug-bounty-hunter
Tue, 12 Aug 2025 17:24:22 GMT How I Removed Other User`s Uploaded Images in a Few Clicks bug-bounty-program
Mon, 02 Mar 2026 04:32:17 GMT Cybersicherheits-Check für KMU: Die unterschätzte Alternative z... pentest
Mon, 08 Dec 2025 11:02:43 GMT Comisiones de trading DESACTIVADAS! bounty-program
Wed, 17 Dec 2025 09:57:30 GMT The Mother Lode: Hacking with GitHub Dorking github-dorking
Wed, 04 Mar 2026 03:20:45 GMT Why PHP Errors Only Appear in Production — And How to Fix Them file-inclusion
Sat, 20 Dec 2025 18:21:40 GMT N0aziXss SubSpectre: Advanced Subdomain Discovery with Intelligen... subdomain-enumeration
Sat, 28 Feb 2026 07:39:59 GMT CYBERDUDEBIVASH® SSRF Filter + Secure Proxy Service v1.0.0 cybersecurity-tools
Sun, 05 Apr 2026 05:02:34 GMT Exploiting an IPv6 Remote Code Execution Vulnerability: A Practic... remote-code-execution
Thu, 12 Mar 2026 18:11:47 GMT A Simple P4 Bug That Ended as Duplicate bug-bounty-hunting
Fri, 19 Sep 2025 07:40:16 GMT How I Tracked Our Clients’ Device Versions Without Direct Repor... zoomeye
Mon, 02 Mar 2026 00:00:27 GMT TakeOver | TryHackMe Write-up | Farros subdomain-takeover
Sun, 05 Apr 2026 12:44:38 GMT Comment une faille XSS peut vider un compte bancaire cross-site-scripting
Mon, 06 Apr 2026 11:37:41 GMT The Bug Bounty Checklist That Turns Beginners Into Hackers The Da... bug-bounty-writeup
Sat, 06 Dec 2025 08:29:35 GMT The Midnight Epiphany: How a News Notification Cracked My Stubbor... vulnerability-disclosure
Sat, 06 Dec 2025 23:06:15 GMT Big News from DorkFi — PreFi Rewards Drop + Contest Live! dorks
Tue, 05 Aug 2025 00:19:11 GMT Breaking Recon with AMASS subdomain-enumeration
Sun, 21 Sep 2025 03:55:56 GMT Is it easy to discover a critical vulnerability [P1] ? directory-listing
Tue, 07 Apr 2026 09:46:46 GMT Enterprise Application Integration Solutions: The Complete Guide ... application-security
Wed, 18 Feb 2026 21:56:48 GMT Chapter 14: Subdomain Takeover subdomain-takeover
Fri, 03 Apr 2026 05:30:39 GMT Corridor Walkthrough — TryHackMe idor
Wed, 11 Feb 2026 19:07:33 GMT Google Search Operators You Can Use google-dork
Sat, 04 Apr 2026 09:38:32 GMT CVE-2024–25180 Walkthrough (Proving Ground-OSCP) cve
Sat, 28 Mar 2026 06:56:48 GMT The Definitive Guide to Secret Management in Python AI Projects api-key
Sun, 08 Mar 2026 11:01:01 GMT I Paid $500 for AI Directory Listings. Here Is My Honest ROI Brea... directory-listing
Thu, 14 Aug 2025 10:54:38 GMT Unlocking the Hidden Power of Search Engines censys
Sat, 24 Jan 2026 06:47:12 GMT Google Dorkware Pro google-dorking, google-dork
Mon, 23 Mar 2026 06:32:32 GMT What Is Remote Code Execution (RCE)? How It Works, Risks & Preven... remote-code-execution
Thu, 26 Mar 2026 00:32:02 GMT Révolution Lumière lfi
Sat, 28 Feb 2026 21:11:37 GMT I Shouldn’t Be Sharing This: The 2026 Google Dork Bible That St... google-dork
Mon, 06 Apr 2026 10:39:59 GMT Bug Bounty / Web Application Security Hunting Checklist - 2026 XS... bug-bounty-hunter
Fri, 27 Feb 2026 00:44:16 GMT Walkthrough: Web Application Attacks - XSS, SQL Injections, Direc... local-file-inclusion
Fri, 26 Dec 2025 07:43:53 GMT Beginner's Guide to Claiming BOUNTY Airdrop — Claim Up To $50,0... bounties
Tue, 24 Feb 2026 23:01:09 GMT A Step-by-Step Guide to Uncovering Vulnerabilities in a Mobile Ap... lfi
Sun, 29 Mar 2026 19:09:33 GMT TryHackMe | Plant Photographer Walkthrough ssrf
Thu, 12 Feb 2026 03:21:30 GMT Lumma Stealer dan Evolusi Social Engineering pentest
Mon, 02 Feb 2026 11:59:59 GMT El cashback está en el aire bounty-program
Mon, 06 Apr 2026 14:15:36 GMT Exploiting BOLA and Broken Authentication in DVRA API bugs
Mon, 23 Mar 2026 14:36:00 GMT ClamAV ile Spring Boot’ta Virüs Taraması file-upload
Sun, 05 Apr 2026 08:08:21 GMT How I Built an Automated Recon Pipeline for Bug Bounty Hunting recon
Tue, 18 Nov 2025 18:12:40 GMT Dork Labs Awarded AWS Activate Startup Grant dorks
Fri, 27 Mar 2026 01:57:54 GMT DarkSword: A Sophisticated iPhone Spyware Threat Targeting Malays... exploit
Thu, 26 Mar 2026 17:17:23 GMT Venus Protocol, IoTeX, and SOF Token Exploits: $6.65M exploit
Thu, 19 Mar 2026 22:19:50 GMT Vulnerability Scanning 101: How to Manage Your Vulnerabilities vulnerability-scanning
Thu, 26 Feb 2026 00:47:58 GMT From Shodan Recon to Multiple Security Flaws in the Same Program shodan
Thu, 20 Nov 2025 09:45:04 GMT Timber Doors in Surrey: Style, Durability, and Value Explained dorking
Sun, 29 Mar 2026 07:01:15 GMT �Log Injection & sshguard Bypass in pfSense 2.8.0 — A Securit... exploit
Fri, 28 Jun 2024 14:51:14 GMT X-Forwarded HTTP header-ləri : Qısa izah log-poisoning
Fri, 03 Apr 2026 16:28:52 GMT The Bugs No Scanner Will Ever Find idor
Wed, 11 Mar 2026 17:16:42 GMT Secure and Scalable File Uploads/Downloads to S3 via CloudFront file-upload
Tue, 09 Sep 2025 10:14:01 GMT The Psychology of Listings: Why Users Trust Some Directories More... directory-listing
Thu, 26 Mar 2026 14:29:57 GMT Your SSH Keys, API Credentials, and AI Secrets Are at Risk — Th... api-key
Fri, 20 Feb 2026 18:55:00 GMT 12+ MUST Know Google Dorking Commands in 2026 google-dorking
Thu, 02 Apr 2026 18:59:50 GMT File Inclusion (LFI/RFI) — Extracting Sensitive Data from confi... local-file-inclusion, file-inclusion
Mon, 17 Nov 2025 23:45:18 GMT DorkFi: The Triumph of a Team You Can Trust dorks
Wed, 14 Jan 2026 09:06:30 GMT Lab: Web cache poisoning via an unkeyed query string | Portswige... web-cache-poisoning
Mon, 11 Dec 2023 18:17:01 GMT Exploiting a Log Poisoning. log-poisoning
Sat, 04 Apr 2026 03:01:19 GMT Investigating Wazuh CVE-2026-25769: When Trusted Systems Become t... cve
Mon, 06 Apr 2026 06:22:38 GMT Bug Bounty: JSONP Callback Vulnerability Explained xss-vulnerability
Thu, 12 Mar 2026 22:51:26 GMT Payment Bypass That Let Me Get a Premium Course for $0 [Business... bugcrowd
Fri, 27 Mar 2026 11:58:55 GMT Why Beginners Fail in Bug Bounty (And How to Fix It in 2026) bug-bounty-hunter
Sun, 23 Feb 2025 11:17:25 GMT $1000-$10k worth Leaks via Github Secret Dorks github-dorking
Fri, 13 Mar 2026 00:00:04 GMT File Inclusion | TryHackMe Write-up | Farros file-inclusion
Tue, 07 Apr 2026 22:27:25 GMT Web Uygulamalarında Veri Giriş Güvenliği: HTML Injection ve X... web-security
Mon, 06 Apr 2026 01:55:11 GMT HTB CCTV: Chaining Recent CVEs for Root Access bugbounty-writeup
Tue, 18 Nov 2025 08:33:41 GMT A Chain of Vulnerabilities Leading to Critical Information Disclo... bug-bounty-program
Mon, 23 Mar 2026 11:04:28 GMT File Upload by RCE: Apache Tomcat Manager Exploit rce, remote-code-execution
Sat, 04 Apr 2026 05:31:01 GMT Shodan + Censys Internet Ka X-Ray: Bina Scan Kiye Sab Kuch Dekho!... shodan
Wed, 01 Apr 2026 06:33:15 GMT My First Bug Bounty Report: hackerone
Tue, 07 Apr 2026 06:46:08 GMT Hooking iOS Apps with Frida application-security
Thu, 21 Aug 2025 10:04:08 GMT Dork Like a Demon: FOFA Edition for Hackers & Bug Bounty Hunters dorking
Tue, 07 Apr 2026 10:27:43 GMT CSPT (Client-Side Path Traversal) bug-bounty-tips, bug-bounty-writeup
Tue, 07 Apr 2026 16:19:20 GMT Raising a bug report is easy! bugs
Fri, 03 Apr 2026 09:07:35 GMT IDOR / BOLA: The Vulnerability That Keeps Leaking Everyone’s Da... idor
Mon, 23 Mar 2026 21:03:28 GMT SOC129 — Successful Local File Inclusion (EventID: 63) local-file-inclusion
Sun, 15 Mar 2026 11:14:38 GMT Local File Inclusion (LFI) in Leave Application System (PHP & SQL... lfi
Wed, 01 Apr 2026 12:35:29 GMT Portal | CyCTF Luxor Finals 2026 ssrf
Sat, 14 Feb 2026 11:50:52 GMT SHODAN — SEOH shodan
Fri, 06 Mar 2026 22:34:06 GMT 3 Logic Bugs in Zendesk : A Single API Request Gave Me an Adminis... bugcrowd
Sun, 05 Apr 2026 18:11:17 GMT Information Disclosure Through Unrestricted API Endpoints information-disclosure
Wed, 11 Feb 2026 21:37:40 GMT From Course Notes to CVE: How a GXPN Study Session Uncovered a 40... vulnerability-disclosure
Fri, 29 Aug 2025 04:43:21 GMT 9. The Secret Power of Google Dorking dorking
Tue, 06 Jan 2026 15:29:55 GMT Lab: Web cache poisoning via a fat GET request | Portswigger web-cache-poisoning
Mon, 16 Mar 2026 14:32:42 GMT Web Security Series #5 — Exploiting Broken Access Control via T... bug-bounty-hunting
Sun, 15 Mar 2026 16:45:35 GMT Web Security Series #4 — Discovering Unauthorized Resources via... bug-bounty-hunting
Mon, 16 Feb 2026 14:31:00 GMT BOUNTY | HTB | Windows |Walkthrough | Write up bounties
Tue, 07 Apr 2026 19:42:27 GMT Fingerprint First: A Structured Web App Recon-to-Exploit Framewor... web-security, pentesting
Tue, 07 Apr 2026 20:18:42 GMT MCP Security for Enterprise Part 2: The Red Team Playbook pentesting
Fri, 20 Mar 2026 23:01:01 GMT How I Automated Google Dorking with a Simple Bookmarklet google-dorking
Sat, 28 Mar 2026 12:23:40 GMT CVE-2026–24061 GNU InetUtils Telnetd Authentication Bypass Vuln... rce
Tue, 31 Mar 2026 13:11:54 GMT TryHackMe — Intro to SSRF (Walkthrough) ssrf
Tue, 24 Mar 2026 17:38:54 GMT Why location.href Isn’t Just a Redirect: xss-vulnerability
Tue, 24 Mar 2026 13:18:44 GMT Information disclosure in version control history | Lab-05 information-disclosure
Mon, 06 Apr 2026 10:26:35 GMT Best Phishing Simulation and Awareness Service Provider in India vapt
Tue, 07 Apr 2026 03:25:50 GMT Web Application Security Checklist Before Production Deployment application-security
Sat, 21 Mar 2026 17:10:46 GMT CVE-2026–22812: How I Got RCE on a 71k-Star AI Coding Tool With... rce
Sat, 21 Mar 2026 17:45:32 GMT CVE-2025–66034 POC remote-code-execution
Mon, 06 Apr 2026 14:01:02 GMT The Livewire v3 RCE That Broke the Magic: Understanding CVE-2025â... cve
Mon, 06 Apr 2026 19:53:28 GMT You Delivered a Threat Model : They Slipped a Sprint application-security
Wed, 01 Apr 2026 21:03:37 GMT How I Got My First Bounty $$$ idor
Wed, 18 Feb 2026 04:39:59 GMT ​"Beyond the Alert Box: Demonstrating Real-World XSS Impact" xss-bypass
Mon, 16 Feb 2026 08:42:31 GMT Lab: Exploiting HTTP request smuggling to perform web cache poiso... web-cache-poisoning
Sun, 15 Feb 2026 09:26:13 GMT TryHackMe Walkthrough -Subdomain Enumeration subdomain-enumeration
Mon, 26 Jan 2026 07:25:06 GMT How Forgotten DNS Records Lead to Subdomain Takeovers subdomain-takeover
Mon, 27 Jan 2025 16:51:28 GMT The man who suffered 11 years in hell for freedom has now been fr... web-pentest
Sat, 28 Mar 2026 08:13:46 GMT How Exposed n8n Webhooks Become an Attack Surface shodan
Mon, 30 Mar 2026 13:14:30 GMT Gaining Cybersecurity Knowledge as a Cybersecurity Student: My Fi... cybersecurity-tools
Tue, 11 Nov 2025 16:43:14 GMT Beyond Google: Navigating the Hidden Internet with Shodan and Cen... censys
Fri, 20 Mar 2026 05:45:47 GMT Cloudflare WAF Bypass Leading to Reflected XSS via SVG Injection xss-bypass
Fri, 20 Mar 2026 10:25:48 GMT Secure Spring Boot logs: Automatic masking of passwords, API keys... api-key
Tue, 07 Apr 2026 18:47:31 GMT When ICMP Turns Lethal (again): Deep Dive into CVE-2026–23398 exploit
Mon, 03 Nov 2025 19:42:12 GMT Announcing DorkFi Go-Live Date: Liquidity is Coming dorks
Fri, 27 Mar 2026 14:27:07 GMT WIZ Bug Bounty Master Class: SSRF Vulnerability on Major Gaming C... ssrf
Thu, 02 Apr 2026 08:23:39 GMT Cross-Site Scripting (XSS) Deep Dive: Türleri, Senaryoları ve E... xss-attack
Sat, 01 Nov 2025 20:09:17 GMT just memecoin — Best Platforms dorks
Tue, 07 Apr 2026 11:05:52 GMT OT/ICS Cybersecurity Tools: A Professional Field Guide cybersecurity-tools
Sat, 06 Dec 2025 06:43:54 GMT The Midnight Pwn: How a News Alert Led to a Critical Bounty vulnerability-disclosure
Wed, 11 Feb 2026 18:30:13 GMT Understanding Vulnerabilities, Threats, and OWASP Standard Testin... cyber-sec
Fri, 20 Feb 2026 14:44:02 GMT XSS Attack Methodology: How Attackers Actually Exploit Your Brows... xss-bypass
Wed, 01 Apr 2026 09:33:58 GMT How to earn VDS in Vadeus Network [Rewards Center] bounty-program
Thu, 12 Mar 2026 15:22:45 GMT TryHackMe | Lo-Fi local-file-inclusion
Thu, 26 Feb 2026 21:33:21 GMT External Vulnerability Scanning FAQ vulnerability-scanning
Fri, 06 Mar 2026 12:01:01 GMT Salí de compras y terminé en Roma bounty-program
Tue, 03 Mar 2026 19:29:30 GMT Wie angreifbar ist Ihr Unternehmen wirklich? pentest
Sun, 21 Sep 2025 07:02:30 GMT Affordable but Vulnerable? The Dark Side of CMORE HMI censys
Sat, 21 Feb 2026 16:39:23 GMT React2shell remote-code-execution
Thu, 29 Jan 2026 05:03:15 GMT Subdomain Takeover: Understanding, Detecting, and Recovering from... subdomain-takeover
Thu, 12 Mar 2026 15:02:24 GMT Using Claude Opus 4.6 for Codebase Vulnerability Discovery bugcrowd
Sun, 23 Nov 2025 13:28:34 GMT When IP Whitelisting Isn’t What It Seems: A Real-World Case Stu... vulnerability-disclosure
Sun, 17 Aug 2025 17:58:45 GMT $$$ How I Exploited a Business Logic Flaw to Slash Product Prices... bug-bounty-program
Fri, 24 Jan 2025 09:34:52 GMT A new Holistic temple opening InLeeds web-pentest
Tue, 24 Mar 2026 16:47:04 GMT TuesdayTool 42: Domain Digger, One-Stop Interface For Domain Inve... cybersecurity-tools
Tue, 14 Oct 2025 01:36:00 GMT Hackviser  —  File Inclusion Labs file-inclusion
Fri, 03 Apr 2026 22:03:43 GMT How I Simulated a Supply Chain Attack on Thousands of Servers —... hackerone
Sun, 17 Aug 2025 19:26:05 GMT ï·½ bug-bounty-program
Sat, 28 Mar 2026 17:58:43 GMT I Built a Remote Code Execution Engine. remote-code-execution
Tue, 07 Apr 2026 19:25:59 GMT Jerry | HackTheBox | OSCP Preparation bug-bounty-tips
Tue, 10 Mar 2026 13:08:17 GMT Maritime Open Source Intelligence: Techniques, Tools, and Investi... security-research
Tue, 10 Mar 2026 19:42:42 GMT CVE-2026-31900: How a Permissive Regex Led to RCE in psf/black’... remote-code-execution
Sat, 07 Mar 2026 04:09:52 GMT Threat Intelligence Investigation — Dropbox Phishing Domain Ana... google-dorking
Thu, 05 Mar 2026 21:45:19 GMT Berlin im Visier der Hacker: Warum jedes Unternehmen heute einen ... pentest
Wed, 23 Jul 2025 15:15:01 GMT TryHackMe Include walkthrough: SSRF, log poisoning & LFI2RCE, wit... log-poisoning
Thu, 05 Mar 2026 21:41:26 GMT Finding a P1 in NASA: The Power of Google Dorking google-dork
Mon, 30 Mar 2026 00:00:20 GMT F5 BIG‑IP RCE Exploited: Why You Must Patch Now — Actionable ... rce
Fri, 11 Jul 2025 16:20:24 GMT PC WORX: The Hidden Risk in Your Industrial Network censys
Fri, 13 Feb 2026 16:22:19 GMT How I Approach XSS Hunting as a Security Beginner xss-bypass
Thu, 09 Oct 2025 18:33:05 GMT 0-click Account Takeover via Punycode bug-bounty-program
Sat, 17 Jan 2026 07:44:23 GMT Google Dorks to Find SQL Injection Vulnerable Websites google-dork
Thu, 26 Feb 2026 13:54:44 GMT Poison — HTB lfi
Mon, 23 Mar 2026 15:20:20 GMT How I Found a Critical Account Takeover Vulnerability in a Passwo... bug-bounty-hunter
Mon, 06 Apr 2026 21:45:53 GMT Cookie(Çerez) Türleri ve Pentest Açısından Önemi web-pentest
Wed, 25 Feb 2026 02:51:18 GMT Impact Scenario Hackviser local-file-inclusion
Sat, 20 Apr 2024 17:20:58 GMT TryHackMe — Brute Walkthrough | TheHiker log-poisoning
Tue, 05 Dec 2023 07:54:40 GMT LFI via SMTP log poisoning log-poisoning
Thu, 02 Apr 2026 07:44:22 GMT SeedLab: Cross-Site Scripting(XXS) Attack Writeup xss-attack, cross-site-scripting
Mon, 06 Apr 2026 15:57:06 GMT I Tried Hacking Myself Like a Bug Hunter for 24 Hours — Here’... bugbounty-writeup
Sun, 15 Feb 2026 16:04:42 GMT Discovering Security Weaknesses: A Practical Guide to Vulnerabili... vulnerability-scanning
Wed, 30 Apr 2025 17:08:29 GMT Exploring Subdomains: What They Are and How to Find Them subdomain-enumeration
Tue, 24 Mar 2026 08:56:25 GMT Detection_WorkBench: The Unified Security Detection & Intelligenc... cybersecurity-tools
Thu, 19 Feb 2026 04:57:17 GMT Introducing “Information Gathering� as the First Phase of Web... google-dorking
Wed, 01 Apr 2026 18:43:56 GMT Lab: SQL injection attack, listing the database contents on Oracl... web-pentest
Tue, 13 Jan 2026 13:27:13 GMT Hacking “Time�: When Critical Infrastructure Forgets to Set a... vulnerability-disclosure
Sat, 04 Apr 2026 07:11:29 GMT Beyond the CVE: What I Learned While Hunting Bugs and Jobs Simult... cve
Mon, 06 Apr 2026 03:15:32 GMT Magento PolyShell Vulnerability: What Works, What Doesn’t (Ethi... exploit
Sat, 25 Jan 2025 23:20:10 GMT Full GitHub Dorking guide: for OSINT and BugBounty (Reconnaissanc... github-dorking
Wed, 11 Mar 2026 09:56:42 GMT Hardening Keycloak: Implementing Security Pentest Requirements as... pentest
Thu, 12 Feb 2026 03:11:00 GMT XSS & SVG: PentesterLab Feb2026 xss-bypass
Thu, 27 Mar 2025 23:46:11 GMT Make Break and Betrayal web-pentest
Wed, 22 Oct 2025 14:11:32 GMT Mastering Subdomain Enumeration: A Beginner’s Guide to Expandin... subdomain-enumeration
Fri, 23 May 2025 06:02:53 GMT Search Skills censys
Sun, 05 Apr 2026 20:11:41 GMT I Tried Logging In… and Accidentally Did Responsible Disclosure... vdp
Tue, 23 Dec 2025 06:58:24 GMT How I Found Vulnerabilities in NASA and Got into the Hall of Fame vulnerability-disclosure
Mon, 02 Mar 2026 10:51:58 GMT How I Found Yet Another Misconfiguration on This College Site bug-bounty-hunting
Tue, 31 Mar 2026 13:05:08 GMT Robots CTF | TryHackMe Walkthrough xss-vulnerability
Sun, 05 Apr 2026 14:26:11 GMT Separation of Duties: Trust Is Good — Division Is Better cyber-sec
Thu, 25 Dec 2025 20:15:32 GMT Investigation into MSP Data Breach google-dork
Sat, 04 Apr 2026 17:55:44 GMT Windows Notepad’de Kritik RCE: Markdown Linkleri Üzerinden Kom... exploit
Sun, 07 Dec 2025 06:18:32 GMT Breaking the Perimeter: How My Custom Python Tool Bypassed a Fede... vdp
Sat, 06 Dec 2025 17:05:14 GMT GitHub Pages Subdomain Takeover on aiaa-dpw.larc.nasa.gov (NASA V... subdomain-takeover
Fri, 24 Jan 2025 00:08:47 GMT A majestic temple opportunity of wellbeing and wellness web-pentest
Wed, 01 Apr 2026 11:47:47 GMT Most companies in India collect personal data every single day. vapt
Tue, 31 Mar 2026 07:57:14 GMT How I Test API Keys Using Only Burp Suite api-key
Sat, 04 Apr 2026 16:17:37 GMT Stored XSS via iframe Injection Leads to $505 Bounty xss-attack
Wed, 18 Mar 2026 14:34:33 GMT File Inclusion Zafiyetleri: LFI ve RFI Nedir, Nasıl Çalışır ... file-inclusion
Mon, 09 Mar 2026 06:56:21 GMT File Inclusion Vulnerability: Easy concept explanation file-inclusion
Tue, 10 Mar 2026 09:59:23 GMT I Thought I Found 259 Exposed Systems in Bengaluru… I Was Wrong shodan
Sun, 22 Feb 2026 13:02:39 GMT OtterCTF - Hopity Hop Reverse Engineering Walkthrough cyber-sec
Sat, 14 Feb 2026 22:03:31 GMT 6 Hours, 6 Real-world Critical Bugs: A Case Study in Efficient Bu... cyber-sec
Mon, 06 Apr 2026 12:31:05 GMT CVE-2026–32186 | Microsoft Bing Elevation of Privilege Vulnera... cve
Wed, 25 Mar 2026 17:00:00 GMT CVE-2026–33139 How I Found My First CVE: Bypassing PySpector’... security-research
Wed, 11 Mar 2026 08:27:57 GMT Exposed Credentials in a Public Repository Leading to Administrat... bug-bounty-hunter
Sat, 14 Mar 2026 08:26:08 GMT How I Spent 30 Days Chasing a $40,000 Bug Bounty And What I Learn... rce
Wed, 25 Mar 2026 07:01:14 GMT Hackviser Unrestricted File Upload Labs — Basic Unrestricted Fi... file-upload
Fri, 03 Apr 2026 08:30:09 GMT Inside The Vault Sentry — How We Detect and Stop API Key Leaks api-key
Tue, 07 Apr 2026 06:27:56 GMT From Manual Testing to Automation: Burp Suite + OpenCode Setup bug-bounty-tips, application-security
Wed, 01 Apr 2026 04:45:42 GMT Claude Code Leak: What if it was a Calculated Move and not an Acc... exploit
Wed, 18 Feb 2026 07:41:16 GMT TryHackMe Valenfind Writeup: Hardcoded Keys & Broken Hearts local-file-inclusion
Sun, 05 Apr 2026 15:35:42 GMT Broken Authentication — How Simple Login Flaws Lead to Account... bugbounty-writeup
Sat, 14 Mar 2026 19:53:51 GMT Secure File Uploads to S3 Directly from Frontend file-upload
Sat, 14 Feb 2026 19:02:25 GMT XSS WAF Bypass: 3 Tricks to Beat Alert Blockers xss-bypass
Sat, 31 Jan 2026 13:52:11 GMT SSRF via Referer Header: How a Simple Header Led to a Serious Fin... bugcrowd
Tue, 07 Apr 2026 14:51:01 GMT I Built an AI-Powered Vulnerability Scanner - Here’s What It F... bugbounty-writeup
Thu, 26 Mar 2026 18:22:21 GMT CVE-2025–4123 Grafana Open Redirect & SSRF — Full PoC — CVS... ssrf
Mon, 02 Mar 2026 01:51:25 GMT What is penetration testing? | What is pen testing? pentest
Sat, 07 Mar 2026 01:11:15 GMT The Silent Observer: A Deep Dive into Shodan Dorks for Security R... shodan
Tue, 07 Apr 2026 03:34:00 GMT TryHackMe — Intro to Cross-site Scripting (Walkthrough) xss-attack, cross-site-scripting
Sat, 21 Mar 2026 20:37:31 GMT Using Nmap vulnerability-scanning
Thu, 02 Apr 2026 16:25:47 GMT Why Most Recon Pipelines Break After a Week recon
Wed, 25 Mar 2026 10:55:24 GMT METASPLOIT EXPLOIT |TRYHACKME PREMIUM cyber-sec
Mon, 30 Mar 2026 06:03:13 GMT Why Business Directory Listings Are the Secret Weapon of Off-Page... directory-listing
Tue, 22 Apr 2025 10:38:20 GMT Trump’s Tariffs Cut Out Censys — ZoomEye Steps In Strong! zoomeye
Sun, 08 Mar 2026 16:31:00 GMT Exploiting CVE-2026–1731: A Critical Pre-Auth RCE in BeyondTrus... remote-code-execution
Tue, 31 Mar 2026 09:02:27 GMT Securing the Edges: A Practical Way to Handle XSS in Modern Apps cross-site-scripting, xss-vulnerability
Thu, 02 Apr 2026 18:30:20 GMT From Bluetooth to CVE: Breaking Payment Terminal (mPOS) Security bugbounty-writeup
Mon, 06 Apr 2026 19:44:18 GMT Vulnerability Assessment of a Live Web Application: A Practical C... vapt
Wed, 18 Feb 2026 01:09:03 GMT cURL’s Bug Bounty Is Dead. AI Killed It. bounty-program
Sun, 05 Apr 2026 13:27:30 GMT The Vault Sentry — A Startup’s Strategic Edge in Cybersecurit... api-key
Fri, 13 Mar 2026 02:31:00 GMT How I Use Google Dorking to Find Hidden Vulnerabilities google-dorking, google-dork
Wed, 10 Dec 2025 12:06:41 GMT Strengthening Web3 Security: Recent Vulnerability Findings from Y... vulnerability-disclosure
Sat, 04 Apr 2026 23:02:22 GMT CVE-2023–40582 Walkthrough (Proving Ground-OSCP) cve
Sun, 22 Mar 2026 14:53:56 GMT Source code disclosure via backup files | Lab-03 information-disclosure
Sat, 28 Feb 2026 14:32:47 GMT TryHackMe CTF Walkthrough- Love at First Breach 2026: Valenfind lfi
Tue, 07 Apr 2026 17:39:45 GMT TuesdayTool 43: OSINT.club — A Hub for Modern Open-Source Intel... cybersecurity-tools
Thu, 12 Mar 2026 18:45:23 GMT Pulse-Zero: Atomic Memory Slicing and Sub-Layer Evasion via x64 A... cyber-sec
Mon, 30 Mar 2026 10:47:54 GMT Cross Site Scripting (XSS): Real Examples and Security Guide cross-site-scripting
Thu, 02 Apr 2026 17:35:36 GMT How I Found a Subdomain Takeover via BetterUptime subdomain-takeover
Mon, 06 Apr 2026 06:01:54 GMT Security Misconfiguration: The Silent Killer of Web Security hackerone
Mon, 16 Mar 2026 07:31:29 GMT How I hacked AI Agent and worth bounty of $$$$ bugcrowd
Sun, 05 Apr 2026 10:11:25 GMT The Art of Knowing Everything Before You Hack Anything part 1 bugbounty-writeup
Mon, 06 Apr 2026 13:55:29 GMT The 7 Golden Rules of Vulnerability Scanning vulnerability-scanning
Sun, 05 Apr 2026 04:31:15 GMT IDOR: Unauthorized Invoice Access on a Major Job Portal idor
Sat, 04 Apr 2026 11:58:35 GMT Learning Broken Access Control — My Journey with PortSwigger Ac... idor
Fri, 03 Apr 2026 12:23:17 GMT XSS Is Not Just <script>alert(1)</script> — Here's What Actuall... xss-attack
Tue, 31 Mar 2026 12:15:47 GMT When File Uploads Go Wrong: Stored XSS Through Public Cloud Stora... hackerone
Sat, 04 Apr 2026 18:01:01 GMT ثغرة CVE-2026–20093 Ù�ÙŠ Cisco IMC: تخطÙ� كامل للÙ... cve
Sat, 03 Jan 2026 17:51:10 GMT Espelho, espelho meu : Existe alguém mais exposto do que Eu? shodan
Sun, 05 Apr 2026 12:44:05 GMT �� From SSRF to Full AWS Takeover: A Hands-On Cloud Security ... ssrf
Tue, 07 Apr 2026 15:23:33 GMT Idor in “track your order� page idor
Thu, 28 Sep 2023 23:05:39 GMT Archangel — TryHackMe log-poisoning
Thu, 02 Apr 2026 07:24:26 GMT Cross Site Scripting (XSS): xss-vulnerability
Mon, 06 Apr 2026 06:26:03 GMT [CMSpit] — Cockpit CMS RCE, MongoDB Exposure and Privilege Es... rce
Wed, 25 Mar 2026 18:14:32 GMT Keterbukaan Informasi atau Terlalu Terbuka? information-disclosure
Sun, 22 Oct 2023 19:57:30 GMT Performing a Log Poisoning Attack log-poisoning
Wed, 28 Jan 2026 07:31:37 GMT Lab: Targeted web cache poisoning using an unknown header | Port... web-cache-poisoning
Wed, 18 Mar 2026 10:03:26 GMT Web Security Series #7 — Exploiting Blind SQL Injection via Ses... bug-bounty-hunting
Mon, 23 Mar 2026 14:17:48 GMT Authentication bypass via information disclosure | Lab-04 information-disclosure
Fri, 07 Feb 2025 05:12:28 GMT Do You Struggle Finding Internal/Hidden Subdomains? Recon part 5 subdomain-enumeration
Fri, 27 Mar 2026 17:43:18 GMT Introducing GhostIntel: Your Open-Source OSINT & Reconnaissance T... security-research
Fri, 10 Nov 2023 03:38:01 GMT Apache error.log advanced Log poisoning RCE log-poisoning
Sun, 08 Feb 2026 12:21:01 GMT How AI Became My Reporting Partner in Security Research bugcrowd
Wed, 12 Feb 2025 22:46:35 GMT https://www.express.co.uk/life-style/property/2012927/cleaning-ch... web-pentest
Sun, 01 Mar 2026 14:20:56 GMT Valenfind— CTF Writeup local-file-inclusion
Sun, 23 Nov 2025 15:58:33 GMT just memecoin Rewards Eligibility & Claim Guide — November 2025 dorks
Sun, 13 Jul 2025 16:32:21 GMT ProConOS Exposed: What ICS Security Teams Need to Know censys
Mon, 06 Apr 2026 20:59:45 GMT A scientist and artist refuses to “pick one� bugs
Wed, 11 Mar 2026 18:53:25 GMT From Recon to Jackpot: IDOR That Exposed Billing Data and CHAINED... bug-bounty-hunter
Sun, 22 Mar 2026 17:16:08 GMT I Built a Scalable File Upload System Twice — Here’s What Cha... file-upload
Fri, 13 Mar 2026 15:01:05 GMT Reverse Engineering a Password Checker — picoCTF PW Crack 3 security-research
Tue, 31 Mar 2026 13:09:06 GMT An Open Door for Attackers. Lock It with CSP. xss-vulnerability
Thu, 29 Jan 2026 21:21:39 GMT Turning Fuzzing Into $2,550: How a Simple Bug Gave Me Access to E... bounties
Sun, 26 Jan 2025 19:08:11 GMT Matrix strike’s back against honesty from a power stance web-pentest
Sat, 14 Mar 2026 01:59:36 GMT LFI/RFI lfi
Tue, 07 Apr 2026 13:50:13 GMT Incident Response Failures - When How You Handle a Breach Causes ... application-security
Wed, 25 Feb 2026 01:47:45 GMT How I Found a Path Traversal in the Rancher Dashboard via HAR Rep... web-pentest
Sun, 15 Mar 2026 13:49:03 GMT Как подключить Java приложение к кла�... api-key
Fri, 27 Mar 2026 11:01:08 GMT Finding XSS Through HTML Injection — Without Fuzzing Tools xss-bypass
Fri, 25 Jul 2025 16:41:01 GMT � SubDNS-UI: Build Your Own Subdomain + DNS Enumerator with a C... subdomain-enumeration
Fri, 31 May 2024 13:29:16 GMT Map of the worlds best URLs 2025 log-poisoning
Mon, 06 Apr 2026 21:37:15 GMT Walkthrough: Executing Local File Inclusion and Remote Code Execu... remote-code-execution, local-file-inclusion
Thu, 18 Sep 2025 05:45:26 GMT Data Accuracy in Directory Websites: Why Clean Listings = Loyal U... directory-listing
Tue, 10 Feb 2026 23:04:46 GMT Effective Dorking Tools dorking
Wed, 05 Nov 2025 12:42:46 GMT How I Hacked Bank’s Admin Portal vdp
Tue, 23 Sep 2025 06:36:22 GMT Mengamankan File Sensitif & Directory Listing website dengan .ht... directory-listing
Fri, 06 Feb 2026 06:33:08 GMT 5 Ways to Bypass Email Verification Without Using Any Tool bug-bounty-program
Thu, 02 Apr 2026 16:16:16 GMT The Media Layer Most Teams Never Plan For (Until It Hurts): Why W... file-upload
Fri, 13 Mar 2026 13:51:55 GMT Cracking Hidden Password Logic -PicoCTF “PW Crack 2� security-research
Tue, 25 Nov 2025 09:25:11 GMT Step-by-Step BOUNTY Rewards Guide — November 2025 bounties
Mon, 23 Mar 2026 19:43:06 GMT I Thought It Was a Container… It Was a Whole Azure VM (RCE Stor... rce
Sat, 14 Mar 2026 14:07:56 GMT Learning Recon: A Look at Burgerprofiel security-research
Thu, 25 Dec 2025 00:47:15 GMT Subdomain Takeover Explained: Complete Step-by-Step Guide (Recon ... subdomain-takeover
Wed, 01 Apr 2026 08:44:49 GMT From Exposure to RCE: Inside the Wing FTP Server Attack Chain rce
Sat, 14 Mar 2026 18:06:12 GMT Web Security Series #3 — Discovering Credentials Using Cluster ... bug-bounty-hunting
Fri, 03 Apr 2026 10:59:51 GMT Juice Shop Write-up: View Basket Challenge idor
Thu, 02 Apr 2026 20:16:56 GMT Advanced IDOR Guide: How to Find and Exploit Broken Access Contro... idor
Sun, 22 Feb 2026 14:57:32 GMT How Domain Enumeration, Content Discovery, Leaked Secrets, and Se... recon
Tue, 23 Sep 2025 13:01:51 GMT Why Email Marketing Is the Secret Growth Tool for Directory Websi... directory-listing
Sun, 15 Mar 2026 14:04:59 GMT Microsoft Graph API Attack Surface: OAuth Flows, Abused Endpoints... recon
Fri, 19 Dec 2025 20:23:57 GMT How I Found an Unauthenticated XXE That Allowed Arbitrary File Re... vulnerability-disclosure
Sat, 21 Feb 2026 15:06:35 GMT Breaking into Cyber: The Student’s Survival Kit cybersecurity-tools
Fri, 13 Mar 2026 14:55:26 GMT Web Security Series #2 — Bypassing Authentication via MFA Tampe... bug-bounty-hunting
Mon, 30 Mar 2026 19:18:38 GMT Juice Shop Write-up: DOM XSS Challenge cross-site-scripting
Sun, 24 Aug 2025 20:18:55 GMT How I found an Account Lockout Vulnerability Without Any Tools bug-bounty-program
Fri, 27 Mar 2026 17:20:49 GMT End-to-End File Handling in Angular and ASP.NET Core file-upload
Thu, 04 Dec 2025 04:45:36 GMT What is Google Dorking? dorking
Mon, 06 Apr 2026 12:39:25 GMT Why VAPT Testing is No Longer Optional for Businesses in 2026: A ... vapt
Sat, 14 Mar 2026 04:04:52 GMT Information disclosure on debug page APPRENTICE | Lab -02 information-disclosure
Fri, 09 Jan 2026 05:50:02 GMT Caches, Edge, and Exploits web-cache-poisoning
Thu, 26 Mar 2026 09:09:22 GMT Modern SSRF — Part 4 (Expert Edition): How to Write High-I... ssrf
Thu, 08 Jan 2026 09:02:50 GMT osint-Forgotten Ruins bounty $$ bounties
Sat, 04 Apr 2026 17:32:35 GMT How I Earned $200 in 5 Minutes Using a Simple Broken Link Hijack... bug-bounty-hunter
Sat, 21 Feb 2026 14:47:36 GMT AI Innovation or Market Disruption? vulnerability-scanning
Sat, 25 Oct 2025 12:23:25 GMT How to find leaks on GitHub as a beginner. Logic is main key github-dorking
Tue, 07 Apr 2026 12:18:46 GMT I Changed One Number. Then I Found Everything. idor
Sun, 29 Mar 2026 15:21:24 GMT Plant Photographer TryHackMe Writeup ssrf
Fri, 20 Mar 2026 18:17:58 GMT Server-Side Request Forgery (SSRF) - When Attackers Use Your Own ... ssrf
Thu, 02 Apr 2026 15:28:31 GMT O Primeiro passo é o mais importante! pentest
Tue, 24 Mar 2026 07:41:00 GMT How I Built a Directory Listing Site (ToolIndex.net) and What I L... directory-listing
Mon, 06 Apr 2026 10:30:14 GMT Sometimes all you need is a 16 and not a 12. bugs
Sat, 04 Apr 2026 09:10:35 GMT We’ve messed up, a lot. Here’s Why Scribble Still Exists to c... bounties
Thu, 04 Dec 2025 10:22:05 GMT The Billion-Naira Blueprint: How SuperteamNG Turned Nigerian Tale... bounties
Tue, 07 Apr 2026 22:21:58 GMT How I Built NullScore: Combining CVSS, EPSS, KEV, and PoC Into On... pentesting
Wed, 18 Feb 2026 06:00:02 GMT Google Dorking google-dorking
Fri, 03 Apr 2026 23:30:20 GMT Security Advisory: QuickLaunch SSO Platform — Unauthenticated C... information-disclosure
Wed, 16 Jul 2025 12:07:42 GMT Hackers Love This 1979 Protocol (Because It Can’t Defend Itself... censys
Tue, 15 Jul 2025 12:15:58 GMT “Secure� OPC UA Setups Are Being Hacked — Here’s Why censys
Thu, 26 Dec 2024 15:23:03 GMT GitHub Dorking List: The Ultimate Guide to Exploring and Securing... github-dorking
Sun, 22 Feb 2026 22:04:07 GMT Beyond The Black Box: A Multi-Stage Approach For Evaluating Auton... pentest
Tue, 06 Jan 2026 06:42:57 GMT WHAT IS A SHODAN? shodan
Mon, 09 Mar 2026 18:49:55 GMT Walkthrough: Vulnerability Scanning w/ OpenVAS vulnerability-scanning
Wed, 25 Feb 2026 11:25:59 GMT Understanding Modern Cybersecurity Practices for Scalable SaaS Pr... vulnerability-scanning
Fri, 27 Mar 2026 03:29:10 GMT TryHackMe — File Inclusion (Walkthrough) file-inclusion
Tue, 07 Apr 2026 09:33:29 GMT XSS without HTML: CSTI with AngularJS xss-attack
Tue, 07 Apr 2026 00:04:30 GMT Front-End Security Is Not Optional: A Developer’s Field Guide xss-attack
Tue, 04 Nov 2025 07:31:55 GMT Google Dorking dorks
Tue, 17 Mar 2026 09:18:53 GMT Web Security Series #6 — Exploiting SQL Injection to Extract Se... bug-bounty-hunting
Sat, 21 Feb 2026 15:56:17 GMT My Personal Favorite Recon Method to Find URL Endpoints recon
Mon, 16 Feb 2026 01:01:36 GMT Valenfind — TryHackMe Writeup | by P4NTHR lfi
Sat, 04 Apr 2026 04:41:46 GMT OpenTofu Security Scanner: How to Catch Misconfigurations Before ... vulnerability-scanning
Tue, 10 Mar 2026 20:44:39 GMT TuesdayTool 41: ReconSpider, All-In-One Reconnaissance Tool cybersecurity-tools
Sat, 04 Apr 2026 08:13:07 GMT DVWA: File Upload Vulnerability (Low Security) vapt, file-upload
Mon, 06 Apr 2026 05:30:06 GMT Bug Bounties in the AI Era: New Attack Surfaces, New Opportunitie... bug-bounty-writeup
Thu, 18 Dec 2025 20:10:01 GMT Google Dorking Nedir? google-dork
Fri, 13 Mar 2026 10:38:07 GMT Insecure Deserialization in Java remote-code-execution
Fri, 01 Aug 2025 06:17:06 GMT 15,000 Critical Systems Are Exposed — Thanks to This Outdat... censys
Wed, 25 Mar 2026 08:34:09 GMT Improper Input Handling Leading to Client Side Code Execution and... bug-bounty-hunter, vulnerability-disclosure
Mon, 23 Mar 2026 06:24:04 GMT From iframe Injection to Account Takeover (Full Exploit Chain) xss-vulnerability
Sun, 08 Mar 2026 06:50:53 GMT XSS Inbound Attack: I Didn’t Steal Your Cookie. I Stole Your So... xss-bypass
Fri, 03 Apr 2026 08:19:32 GMT Why API Key Security Should Be Your Startup’s First Priority api-key
Sat, 04 Apr 2026 14:29:21 GMT BUG BOUNTY from Zero To Hero! All secrects finally revealed !! @l... hackerone, bugbounty-writeup
Sat, 10 Jan 2026 05:03:45 GMT Lab:Web cache poisoning via an unkeyed query parameter | Portswi... web-cache-poisoning
Sat, 02 Aug 2025 14:15:23 GMT The Silent Risk in Your ICS: Why S7 Protocol Needs Security Atten... censys
Thu, 02 Oct 2025 06:59:46 GMT Endless Cashback Glitch:How I Unlocked Unlimited Free Orders with... bug-bounty-program
Tue, 30 Dec 2025 07:53:12 GMT One Mantle DevCard, Three Reward Pools for Mantle Global Hackatho... bounty-program
Fri, 20 Mar 2026 11:44:04 GMT #Searchlight OSINT Writeup google-dorking
Fri, 03 Apr 2026 12:07:45 GMT Understanding OTP Verification Bypass via Client-Side Response Ma... security-research
Sat, 28 Mar 2026 05:15:09 GMT LLM Vulnerability to Internet Source Manipulation security-research
Mon, 06 Apr 2026 11:37:45 GMT 2FA Bypass Techniques: 13 Ways Weak Implementations Break Authent... vapt
Mon, 06 Apr 2026 18:35:09 GMT Manual vs Automated Security Testing in the Age of AI: A Security... vulnerability-scanning
Thu, 26 Mar 2026 05:34:51 GMT XSS (Cross site scripting) xss-vulnerability
Tue, 07 Apr 2026 17:14:56 GMT The Company Fixed the Breach… but Forgot the Root Cause bug-bounty-tips, bug-bounty-writeup
Mon, 02 Feb 2026 17:05:37 GMT Lab: Web cache poisoning to exploit a DOM vulnerability via a cac... web-cache-poisoning
Sat, 28 Mar 2026 10:41:03 GMT Subfinder Subdomains Dhundho Like an Elite Hacker! (Hinglish Mein... recon
Tue, 31 Mar 2026 08:17:14 GMT Exploiting OData Wildcards: How I Scraped Tesla’s Internal Empl... bugcrowd
Wed, 21 Jan 2026 15:09:15 GMT Lab: Weak isolation on dual-use endpoint | Portswigger web-cache-poisoning
Sun, 14 Dec 2025 06:37:06 GMT My Bug Bounty Diary subdomain-enumeration
Thu, 12 Mar 2026 05:18:51 GMT How I Found Information Disclosure on a Non-Standard Port: The St... information-disclosure
Mon, 16 Mar 2026 18:05:08 GMT xss0r V6 is Finally Released! xss-bypass
Tue, 03 Feb 2026 17:12:47 GMT My First Week: 3 Business Logic Bugs in Major E-Commerce bug-bounty-program
Thu, 14 Aug 2025 10:08:18 GMT Predictive Analytics and Voice Technology: A Winning Combination ... vdp
Wed, 11 Mar 2026 08:12:14 GMT The Bug Bounty Hunter Roadmap (2026): From Curious Beginner to Re... bug-bounty-hunting
Fri, 27 Mar 2026 11:02:23 GMT Microsoft Power BI API Credential Exposure: From Public Postman W... recon
Tue, 23 Dec 2025 18:32:40 GMT The Night I Found a Backup ZIP File Sitting in Plain Sight —... bounties
Tue, 07 Apr 2026 17:17:34 GMT The Most Dangerous Bugs Don’t Throw Errors bugs
Mon, 06 Apr 2026 08:51:01 GMT Things I Learned the Hard Way in Production (Java + Microservices... bugs
Tue, 27 Jan 2026 11:29:48 GMT The “Botnet� Exchange: Why ZSZRUN is spamming the Internet cyber-sec
Wed, 25 Feb 2026 00:40:05 GMT Icy “Doodle� Site | ATC CTF 2.0 | Google Dorking| CTFs google-dorking
Fri, 13 Mar 2026 07:57:18 GMT Information disclosure in error messages | Lab -01 information-disclosure
Thu, 02 Apr 2026 05:35:20 GMT My VAPT Intern Interview Experience — From LinkedIn Application... vapt