10000 GitHub - kdairatchi/medium-writeups: This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_URL, https://freedium.cfd/Medium_URL
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

kdairatchi/medium-writeups

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

Time Title Feed IsNew IsToday
Tue, 24 Jun 2025 18:19:37 GMT What is an API? A Deep Dive for Developers & Security Enthusiasts penetration-testing Yes Yes
Tue, 24 Jun 2025 18:12:34 GMT Weaponizing the Familiar: How File Explorer Is Being Abused for C... cybersecurity Yes Yes
Tue, 24 Jun 2025 18:19:45 GMT PhenomPoker Legal and Exploit Risk Analysis cybersecurity Yes Yes
Tue, 24 Jun 2025 18:09:40 GMT Cybersecurity: A Comprehensive Guide for Non-Techies cybersecurity, cyber-security-awareness Yes Yes
Tue, 24 Jun 2025 18:09:35 GMT Securing Your Angular Applications: What Every Developer Should K... security, hacking Yes Yes
Tue, 24 Jun 2025 18:13:39 GMT How to Protect Your Android App from Reverse Engineering with Dex... security Yes Yes
Tue, 24 Jun 2025 17:24:56 GMT 16 Billion Passwords Compromised: Insights into the Google Data B... security Yes
Tue, 24 Jun 2025 09:09:47 GMT Langflow RCE Bug Hits AI Devs — Here’s How to Lock It Dow... rce Yes
Tue, 24 Jun 2025 17:49:04 GMT what can I do to get my money back from Bitcofusion ? cybersecurity Yes
Tue, 24 Jun 2025 13:21:33 GMT Cracking password and brute-force for Reverse Engineering hacking Yes
Tue, 24 Jun 2025 15:04:30 GMT DDoS-Angriffe auf Apache-Webserver: Was sie sind und wie man sich... cyber-security-awareness Yes
Tue, 24 Jun 2025 07:24:19 GMT Fortinet Under Fire: New Auth Bypass Bug Actively Exploited (CVE-... web-security Yes
Tue, 24 Jun 2025 15:04:55 GMT Quiet Suffering: vulnerability Yes
Tue, 24 Jun 2025 00:01:55 GMT Nuclei para Bug Bounty: La Guía Definitiva para la Detección de... infosec Yes
Tue, 24 Jun 2025 08:51:41 GMT Serverless, Not Senseless: How I Exploited Cloud Functions to Pe... bug-bounty, infosec Yes
Tue, 24 Jun 2025 09:17:49 GMT TNB’s New Electricity Tariff — Malaysia information-technology Yes
Tue, 24 Jun 2025 17:24:28 GMT Service-THM (PT1-Recommended Room) hacking, cyber-security-awareness Yes
Tue, 24 Jun 2025 14:01:27 GMT The Netropy Principles, a short Interlude information-technology Yes
Tue, 24 Jun 2025 15:06:39 GMT From Pathogens to Phishing information-security Yes
Tue, 24 Jun 2025 13:14:49 GMT HOW A PORT SCAN LED TO A VULNERABILITY IN AN FTP SERVICE + TIPS F... bug-bounty, hacking Yes
Tue, 24 Jun 2025 15:15:23 GMT OSCP+ Exam Review: My Journey Through Failure, Preparation, and P... penetration-testing, infosec, ethical-hacking Yes
Tue, 24 Jun 2025 17:05:49 GMT Synthetic Identity Fraud: The Hidden Cybercrime Threat You Should... information-security Yes
Tue, 24 Jun 2025 15:58:06 GMT Cybersecurity Trends 2025: Smarter Hacks, Smarter Defenses cyber-security-awareness Yes
Tue, 24 Jun 2025 17:30:49 GMT The AI Agent Security Challenge: A New Frontier in Cybersecurity security Yes
Tue, 24 Jun 2025 15:02:35 GMT Soft Armor. vulnerability Yes
Tue, 24 Jun 2025 14:00:47 GMT Cyber Briefing: 2025.06.24 infosec Yes
Tue, 24 Jun 2025 00:14:00 GMT Day 13 — How to Deploy and Secure Public IBM Cloud Functions U... pentesting Yes
Tue, 24 Jun 2025 17:25:34 GMT America’s IT Zone — The Digital Engine of the World information-technology Yes
Tue, 24 Jun 2025 17:03:53 GMT Opacity— TryHackMe — Walkthrough hacking Yes
Tue, 24 Jun 2025 14:49:53 GMT ## TryHackMe — New York Flankees Walkthrough infosec, ethical-hacking Yes
Tue, 24 Jun 2025 15:25:24 GMT 175k Bonus Points hacking Yes
Tue, 24 Jun 2025 17:34:23 GMT Elegantly Customizing Spring Cloud OAuth2 Token Return Format wit... security Yes
Tue, 24 Jun 2025 17:00:19 GMT Online and On Guard: Simple Tech Tips for Smarter Online Learning security Yes
Tue, 24 Jun 2025 09:21:44 GMT Infrastructure Management via VMmanager API and Ansible information-technology Yes
Tue, 24 Jun 2025 18:00:56 GMT ISO 27001:2022 Explained — The Ultimate Guide to Modern Inf... cybersecurity Yes
Tue, 24 Jun 2025 12:11:47 GMT PentestGPT: The Future of Automated Penetration Testing with AI penetration-testing, information-technology Yes
Tue, 24 Jun 2025 15:20:43 GMT “Deep Dive into Metasploit� penetration-testing Yes
Tue, 24 Jun 2025 09:29:48 GMT FOFA Dorking | Part 8 pentesting, recon Yes
Tue, 24 Jun 2025 17:44:47 GMT Relearning FSRM Skills: Quotas, File Blocking, and VM Restore Mod... information-technology Yes
Tue, 24 Jun 2025 12:52:51 GMT Vega PwnTillDawn || 10.150.150.222 Write-Up hacking Yes
Tue, 24 Jun 2025 10:36:39 GMT Resumen de novedades: Inteligencia Artificial & Tecnologías de I... information-technology Yes
Tue, 24 Jun 2025 06:26:58 GMT The Windows Security Journey — HVCI (Hypervisor Protected C... information-security Yes
Tue, 24 Jun 2025 07:42:53 GMT WebSocket Attacks — The protocol that dances under your se... infosec, ethical-hacking Yes
Tue, 24 Jun 2025 15:35:18 GMT Is Your Phone Being Hacked? 6 Warning Signs You Should Never Ign... cyber-security-awareness Yes
Tue, 24 Jun 2025 17:56:11 GMT The Firewall of Truth: A Cautionary Tale for Our Industry cybersecurity Yes
Tue, 24 Jun 2025 14:24:35 GMT API05:2023 — Broken Function Level Authorization penetration-testing Yes
Tue, 24 Jun 2025 05:41:49 GMT � Stop API Key Leaks Before They Cost You — Meet KeySentr... bug-bounty-tips, bug-bounty-writeup, api-key Yes
Tue, 24 Jun 2025 07:57:54 GMT Still Using Sessions? Try Fluid Identity Anchors for Stateless PH... web-security Yes
Tue, 24 Jun 2025 18:00:30 GMT What If? — The Blind Date vulnerability Yes
Tue, 24 Jun 2025 06:31:52 GMT DOM XSS in document.write sink using source location.search —... bug-bounty, web-security, xss-attack Yes
Tue, 24 Jun 2025 17:05:44 GMT Race Condition 101: How I Exploited a Real Bug Bounty Scenario to... bug-bounty, bug-bounty-tips, bug-bounty-writeup Yes
Tue, 24 Jun 2025 17:42:20 GMT Linux Sysadmin 101: Commands, Concepts & Security You Must Know security Yes
Tue, 24 Jun 2025 09:40:32 GMT Building a Security Operations Center (SOC) Part - I infosec Yes
Tue, 24 Jun 2025 05:43:33 GMT You’re Missing Bugs If You’re Not Reconning Like This infosec Yes
Tue, 24 Jun 2025 06:18:30 GMT Remote File Inclusion (RFI) — Full Breakdown for Beginners bug-bounty-tips, bug-bounty-writeup Yes
Tue, 24 Jun 2025 13:23:05 GMT the burden of the eldest vulnerability Yes
Tue, 24 Jun 2025 16:46:42 GMT In a World of GenAI, File Formats Are So 20th Century information-technology Yes
Tue, 24 Jun 2025 13:27:22 GMT Lookup Walkthrough hacking, ethical-hacking Yes
Tue, 24 Jun 2025 10:06:55 GMT When Your SSD Crashes: Do’s and Don’ts of Data Recovery information-technology Yes
Tue, 24 Jun 2025 17:21:24 GMT Warhead: A Deep Dive into Payload Execution through Atom Tables security Yes
Tue, 24 Jun 2025 11:17:29 GMT eJPT - 3.4 Exploitation exploit Yes
Tue, 24 Jun 2025 15:32:56 GMT You’re Not Safe Online Until You Know These 5 Cybersecurity Se... cyber-security-awareness Yes
Tue, 24 Jun 2025 07:41:10 GMT Blockchain and Web3 Smart Contract Exploits: The Next Frontier in... bug-bounty Yes
Tue, 24 Jun 2025 11:31:36 GMT HackTheBox Writeup — Armageddon penetration-testing, ethical-hacking Yes
Tue, 24 Jun 2025 10:32:57 GMT PHP file Upload Security: A complete guide to protecting your web... web-security Yes
Tue, 24 Jun 2025 08:40:53 GMT Login Service in Java with Spring Boot and Ultra-Secure Password ... web-security Yes
Tue, 24 Jun 2025 10:33:52 GMT Hacking DC 3 — Vulnhub Walkthrough penetration-testing, information-security, ethical-hacking Yes
Tue, 24 Jun 2025 14:17:28 GMT The 5 Costliest Cybersecurity Incidents of 2024–2025: Lessons, ... cyber-security-awareness Yes
Tue, 24 Jun 2025 15:42:48 GMT If Nobody Ever Called You “Honey� vulnerability Yes
Tue, 24 Jun 2025 17:55:10 GMT Understanding Different Types of Cyber Threats cybersecurity, cyber-security-awareness Yes
Tue, 24 Jun 2025 18:04:16 GMT Hunting Fileless Malware in the Windows Registry cybersecurity Yes
Tue, 24 Jun 2025 07:31:52 GMT Popular Bug Bounty Platforms for Beginners: Your Complete Guide t... bug-bounty, web-security, bug-bounty-tips, ethical-hacking Yes
Tue, 24 Jun 2025 07:41:15 GMT The Uppercase Escape: Breaking Endpoint Restrictions via Case-Sen... bug-bounty-tips, bug-bounty-writeup Yes
Tue, 24 Jun 2025 15:02:38 GMT Swimming : Should I learn or not vulnerability Yes
Tue, 24 Jun 2025 07:31:52 GMT HackTheBox Writeup — Time ethical-hacking Yes
Tue, 24 Jun 2025 08:56:39 GMT Top 5 Cybersecurity Threats You Need to Know in 2025 infosec Yes
Tue, 24 Jun 2025 12:02:51 GMT The Dark Side of Swagger UI: How XSS and HTML Injection Can Compr... bug-bounty, penetration-testing Yes
Tue, 24 Jun 2025 12:02:48 GMT The Rise of Rogue AI: A Warning We Can’t Ignore cyber-security-awareness Yes
Tue, 24 Jun 2025 16:31:40 GMT Phishing, Malware & Ransomware: Know Your Digital Enemies hacking Yes
Tue, 24 Jun 2025 17:27:49 GMT Failure is a Teacher: The Vulnerable Leader’s Approach to Setba... vulnerability Yes
Tue, 24 Jun 2025 14:32:49 GMT Why I Can’t Say “I Miss You� — Even When I Do vulnerability Yes
Tue, 24 Jun 2025 06:23:59 GMT How Getting Stuck Led Me to a $3,XXX Bounty: The Recon That Almos... bug-bounty-tips, bug-bounty-writeup Yes
Tue, 24 Jun 2025 17:48:51 GMT BCACTF 2025 Write-Up cybersecurity Yes
Tue, 24 Jun 2025 02:28:13 GMT Week 2: Understanding Data Loss Prevention (DLP) information-security Yes
Tue, 24 Jun 2025 08:36:33 GMT Fix Insufficient Transport Layer Protection in Symfony penetration-testing Yes
Tue, 24 Jun 2025 13:31:27 GMT How to Automate SQLi & XSS Hunting bug-bounty, web-security, ethical-hacking Yes
Tue, 24 Jun 2025 16:03:56 GMT 16 Billion Passwords Leaked: Here’s What You Need to Know (and ... cyber-security-awareness Yes
Tue, 24 Jun 2025 07:12:00 GMT Kerberoasting: From Ticket to Plaintext Passwords information-security Yes
Tue, 24 Jun 2025 18:09:19 GMT How I Found My First Critical Bug Bounty | Unauthenticated Arbit... bug-bounty, security, ethical-hacking Yes
Tue, 24 Jun 2025 18:01:36 GMT VIE | Thá»±c hành môn Phân tích Lá»— hổng & Kiểm thá»­â€... cybersecurity Yes
Tue, 24 Jun 2025 13:17:11 GMT FreeType Zero-Day Exploited: Paragon Spyware Campaign Targets Sys... vulnerability Yes
Tue, 24 Jun 2025 17:23:09 GMT How to Ingest Salesforce Logs into Chronicle SIEM: The Complete I... security, information-technology Yes
Tue, 24 Jun 2025 10:54:31 GMT TryHackMe Watcher — Walkthrough penetration-testing, hacking Yes
Tue, 24 Jun 2025 12:31:59 GMT Reverse Engineering iOS Apps with Hopper Disassembler: From IPA t... bug-bounty, information-security Yes
Tue, 24 Jun 2025 15:35:49 GMT #67 — Vitamin Supplements for Personal Bonds vulnerability Yes
Mon, 16 Jun 2025 12:32:39 GMT The Impact of Reconciliation Automation on Financial Reporting Sp... recon
Wed, 05 Mar 2025 02:43:09 GMT One Program, Three Takeovers — A Deep Dive into Subdomain H... subdomain-takeover
Tue, 10 Jun 2025 09:09:11 GMT Elevate Your Trading with WhiteBIT’s “Boost Your Portfolio�... bounty-program
Fri, 16 May 2025 21:10:28 GMT Open Redirect via Base64-Encoded state Parameter in OAuth Flow (r... bugcrowd
Fri, 09 May 2025 18:08:20 GMT Google Dorking: The Ethical Hacker’s Guide to Advanced Search T... google-dorking, dorking
Wed, 30 Apr 2025 18:31:18 GMT Mastering Google Dorking (Advanced Techniques for OSINT Professio... dorking
Fri, 06 Jun 2025 15:47:21 GMT ��♂� GitHub Dorking for Bug Bounty: Hackers' Hidden Playg... dorks, github-dorking
Fri, 20 Jun 2025 10:58:18 GMT Security Report: IDOR Vulnerability in Syfe Bug Bounty Program idor
Sat, 14 Jun 2025 03:31:23 GMT The Tools I Use Every Day That Would Get Me Fired If I Had a Job shodan
Sat, 21 Jun 2025 13:44:14 GMT Subdomain Takeover Made Easy: How to Detect Vulnerabilities Using... subdomain-takeover
Thu, 19 Jun 2025 15:16:35 GMT A Jar Full of Trouble: Why pickle.loads() is inherently insecure application-security
Mon, 26 May 2025 15:44:42 GMT File Upload Vulnerabilities file-inclusion
Thu, 19 Jun 2025 01:40:55 GMT Remote Code Execution via a Base64-Encoded Payload — No Log... bugs
Fri, 09 May 2025 15:42:28 GMT Mastering Nuclei — The Ultimate Tool for Web Vulnerability... bug-bounty-hunting
Tue, 13 May 2025 06:21:22 GMT don’t know where to start Bug Bounty!!! start your journey now bug-bounty-program
Sun, 08 Jun 2025 05:40:02 GMT Secure Frontend Applications with Content Security Policy cross-site-scripting
Tue, 20 May 2025 21:30:26 GMT My First CVE: Privilege Escalation & Possible Account Takeover in... vulnerability-disclosure
Sun, 26 Jan 2025 16:56:43 GMT Cybersecurity : File Inclusion Vulnerabilities Explained file-inclusion
Tue, 14 Jan 2025 19:58:17 GMT OpenSprinkler Misconfiguration: Because Who Doesn’t Want Their ... censys
Fri, 20 Jun 2025 12:42:12 GMT Beyond Roles: The Case for Context-Aware Authorization in Modern... application-security
Wed, 18 Jun 2025 10:37:58 GMT Introduction to OSINT — Challenge Walkthrough google-dorking
Fri, 23 May 2025 21:31:19 GMT Securing the Digital Frontier: Welcome to My Cybersecurity Blog security-research
Wed, 21 May 2025 12:37:43 GMT Top 10 Web Directory Submission Sites to Boost SEO and Increase W... directory-listing
Mon, 23 Jun 2025 03:38:51 GMT What Is Cybersecurity? cybersecurity-tools
Mon, 09 Jun 2025 12:36:09 GMT Cloudflare R2 File Upload & Delete Service with AWS S3-compatible... file-upload
Fri, 31 May 2024 13:29:16 GMT Map of the worlds best URLs 2025 log-poisoning
Wed, 11 Jun 2025 08:28:37 GMT How I Earned My First $200 Bounty xss-vulnerability
Thu, 19 Jun 2025 12:27:19 GMT When Luxury Meets Vulnerability: Analyzing the Dior, Adidas, Vict... bugbounty-writeup
Wed, 04 Jun 2025 08:53:53 GMT Shodan Dorks to Find PII Data & Leaks dorking, dorks, shodan
Mon, 02 Jun 2025 12:03:47 GMT How I Found a $9,762 Bug with Simple Subdomain Fuzzing rce
Wed, 18 Jun 2025 11:18:45 GMT In today’s fast-moving digital world, data breaches have become... vapt
Thu, 26 Dec 2024 15:23:03 GMT GitHub Dorking List: The Ultimate Guide to Exploring and Securing... github-dorking
Fri, 20 Jun 2025 02:17:45 GMT From Search to Hall of Fame: Responsible Disclosure of a Grafana ... cve
Thu, 19 Jun 2025 12:36:37 GMT Introduction: directory-listing
Sun, 15 Jun 2025 00:12:33 GMT Good Recon, Easy XSS — A Simple Reflected Find in Online Ga... xss-vulnerability
Tue, 03 Jun 2025 07:36:26 GMT Portswigger Web Security Academy | Information Disclosure Lab #1 information-disclosure
Sun, 01 Dec 2024 08:49:26 GMT From Minor Bug to Major DoS: My Journey with Web Cache Poisoning web-cache-poisoning
Tue, 03 Jun 2025 06:00:20 GMT Remote File Inclusion (RFI) Lab — Docker Custom Setup and E... lfi
Sun, 15 Jun 2025 15:45:42 GMT Proving Grounds Play: Gaara Walkthrough pentest
Thu, 13 Feb 2025 09:11:19 GMT Prevent Subdomain Takeover in Laravel: Risks & Fixes subdomain-takeover
Thu, 19 Jun 2025 20:36:37 GMT ✨ Bug Bounty Checklist — From Recon to Exploitation ⚔� bug-bounty-hunter, bug-bounty-program
Fri, 07 Mar 2025 18:29:39 GMT Lo-Fi TCTF local-file-inclusion
Mon, 02 Dec 2024 20:19:13 GMT Master Advanced Subdomain Enumeration with AlterX: A Bug Bounty H... subdomain-enumeration
Sat, 21 Jun 2025 11:47:18 GMT Insecure Deserialization: How a Simple Pickle Can Ruin Your Day application-security
Wed, 18 Jun 2025 07:12:06 GMT Why VAPT Testing is Crucial for Every Modern Organization vapt
Tue, 17 Jun 2025 21:21:21 GMT Styling a Custom File Uploader with Tailwind CSS and Django file-upload
Sat, 14 Jun 2025 09:24:46 GMT How to Get 1000+ HQ Backlinks for Your Startup with Startories directory-listing
Mon, 02 Jun 2025 12:06:13 GMT Advanced XSS Payload Write-Up: DOM Injection via Chatbot / HTML ... bounty-program
Wed, 23 Apr 2025 16:55:52 GMT Mastering Subdomain Enumeration with Subfinder — A Passive... bug-bounty-hunting
Sun, 08 Jun 2025 16:39:15 GMT Ask LLM to Jailbreak LLM pentest
Thu, 05 Jun 2025 18:17:51 GMT Certified Appsec Practitioner V2 (CAP) Review 2025 pentest
Sun, 08 Jun 2025 12:00:54 GMT 15 outils OSINT incontournables à maîtriser en 2025 shodan
Wed, 11 Jun 2025 18:28:02 GMT Get your OpenAI API Key and Let’s Explore Together api-key
Fri, 20 Jun 2025 13:37:59 GMT O que é Pentest (Teste de Intrusão)? O Guia Definitivo pentest
Sun, 29 Dec 2024 10:59:35 GMT Best XSS payloads for bypassing Cloudflare cyber-sec
Mon, 23 Jun 2025 14:31:51 GMT DOM XSS in jQuery anchor href attribute sink using location.searc... web-security, xss-attack
Fri, 30 May 2025 12:02:25 GMT Shodan.io — The Search Engine for Hackers � shodan
Mon, 16 Jun 2025 15:59:37 GMT “Create, Engage, Earn: Dive into Roam’s 2025 Community Bounty... bounty-program
Wed, 18 Jun 2025 14:01:48 GMT FOFA Dorking | Part 7 dorking
Thu, 19 Jun 2025 09:34:58 GMT Your Kid Might Be Bypassing Screen Time App Limits on macOS Using... security-research
Sat, 12 Apr 2025 05:03:37 GMT Subdomain takeover subdomain-takeover
Tue, 20 May 2025 05:36:34 GMT From Rate Limiting to Account Takeover: The Bug That Escalated Qu... vulnerability-disclosure
Tue, 27 May 2025 02:26:40 GMT HTB Bug Bounty Hunter Certification’s skill assessments: File U... rce, lfi
Thu, 12 Jun 2025 21:51:47 GMT Unlock Exclusive BOUNTY Through ChainBounty's Community Drop bounties
Wed, 29 Jan 2025 17:20:22 GMT The $500 Vulnerability: How Censys Search Led Me to a Quick Bug B... censys
Sun, 01 Jun 2025 17:28:42 GMT Use API keys to access Gemini models in Google Cloud api-key
Wed, 09 Apr 2025 00:45:00 GMT Bug Bounty Journey — Valid Report Part 5 vdp
Sun, 15 Jun 2025 16:47:33 GMT Cap HTB Walkthrough: Exploiting IDOR and Linux Capabilities for R... idor
Sun, 15 Jun 2025 23:54:35 GMT Apache James Server 2.3.2 — Authenticated Remote Code Exec... remote-code-execution
Tue, 17 Jun 2025 15:18:09 GMT Easy Custom Headers For Your Bug Bounty Tooling hackerone
Sun, 15 Jun 2025 23:23:18 GMT My HackerOne 30/26 CTFs Process hackerone
Fri, 23 May 2025 14:25:15 GMT Beyond the First $1,000: What Resilience Really Means in Bug Boun... bug-bounty-program
Mon, 21 Nov 2022 22:42:17 GMT Explorando XSS no lugar do meu nome. web-pentest
Sat, 07 Jun 2025 09:41:21 GMT What Is XSS(Cross Site Scripting)? cross-site-scripting
Tue, 27 May 2025 02:13:38 GMT Logged Out But Still In: How I Exploited a JWT Flaw to Bypass Aut... bug-bounty-hunter, bug-bounty-program
Wed, 07 May 2025 15:29:09 GMT WinPEAS & LinPEAS — The Most Powerful Privilege Escalation... bug-bounty-hunting
Tue, 27 May 2025 16:55:11 GMT Google Dorking: The Hacker’s Search Engine Trick That Exposes M... google-dorking
Sun, 30 Mar 2025 16:30:24 GMT Subdomain Takeover subdomain-takeover
Thu, 12 Jun 2025 19:43:22 GMT Unlock a Healthier You: The Jaw-Dropping Benefits of Fish Oil & W... bounty-program
Fri, 13 Jun 2025 10:21:20 GMT มาลองโà¸� 10000 ¸‡à¹€à¸�มด้วย Cheat Engine pentest
Fri, 20 Jun 2025 18:14:30 GMT Apache ServerindÉ™ GözÉ™görünmÉ™z Hücum: Request Smuggling vÉ... bugs, hackerone
Tue, 10 Jun 2025 09:47:52 GMT From RXSS to ATO: Bypassing WAF with a Simple POST Trick cross-site-scripting, xss-bypass
Sat, 07 Sep 2024 07:42:54 GMT The Easiest Way to Find CVEs at the Moment? GitHub Dorks! github-dorking
Fri, 28 Jun 2024 14:51:14 GMT X-Forwarded HTTP header-ləri : Qısa izah log-poisoning
Sun, 22 Jun 2025 12:31:36 GMT � Day 5/30 Google Dorking: The Hacker’s Open Secret for Findi... google-dorking, dorking
Thu, 19 Jun 2025 10:11:04 GMT What Is Cybersecurity? cybersecurity-tools
Fri, 09 May 2025 08:37:50 GMT Comprendre l’obfuscation et l’encodage des charges utiles dan... xss-bypass
Fri, 02 May 2025 10:56:37 GMT Source code disclosure via backup files— Lab Walkthrough � information-disclosure
Tue, 23 Apr 2024 05:21:16 GMT OT Hunt: Analyzing CODESYS Security with MITRE T0886 censys
Tue, 03 Jun 2025 07:21:34 GMT CyberTalents Challenge cross-site-scripting
Fri, 30 May 2025 05:53:03 GMT From Novice to Net-Defender: Your First Steps into the World of B... bug-bounty-program
Mon, 19 May 2025 12:05:27 GMT How I Bypassed a Basic Security Control in “Forgot Password� ... bug-bounty-program
Sat, 14 Jun 2025 00:21:34 GMT How to Find and Exploit Jenkins Unauthenticated RCE via Shodan exploit
Mon, 16 Jun 2025 21:54:01 GMT DORK Announces Bonus Rollout: Pocket DORK Today dorks
Tue, 10 Jun 2025 14:38:28 GMT Cross-Site Scripting (XSS) Evolution: New Payload Techniques xss-vulnerability
Mon, 16 Jun 2025 13:02:19 GMT How I Found 5+ HackerOne Vulnerabilities (Legally) hackerone
Tue, 03 Jun 2025 17:29:57 GMT How Hackers Help NASA Stay Secure: Inside the NASA VDP vdp
Mon, 02 Jun 2025 14:06:34 GMT Vulnerability Assessment Explained: Identify and Fix Security Fla... vulnerability-scanning
Tue, 27 May 2025 09:42:14 GMT HackTheBox[31]: Forge-Writeup ssrf
Sun, 22 Jun 2025 12:49:25 GMT Injection Can Be Anywhere xss-vulnerability
Fri, 09 May 2025 08:54:29 GMT Understanding payload obfuscation and encoding in XSS attacks and... xss-bypass
Sat, 21 Jun 2025 06:15:30 GMT Code!..The final Frontier bugs
Wed, 20 Nov 2024 06:53:07 GMT Identify Infrastructure Linked To LockBit 3.0 Ransomware Affiliat... zoomeye
Thu, 29 May 2025 15:19:30 GMT Bug Bounty and Penetration Testing Explained: What’s the Differ... bugcrowd
Tue, 05 Dec 2023 07:54:40 GMT LFI via SMTP log poisoning log-poisoning
Tue, 17 Sep 2024 03:13:06 GMT Day 15: Remote Desktop Protocol (RDP) Abuse and Protection censys
Tue, 27 May 2025 09:36:21 GMT Netlas vs Shodan: Platforms Comparison cybersecurity-tools
Tue, 06 May 2025 13:00:37 GMT Email Enumeration melalui Endpoint POST /api/passwordReset/?h= bugcrowd
Wed, 18 Jun 2025 16:18:49 GMT “Unfiltered Talk� — How Target Chatbot Let Me Redecora... bugbounty-writeup
Thu, 24 Apr 2025 03:02:35 GMT How I’m Starting My Bug Bounty Journey in 2025 (And How You Can... bug-bounty-hunting
Tue, 10 Jun 2025 01:29:09 GMT Get $RECON and Enjoy Instant Crypto Rewards recon
Mon, 16 Jun 2025 10:42:04 GMT How to Verify and Secure ChainBounty $BOUNTY Token Claims Against... bounties
Wed, 15 Jan 2025 15:51:11 GMT Web Cache Poisoning: Turning Speed into a Security Nightmare web-cache-poisoning
Fri, 13 Sep 2024 20:07:54 GMT Unleashing GitHub Dorks: The Ultimate Hack for Finding Hidden Sec... github-dorking
Fri, 13 Jun 2025 04:01:40 GMT Mastering ping and traceroute for Ethical Hacking: How I Map Net... cybersecurity-tools
Sun, 15 Jun 2025 02:29:25 GMT Why Ethical Hackers Are the Future of Global Cybersecurity bugbounty-writeup
Thu, 13 Mar 2025 18:09:56 GMT How I Found Sensitive Information using Github Dorks in Bug Bount... github-dorking
Sun, 08 Jun 2025 10:42:18 GMT How To Instantly Claim $LFI lfi
Sat, 03 May 2025 04:53:31 GMT OSINT Combine CTFD — Challenge: Forest Pals google-dork
Thu, 12 Jun 2025 09:15:43 GMT Unlock Your Share of DORK's Reward Drop and Enjoy maximum benefit... dorks
Thu, 19 Jun 2025 06:48:47 GMT Weaponizing Uninstallers: A Deep Dive security-research
Sun, 08 Jun 2025 15:27:05 GMT Smart Systems, Real Threats: What You Need to Know About ICS & SC... cyber-sec
Sun, 22 Jun 2025 16:53:56 GMT Reflected XSS via File Upload on Sony bug-bounty-tips, hackerone
Sun, 22 Jun 2025 13:15:16 GMT Where are all the baby cockroaches? bugs
Wed, 04 Jun 2025 11:46:01 GMT Addressing the Risks Uncovered by an Application Vulnerability Sc... vulnerability-scanning
Fri, 13 Jun 2025 08:00:08 GMT “ Logs Don’t Lie: My Virtual Cyber Crime Investigation Experi... security-research
Tue, 10 Jun 2025 10:22:02 GMT Customers Asked to Upload Files—This Plugin Solved Everything file-upload
Sat, 20 Apr 2024 17:20:58 GMT TryHackMe — Brute Walkthrough | TheHiker log-poisoning
Thu, 28 Sep 2023 23:05:39 GMT Archangel — TryHackMe log-poisoning
Mon, 24 Feb 2025 21:37:57 GMT CÓMO DESCUBR� UNA VULNERABILIDAD XSS EN UN PROGRAMA VDP vdp
Sat, 12 Apr 2025 09:01:53 GMT Exposing a Critical Data Leak: My Experience in NASA’s Vulnerab... vulnerability-disclosure
Tue, 27 May 2025 08:27:52 GMT Exploiting Web Cache Poisoning with X-Host Header Using Param Min... web-cache-poisoning
Fri, 20 Jun 2025 19:29:57 GMT The Salar de Uyuni Wallpaper: Google’s Forgotten Pixel Bug? bugs
Fri, 20 Jun 2025 06:45:54 GMT How to Start Bug Bounty in 2025 — Technical Guide with Too... bug-bounty-hunter, bug-bounty-program
Thu, 22 May 2025 17:17:23 GMT DOM-Based XSS in Single Page Applications (SPAs): A Complete Gui... xss-bypass
Thu, 22 May 2025 10:08:23 GMT Consigue una elegante skin WhiteBIT Nova para celebrar el Día de... bounty-program
Sat, 21 Jun 2025 05:13:34 GMT Cross-Site Scripting (XSS) cross-site-scripting
Wed, 18 Jun 2025 06:21:55 GMT How I Hacked Accounts Using Host Header Injection in Password Res... hackerone
Thu, 28 Mar 2024 06:19:31 GMT Writing a POC for the v2board authorization vulnerability zoomeye
Sun, 15 Jun 2025 17:11:24 GMT How I Chained Recon and IDOR to Access 100's of Credit Cards idor
Mon, 12 May 2025 16:49:59 GMT SEO & Google Dorking: A Power Combo for Digital Sleuths & Smart ... google-dorking
Mon, 16 Jun 2025 07:31:36 GMT $$ Mass Hunting with FOFA Dorking dorking
Sat, 26 Apr 2025 14:25:59 GMT How I Found a Critical Security Flaw and Earned a Reward on a VDP vulnerability-disclosure
Thu, 19 Jun 2025 06:22:19 GMT Roundcube: CVE-2025–49113 cve
Tue, 17 Jun 2025 18:36:36 GMT Beyond Shifting Left: Securing the Full Software Lifecycle cve
Wed, 05 Jun 2024 07:43:13 GMT Leveraging Censys for Effective Pentesting censys
Thu, 29 Jun 2023 15:48:47 GMT HOGWARTS: BELLATRIX (walkthrough) log-poisoning
Sat, 31 May 2025 12:35:16 GMT Unauthenticated Kibana Dashboard Access — A Serious Securit... bugcrowd
Sat, 14 Jun 2025 02:53:27 GMT Powerful XSS Automation: Combining GF Patterns, Waybackurls, and ... bugbounty-writeup
Thu, 24 Apr 2025 14:05:05 GMT ��♂� Google Dorks: The Power of Advanced Search Operators dorking
Fri, 07 Mar 2025 09:14:37 GMT Uncovering an Account Linking Vulnerability: Persistent Unauthori... vulnerability-disclosure
Sat, 04 Jan 2025 17:20:23 GMT GitHub dork github-dorking
Thu, 15 Feb 2024 14:36:19 GMT Github Dorking: A Beginner’s Guide to Finding Secrets in Reposi... github-dorking
Tue, 03 Jun 2025 08:20:34 GMT SSRF: When Your Server Becomes a Nosy Hacker — Part 1 ssrf
Wed, 18 Jun 2025 19:58:20 GMT Is Google Dorking Illegal? Know the Legal Risks google-dorking
Sun, 22 Jun 2025 14:54:24 GMT Introducing ng-files-input — Angular File Upload + Preview ... file-upload
Mon, 23 Jun 2025 14:23:33 GMT Bypass Facebook Business Quarantine — Integrity Safeguards bug-bounty-tips, bug-bounty-writeup
Sat, 21 Jun 2025 09:34:08 GMT Understanding the Web’s Most Dangerous XSS and CSRF xss-attack
Wed, 18 Jun 2025 04:12:06 GMT BI.ZONE Bug Bounty Platform bug-bounty-hunter, bug-bounty-program
Wed, 30 Apr 2025 14:46:57 GMT From Internal IP Discovery to Full Database Dump information-disclosure
Mon, 03 Mar 2025 19:57:38 GMT Bug Bounty Hunting with Censys: Finding an Unsecured Elasticsearc... censys
Mon, 23 Jun 2025 16:12:58 GMT From Lab to Live Fire: Taking TCM Security’s PWPA Certification pentesting
Sun, 01 Jun 2025 05:05:22 GMT The Best Bug Bounty Tools in 2025 (With Pro Tips to Use Them Eff... bug-bounty-hunter
Mon, 16 Jun 2025 06:28:53 GMT HUNTR — Bug Bounty Platform for AI/ML bug-bounty-program
Fri, 24 Jan 2025 09:34:52 GMT A new Holistic temple opening InLeeds web-pentest
Fri, 02 May 2025 02:34:44 GMT OSINT Combine CTFD — Challenge: Safari Time google-dork
Fri, 01 Nov 2024 11:29:10 GMT Mastering Subfinder for Bug Bounty: Ultimate Guide to Subdomain E... subdomain-enumeration
Sun, 15 Jun 2025 09:16:26 GMT [TryHackMe] hacking DVWA (part 2) remote-code-execution, local-file-inclusion
Tue, 06 May 2025 08:38:54 GMT Lab 3 — Practical Malware Analysis security-research
Fri, 13 Jun 2025 13:58:45 GMT API Keys vs. Bearer Tokens: What’s the Deal and When Should You... api-key
Tue, 17 Jun 2025 10:22:27 GMT Rate Limit Bypass: Techniques, Real-World Examples, and How to De... vapt
Thu, 19 Jun 2025 14:53:14 GMT Getting Started in Bug Bounty: Tips for Beginners bug-bounty-hunter
Tue, 24 Dec 2024 11:36:05 GMT Bug Bounty Journey — Valid Report 1 vdp
Mon, 23 Jun 2025 15:55:39 GMT Penetration Testing: Vulnerability (Basic) remote-code-execution
Sun, 22 Jun 2025 17:56:00 GMT Custom Tooling Using Python- TryHackme Room Writeup exploit
Sat, 07 Jun 2025 15:12:09 GMT Beginner’s Luck? I Found Remote Code Execution on a .GOV Site ... remote-code-execution
Sun, 22 Jun 2025 05:15:06 GMT The Journey of a Professional Penetration Test vapt
Sat, 14 Jun 2025 00:45:18 GMT Penggunaan Masscan, Nmap, CrackMapExec, dan Dirsearch dalam Cyber... cybersecurity-tools
Sat, 07 Jun 2025 12:54:51 GMT Claim $BOUNTY Today bounties
Mon, 23 Jun 2025 05:43:03 GMT The Silent XML Trap That Could Compromise Your OTP Security application-security
Sat, 21 Jun 2025 11:22:51 GMT A Playbook for Application Security Pentest Reports application-security
Sat, 27 Apr 2024 18:54:43 GMT Censys is out of control censys
Thu, 12 Jun 2025 17:46:39 GMT Security threats for web application cross-site-scripting
Sat, 24 May 2025 01:13:32 GMT Directory Listing Vulnerability Leading to Information Disclosure... information-disclosure, directory-listing
Mon, 23 Jun 2025 17:26:55 GMT ## CVE-2025-3248 Scanner – A Powerful Tool to Detect a Critical... cve
Mon, 19 May 2025 09:06:01 GMT Introducing Profiler: The Best and Most Affordable OSINT Platform cyber-sec
Sat, 21 Jun 2025 19:52:17 GMT Google Dorking: Smart Search or a Digital Superpower? dorking
Tue, 10 Jun 2025 20:43:30 GMT Damn Vulnerable DeFi — #04 Side Entrance exploit
Mon, 02 Jun 2025 14:25:51 GMT Increase Your LunaFi $LFI Rewards in 2025 lfi
Sat, 21 Jun 2025 16:35:48 GMT Gaining Internal Access via Network Pivoting with Ligolo-ng pentest
Wed, 18 Jun 2025 07:49:49 GMT The Top 5 Challenges Faced by EdTech Companies file-upload
Thu, 19 Jun 2025 15:13:12 GMT DOM XSS and JavaScript Logic: Escaping HTML ≠ Escaping Danger xss-vulnerability
Fri, 23 May 2025 05:47:25 GMT Meet Bluepill: Your Web3 Security BFF (Best Friend Forever) ✨ bug-bounty-program
Mon, 23 Jun 2025 06:30:51 GMT Hvordan udnytter vi open source? exploit
Sat, 08 Feb 2025 02:50:49 GMT Exploiting Web Cache Poisoning with Multiple Headers: A Practical... web-cache-poisoning
Mon, 23 Jun 2025 19:44:50 GMT Essential Windows Event IDs for Enterprise Security: SIEM Use Cas... infosec
Thu, 19 Jun 2025 17:59:05 GMT ⚠�Temporal Dead Zone: A Real Life Bug You Didn’t Know You W... bugs
Mon, 23 Jun 2025 15:31:22 GMT PHP RCE in a Restricted Environment Using pcntl_fork and pcntl_ex... bug-bounty-writeup, remote-code-execution
Fri, 20 Jun 2025 17:07:24 GMT Dork Recon to self-learn unique stuff exploit
Tue, 19 Nov 2024 17:26:48 GMT How to Install and Use dnsx for Subdomain Enumeration and DNS Rec... subdomain-enumeration
Sat, 07 Jun 2025 07:13:50 GMT Claiming Multiplier Live now for Bounty: Act now to earn 5x $BNTY... bounties
Sat, 11 Jan 2025 05:12:20 GMT AI in Cybersecurity: Friend or Foe? cyber-sec
Fri, 06 Jun 2025 10:39:09 GMT IDOR + Stored XSS Bypass Leads to Account Takeover cross-site-scripting
Sun, 11 May 2025 11:26:38 GMT Information disclosure in version control history —  Lab Wa... information-disclosure
Sun, 08 Jun 2025 16:39:51 GMT TJCTF2025 — Web Challenges ssrf
Tue, 18 Mar 2025 22:45:20 GMT Exposing a High-Risk Subdomain Takeover: How I Earned a Massive B... subdomain-takeover
Wed, 11 Jun 2025 11:31:03 GMT SQL Injection for Beginners to Advanced: Including RCE (Remote Co... rce
Tue, 11 Mar 2025 15:48:55 GMT Understanding Local File Inclusion (LFI) Vulnerability, Finding l... local-file-inclusion
Mon, 23 Jun 2025 06:44:31 GMT The Real Risk in Penetration Testing: Over-Reliance on Automation vapt
Sat, 15 Mar 2025 04:45:52 GMT Hacking Walkthrough: File Inclusion Assessment on Hack The Box file-inclusion
Sun, 22 Jun 2025 13:19:55 GMT Simple manual recon leads to P1 finding and uncovering AWS access... recon
Mon, 23 Jun 2025 13:21:52 GMT Can a 403 Page Hack Your Users Secretly xss-attack
Fri, 24 Jan 2025 00:08:47 GMT A majestic temple opportunity of wellbeing and wellness web-pentest
Sun, 20 Oct 2024 06:34:58 GMT How I Found My First P1 Bug ?? vdp
Tue, 17 Jun 2025 13:36:26 GMT Cloud Pentest Walkthrough: S3 Misconfig + SSRF to EC2 Metadata Ex... ssrf
Thu, 22 May 2025 03:48:44 GMT How i can bypassing strong WAF in XSS with simple payload xss-bypass
Thu, 19 Jun 2025 07:15:39 GMT Design QA: The Final Step That Brings Your Design to Life bugs
Fri, 13 Jun 2025 05:32:29 GMT $7,500 Bounty: Exposed Any User’s Email on HackerOne hackerone
Mon, 11 Dec 2023 18:17:01 GMT Exploiting a Log Poisoning. log-poisoning
Wed, 12 Mar 2025 10:51:45 GMT Carnival, Cybersecurity, and Career Goals: What I’ve Been Up To cyber-sec
Mon, 19 May 2025 15:12:39 GMT Top 200 Sweden local citations for swedish local seo directory-listing
Mon, 09 Jun 2025 18:43:18 GMT XSS in Hidden Input Without User Interaction bugcrowd
Sat, 14 Jun 2025 08:33:42 GMT The Anatomy of an RCE Attack : The Hacker’s Big Score rce
Fri, 30 May 2025 14:27:25 GMT TLS Abuse leads to Remote Code Execution rce
Tue, 17 Jun 2025 10:02:00 GMT Recon: FOFA və Shodan ilə Dorking (Bölüm 3) recon
Mon, 02 Jun 2025 07:32:30 GMT Top XSS POCs that made $50000 xss-bypass
Tue, 22 Apr 2025 07:40:39 GMT Android Pentesting: Bypass Root & Emulator Detection Without Fri... bug-bounty-hunting
Fri, 23 May 2025 06:02:53 GMT Search Skills shodan, censys
Sun, 08 Dec 2024 19:09:40 GMT Unlocking Cybersecurity with Censys: A Guide to Ethical Hacking, ... censys
Sat, 07 Jun 2025 10:50:43 GMT Claim $BNTY tokens by Bounty with This Crypto Guide within Minute... bounties
Sat, 21 Jun 2025 01:29:46 GMT Automating XSS using Dalfox, GF and Waybackurls xss-attack, xss-vulnerability
Sun, 19 Jan 2025 20:36:05 GMT How to Find Open Root Shells Online Using Censys: A Global Securi... censys
Thu, 19 Jun 2025 11:06:56 GMT The Art and Science of Shellcoding in Modern Exploits exploit
Mon, 16 Jun 2025 18:12:22 GMT From Errors to Exploits: A Manual Dive into SQL Injection (Part 2... exploit
Mon, 07 Apr 2025 17:11:26 GMT Web Cache: The Hidden Speed Booster That Can Become a Security Ri... web-cache-poisoning
Sun, 25 May 2025 13:12:40 GMT Exploiting Unsecured IoTs: Outsourced Scamming and How a YouTuber... dorks
Mon, 16 Jun 2025 04:57:10 GMT Get $BNTY and Enjoy Instant Crypto Rewards bounties
Sat, 07 Jun 2025 15:08:28 GMT How To Claim $BOUNTY Today bounties
Fri, 11 Apr 2025 06:52:53 GMT Potato local-file-inclusion
Tue, 17 Jun 2025 10:22:42 GMT HTML Injection: The Overlooked Exploit Every Developer Should Kno... vapt
Sun, 01 Jun 2025 06:34:47 GMT Scanning My Own Laptop with OpenVAS: A Hands-On Guide to Vulnerab... vulnerability-scanning
Sun, 22 Jun 2025 11:09:59 GMT How I Found Multiple CVEs in InnoShop ≤0.4.1 cve
Sat, 31 May 2025 07:32:28 GMT When XSS Payloads Became My Reddit Password: A Bug That’s Not ... xss-bypass
Fri, 06 Jun 2025 16:02:11 GMT Demystifying API Authentication — Part1 api-key
Sat, 07 Jun 2025 07:48:09 GMT Claim $DORK Tokens in No Time dorks
Wed, 11 Jun 2025 11:07:45 GMT When Your React Native File Uploads Turn Your App Into a Frozen P... file-upload
Wed, 28 May 2025 14:57:32 GMT Welcome to BountyGame17.online — Your Next Gaming Obsessio... bounty-program
Thu, 22 May 2025 11:19:00 GMT Found a Race Condition That Led to Privilege =>$750 bounty-program
Sat, 07 Jun 2025 15:42:56 GMT API Keys in Web3: Powerful Tools, Real Risks api-key
Wed, 12 Feb 2025 22:46:35 GMT https://www.express.co.uk/life-style/property/2012927/cleaning-ch... web-pentest
Sun, 22 Jun 2025 20:36:13 GMT Why 90% Fail at Bug Bounties (And How You Can Actually Win in 202... bug-bounty-writeup
Sun, 14 Jul 2024 11:56:11 GMT How I Can Get P1 Nasa easily — Dorking web-pentest
Wed, 11 Jun 2025 21:08:54 GMT Snag Exclusive BOUNTY Through ChainBounty's Launch Bonus bounties
Mon, 23 Jun 2025 11:30:54 GMT Stored XSS into HTML context with nothing encoded by PortSwigger xss-attack
Sat, 21 Jun 2025 11:57:54 GMT Debugging a Bug I Couldn’t Reproduce — For 3 Days bugs
Sun, 08 Jun 2025 09:28:14 GMT How To Claim $BNTY Tokens bounties
Sun, 01 Jun 2025 13:33:26 GMT Google Dorking: A Hacker’s Best Friend google-dork
Wed, 18 Jun 2025 06:57:27 GMT Key Differences Between Vulnerability Assessment and Penetration ... vapt
Tue, 17 Jun 2025 10:50:35 GMT Simple XXE Vulnerability POC vapt
Tue, 03 Jun 2025 13:18:35 GMT NOPS CTF — XSS lab xss-bypass
Tue, 20 May 2025 08:43:46 GMT Second-Order Takeover: Scoring High Rewards! subdomain-takeover
Thu, 27 Mar 2025 23:46:11 GMT Make Break and Betrayal web-pentest
Sun, 15 Jun 2025 16:39:53 GMT Shodan Dorks for OSINT, Recon, and Bug Bounty dorks, shodan
Thu, 12 Jun 2025 17:12:53 GMT Weaponizing Bookmarklets for Passive Recon: Wayback Machine, Viru... recon
Sun, 04 May 2025 09:03:51 GMT Modest Payouts, Major Payoff: 4 IDORs That Netted $12K bugcrowd
Fri, 07 Feb 2025 05:12:28 GMT Do You Struggle Finding Internal/Hidden Subdomains? Recon part 5 subdomain-enumeration
Mon, 16 Jun 2025 10:10:56 GMT VAPT Service Providers in India vapt
Sun, 25 May 2025 13:55:55 GMT Medusa Brute Force: Full Guide for Ethical Hackers & Bounty Hunte... bug-bounty-hunting
Sat, 01 Feb 2025 06:10:16 GMT How to Create Advanced Custom Wordlist? Dive into Recon Part 4 subdomain-enumeration
Wed, 19 Mar 2025 23:32:06 GMT Unity Mono Build Hacking cyber-sec
Sat, 21 Jun 2025 05:21:27 GMT Information Gatering (Reconnaissance) google-dork, shodan
Thu, 19 Jun 2025 22:49:50 GMT Exploiting JBoss for Remote Code Execution (RCE) — A Step-b... rce
Tue, 22 Apr 2025 10:38:20 GMT Trump’s Tariffs Cut Out Censys — ZoomEye Steps In Strong! zoomeye
Mon, 23 Jun 2025 16:53:24 GMT Reddit may soon ask: “Mind if I scan your eye? web-security
Fri, 06 Jun 2025 00:21:11 GMT Introducing Listwr.com directory-listing
Mon, 23 Jun 2025 16:51:04 GMT CVE-2025–0133: Reflected XSS in Palo Alto GlobalProtect (PAN-OS... bug-bounty-tips, bug-bounty-writeup
Mon, 23 Jun 2025 20:43:39 GMT SQL Injection Clásico: Exploiting con UNION SELECT pentesting
Sat, 03 May 2025 02:06:17 GMT Get Proactive on Vulnerability Disclosure: A Comprehensive Guide vulnerability-disclosure
Thu, 19 Jun 2025 03:56:25 GMT CVE-2025-23121 Critical Veeam Vulnerability: Backup Servers at Ri... remote-code-execution
Thu, 20 Mar 2025 12:57:29 GMT Tryhackme—File Inclusion&Path Traversal local-file-inclusion, file-inclusion
Sat, 10 May 2025 09:09:30 GMT XSS Part — 13 : Reflected XSS into HTML context with most ... xss-bypass
Wed, 09 Apr 2025 21:06:11 GMT $100-$1000 Worth Subdomain Takeover | Easy Bounty Methodology subdomain-takeover
Mon, 23 Jun 2025 21:55:26 GMT Ghost Driver Injection pentesting
Sat, 24 May 2025 19:34:52 GMT From Click to Critical: How I Found PII Without Even Trying —... bugcrowd
Sat, 31 May 2025 04:10:36 GMT FallParams — Find All Parameters vulnerability-scanning
Sat, 21 Jun 2025 07:31:16 GMT BAC — IDOR ($300–$2,500) hackerone
Mon, 28 Apr 2025 18:22:07 GMT Local File Inclusion (LFI) vs Remote File Inclusion (RFI) local-file-inclusion, file-inclusion
Thu, 19 Jun 2025 20:25:22 GMT XSS Meets IDOR: A Double Vulnerability Story on a Learning Platfo... idor, xss-vulnerability
Sat, 21 Jun 2025 05:39:37 GMT Cross-Site Scripting (XSS) xss-vulnerability
Fri, 20 Jun 2025 10:17:42 GMT Global Security Testing Market Size, Share, Key Drivers, Growth O... application-security
Fri, 20 Jun 2025 23:35:48 GMT Flagyard CTF — TechShop: Exploiting SSTI to Gain RCE and Re... rce
Fri, 20 Jun 2025 11:54:21 GMT Top 10 Free Threat Intelligence Feeds Every Security Team Should ... cybersecurity-tools
Sun, 08 Jun 2025 12:33:57 GMT How I wrote a “Phishing Detection� tool cybersecurity-tools
Sun, 22 Jun 2025 09:55:36 GMT Simple Guide to Custom File Uploads in Laravel Filament file-upload
Sat, 10 May 2025 17:14:32 GMT Google Dorking — Hacking con Buscadores dorking
Tue, 17 Jun 2025 14:44:30 GMT ï¸� How to Check If a Website or Link Is Harmful or Dangerous â... cybersecurity-tools
Tue, 10 Jun 2025 10:14:43 GMT Introducing ICSrank V2: Multi-Engine Search for ICS/OT OSINT shodan
Thu, 29 May 2025 19:11:31 GMT How I Earned My First $50 Bug Bounty with a Google Dork and a Te... bounty-program
Sun, 22 Jun 2025 05:58:13 GMT Stored XSS via SVG Upload Bypassing WAF xss-attack
Sat, 21 Jun 2025 15:04:43 GMT P F751 AN-OS CVE-2025–0133 | XSS xss-attack, cve
Sat, 21 Jun 2025 05:40:38 GMT Cross-Site Scripting (XSS) cross-site-scripting
Sun, 27 Apr 2025 09:20:36 GMT Information disclosure in error messages — Lab Walkthrough information-disclosure
Wed, 11 Jun 2025 23:16:24 GMT From IDOR to Stored XSS to Account Takeover — Chaining Bugs... idor
Thu, 22 May 2025 06:58:31 GMT How to Use FOFA, Shodan.io, and Hunter.io for Advanced Cyber Reco... shodan
Tue, 06 May 2025 14:29:08 GMT I Found Bugs in 50+ Paid Bug Bounty Programs bugcrowd
Mon, 02 Jun 2025 06:51:45 GMT Key things to know before Starting Bug bounty hunting journey bug-bounty-hunter
Sun, 01 Jun 2025 18:46:51 GMT How to find Jupyter Notebook RCE manually? bug-bounty-hunter
Sun, 26 Jan 2025 19:08:11 GMT Matrix strike’s back against honesty from a power stance web-pentest
Mon, 26 May 2025 19:11:26 GMT Why XSS Can Help You Get Your First Bug Bounty: A Beginner’s De... xss-bypass
Sun, 15 Jun 2025 21:20:33 GMT I Found a $4,200 Bug in 15 Minutes hackerone
Tue, 03 Jun 2025 12:10:05 GMT How Hackers Use Google to Hack You — “Google Dorking� E... google-dorking
Sun, 04 May 2025 09:07:27 GMT OSINT Combine CTFD — Challenge: Get Rotated! google-dork
Fri, 10 Nov 2023 03:38:01 GMT Apache error.log advanced Log poisoning RCE log-poisoning
Fri, 13 Jun 2025 07:57:00 GMT Plugin XSS Insecure Code Review cross-site-scripting, xss-vulnerability
Sun, 11 May 2025 18:03:02 GMT How to Google Smarter: Advanced Search Tricks You’ll Actually U... google-dork
Fri, 13 Jun 2025 16:43:29 GMT AI Agents as Attack Vectors: Deconstructing GitHub MCP Exploit & ... exploit
Mon, 16 Jun 2025 14:54:14 GMT WaveScan — A Modular and Smart Web Security Scanner Made i... pentest
Wed, 11 Jun 2025 09:11:07 GMT Why We Chose TopDevelopers.co to Showcase Aarya Infosmart’s Exp... directory-listing
Sun, 22 Oct 2023 19:57:30 GMT Performing a Log Poisoning Attack log-poisoning
Mon, 23 Jun 2025 16:20:18 GMT SQL Injection in 2025: Why This Zombie Threat Keeps Rising from ... web-security
Thu, 29 May 2025 21:07:50 GMT CAPTCHA as Dorks for Black Hat Hackers for their CSRF Uploads: A... google-dorking
Wed, 30 Apr 2025 14:24:52 GMT April Make Me Happy (Bug Bounty Hunting) dorking
Tue, 02 Apr 2024 01:31:31 GMT Java Framework Popularity Overview zoomeye
Sun, 08 Jun 2025 01:28:13 GMT Unlock the Potential of $BOUNTY and Earn Big with ChainBounty bounties
Wed, 30 Apr 2025 10:57:13 GMT Information disclosure on debug page —  Lab Walkthrough � information-disclosure
Sun, 16 Mar 2025 17:34:02 GMT Bypassing 2FA to Impersonate Users on Drugs.com vulnerability-disclosure
Fri, 11 Apr 2025 20:24:15 GMT HackTheBox Academy - Pentesting Basics: Public Exploits Writeup bug-bounty-hunting
Tue, 06 May 2025 08:09:58 GMT Prevent File Inclusion Vulnerability in Symfony file-inclusion
Thu, 22 May 2025 12:43:02 GMT Wireless Weapons: Turning Skycut Plotters into Physical Dangers security-research
Thu, 15 May 2025 15:24:05 GMT How Attackers Use Google Dorks to Discover Your Exposed Assets google-dork
Fri, 28 Mar 2025 15:06:05 GMT My First Bug Report: Logical Flaw in Task Completion Allows Unaut... vulnerability-disclosure
Fri, 07 Feb 2025 04:33:27 GMT How to Exploit Web Cache Poisoning with an Unkeyed Header Using P... web-cache-poisoning
Sun, 18 May 2025 00:24:13 GMT [picoCTF 2025] n0s4n1ty 1 — File Upload to RCE remote-code-execution
Tue, 17 Jun 2025 07:19:35 GMT Understanding Reconnaissance and Vulnerability Scanning in Cybers... vulnerability-scanning
Tue, 27 May 2025 17:04:45 GMT How to Earn Big by $DORK Yield Generation on StakingRewards dorks
Mon, 12 May 2025 12:38:38 GMT When Obfuscation Fails and Simplicity Wins: How Clean Code Silent... security-research
Mon, 09 Jun 2025 18:10:55 GMT Claim $DORK Tokens dorks
Tue, 17 Jun 2025 10:50:22 GMT OPENVAS, THE RIGHT WAY ! vulnerability-scanning
Thu, 12 Jun 2025 08:23:23 GMT How To Receive Free $RECON: A Comprehensive Guide by Recon Solana recon
Mon, 09 Jun 2025 03:00:08 GMT $500 OTP Bypass: Found It, Proved It, Then… bug-bounty-hunter
Thu, 05 Jun 2025 09:28:49 GMT Improper Coupon Validation Allows Unlimited Free Voucher Redempti... vulnerability-disclosure
Sun, 08 Jun 2025 00:34:24 GMT How to Claim $LFI Easily lfi
Mon, 23 Jun 2025 19:33:46 GMT PipeMagic Trojan: A Stealthy Threat Targeting Windows Systems information-security
Fri, 02 May 2025 16:09:20 GMT Exploiting File Inclusion: From Dot-Dot-Slash to RCE using PHP Se... local-file-inclusion
Wed, 30 Apr 2025 17:08:29 GMT Exploring Subdomains: What They Are and How to Find Them subdomain-enumeration, subdomain-takeover
Thu, 19 Jun 2025 15:31:03 GMT Why Do Most Hackers Fail at SSRF Exploitation ssrf
Sun, 22 Jun 2025 10:19:39 GMT Directory Listing Vulnerability Explained: How a Simple Misconfig... directory-listing
Wed, 04 Jun 2025 00:40:32 GMT How Can Dart Developers Secure API Keys in Apps? api-key
Sun, 23 Feb 2025 17:08:33 GMT File Inclusion Prevention file-inclusion
Fri, 20 Jun 2025 09:24:27 GMT LLMs vs XSS P1 xss-attack, xss-vulnerability
Mon, 23 Jun 2025 14:05:04 GMT Understanding Phishing: Don’t Take the Bait! information-security
Sat, 21 Jun 2025 20:42:33 GMT Logic Issue Allowed me to Takeover Any User Account bugbounty-writeup
Sat, 07 Jun 2025 17:03:51 GMT Step into the World of $LFI and Start Building Your Crypto Portf... lfi
Tue, 27 May 2025 22:43:57 GMT EG-CTF Finals: WEB-FlagFinder ssrf
Mon, 23 Jun 2025 04:23:53 GMT AWS Fortress — Hack The Box Review pentesting
Sat, 14 Jun 2025 18:51:04 GMT Exposing Sensitive Data via Web Cache Deception bugbounty-writeup
Sat, 14 Jun 2025 10:09:55 GMT A Hacker's Notebook: Real Techniques from the World of Bug Bount... rce, lfi
Sun, 01 Jun 2025 10:49:54 GMT Mastering DORK $DORK Rewards for Maximum Earnings dorks
Tue, 10 Dec 2024 15:26:15 GMT Mastering Bug Bounty Recon: Essential Techniques for Ethical Hack... subdomain-enumeration
Thu, 03 Oct 2024 13:07:03 GMT Subdomain Enumeration & Takeovers  (Part-2: Active Enumeration) subdomain-enumeration
Thu, 24 Apr 2025 20:15:29 GMT What about Information Disclosure Vulnerability? Scenarios? Mitig... information-disclosure
Wed, 03 Apr 2024 06:04:54 GMT PHP Framework Popularity Statistics zoomeye
Mon, 09 Jun 2025 14:58:12 GMT Our API Keys Leaked in a Git Repo — Here’s How We Cleaned... api-key
Sat, 25 Jan 2025 23:20:10 GMT Full GitHub Dorking guide: for OSINT and BugBounty (Reconnaissanc... github-dorking
Sun, 15 Jun 2025 19:22:38 GMT “Why IDORs Are Everywhere — And How to Find Them� idor
Sun, 08 Dec 2024 13:37:06 GMT CVE-2024–12209: WP Umbrella Eklentisinde Uzaktan Dosya Çalış... file-inclusion
Fri, 20 Jun 2025 17:37:34 GMT CVE-2025–0133: Reflected XSS Vulnerability in Palo Alto GlobalP... cve
Fri, 20 Jun 2025 14:05:16 GMT Hardening Your Static API Keys with Time-Based Signatures api-key
Mon, 23 Jun 2025 17:45:49 GMT Hacking Nothing! Unauthorised access to Nothing’s AWS S3 Bucket... pentesting
Tue, 06 May 2025 11:06:01 GMT Authentication bypass via information disclosure —  Lab Wal... information-disclosure
Sat, 01 Mar 2025 23:07:46 GMT LFI to RCE local-file-inclusion
Mon, 16 Jun 2025 18:40:58 GMT 0x03: Enumeration In GOAD vapt
Mon, 07 Oct 2024 04:01:53 GMT Subdomain Enumeration | BBOT ✅>= Subfinder + Sublist3r + Asset... subdomain-enumeration
Sat, 14 Jun 2025 06:48:50 GMT IDOR Vulnerability — Sadə Səhv, Böyük Təhlükə idor
Mon, 23 Jun 2025 08:05:51 GMT Mastering Nmap: The Ultimate Guide to Port Scanning bug-bounty-writeup
Sat, 21 Jun 2025 02:53:04 GMT Lindungi Lingkungan Digital Anda dengan Memahami Firewall dan Kea... application-security
Tue, 27 May 2025 13:23:48 GMT Becoming a Threat Intelligence Researcher: A Professional Roadmap... security-research
Thu, 19 Jun 2025 19:39:26 GMT When a .url File Can Own You — CVE-2025–33053 Explained cve
Fri, 13 Jun 2025 07:11:48 GMT AAVE Exploit: So Easy That it’s Hard Not To Hack exploit
Sun, 25 May 2025 15:52:01 GMT 8 Must-Have Features for Vulnerability Scanning Tool vulnerability-scanning
Fri, 06 Jun 2025 13:29:32 GMT Lofi — Tryhackme |By la file-upload
Sun, 22 Jun 2025 01:01:38 GMT The Cyber Threat Landscape Just Erupted: What You Need to Know No... bugs
Mon, 23 Jun 2025 02:47:43 GMT ADCS Attack Series: Abusing ESC4 via Template ACLs for Privilege ... pentesting
Wed, 12 Mar 2025 12:19:28 GMT Understanding the OSI Model and TCP/IP cyber-sec
Mon, 23 Jun 2025 15:48:41 GMT Uncovering Hidden Keys in AWS Beanstalk — A CloudGoat Attac... pentesting
Fri, 30 May 2025 16:12:21 GMT How I Turned a Simple Bug Into $5,756 rce
Mon, 26 May 2025 19:56:52 GMT Server-Side Request Forgery (SSRF) ssrf
Wed, 18 Dec 2024 21:47:52 GMT File Inclusion Vulnerabilities: Comprehensive Guide file-inclusion
Tue, 13 May 2025 08:01:19 GMT Understanding Local File Inclusion (LFI): A Comprehensive Guide remote-code-execution, local-file-inclusion
Fri, 29 Mar 2024 06:28:39 GMT Unlocking the Power of ZoomEye: Innovative Features and Vibrant C... zoomeye
Thu, 27 Mar 2025 11:00:27 GMT Mastering the Offensive Security Certified Professional (OSCP) Ce... cyber-sec
Sat, 14 Jun 2025 09:48:20 GMT When One Bug Isn't Enough: Finding a Full House of Vulnerabilitie... hackerone, bugbounty-writeup
Sun, 23 Feb 2025 11:17:25 GMT $1000-$10k worth Leaks via Github Secret Dorks github-dorking
Sun, 15 Jun 2025 14:00:09 GMT When PHP’s readfile() Goes Rogue: Exploiting LFI and SSRF in a ... lfi, ssrf
Thu, 12 Jun 2025 15:10:20 GMT How Does One CVE Lead to XSS, Redirect, and SSRF ssrf
Sun, 15 Jun 2025 08:35:08 GMT Where to Find Your Target Market: A Strategic Guide for Small Bus... directory-listing
Sun, 25 May 2025 02:52:58 GMT �影機暴露的��是畫�,而是整個生活 shodan
Sun, 08 Jun 2025 11:14:39 GMT How I Found Bug in Dutch Government and Never got the Swag recon
Sat, 21 Jun 2025 19:47:30 GMT Microsoft Excel LTSC 2024 Vulnerability Leads to Remote Code Exec... remote-code-execution
Mon, 23 Jun 2025 19:41:57 GMT Ticketmaster Data Breach 2024: What Happened and How It Affects M... information-security
Fri, 16 May 2025 15:17:35 GMT PII Leak via Email bugcrowd
Sat, 21 Jun 2025 11:33:01 GMT Insecure Direct Object Reference (IDOR): A Beginner’s Guide to ... application-security, idor
Sat, 03 May 2025 04:55:14 GMT OSINT Combine CTFD — Challenge: Hello Friend google-dork
Thu, 17 Apr 2025 14:01:40 GMT Data Disclosed: A Look into Real-World Incidents information-disclosure
Tue, 10 Jun 2025 13:48:23 GMT Make CTEM Work: How We Built a Pentest Reporting Platform to Keep... pentest
Sun, 22 Jun 2025 18:47:31 GMT IDOR Leads to Unauthorized Deletion: How I Earned $500 in Bug Bou... bug-bounty-tips
Mon, 23 Jun 2025 21:28:59 GMT Fuzzing Everything pentesting
Tue, 17 Jun 2025 15:22:45 GMT How to Install and Run Ghidra on macOS ARM (Apple Silicon) —... cybersecurity-tools
Tue, 03 Jun 2025 08:47:33 GMT From Discovery to Exploit: A Beginner’s Guide to CORS Bugs bug-bounty-hunting
Sun, 22 Jun 2025 15:03:29 GMT Advanced Port Scanning: Pentest Techniques and Real-World Insight... pentest
Sun, 09 Feb 2025 06:54:39 GMT From Duplicate to Letter of Appreciation: How I Hacked NASA vdp
Mon, 09 Jun 2025 06:00:32 GMT Exploring Draeneg: A Powerful Network Application for Analysis a... cybersecurity-tools
Fri, 20 Jun 2025 13:24:41 GMT From Login Page to Full Admin Panel Takeover (Arabic version) bugbounty-writeup
Mon, 23 Jun 2025 09:51:16 GMT Secrets Management in .NET Projects: What You’re Doing Wrong application-security
Thu, 13 Feb 2025 03:29:37 GMT ZoomEye Meets DeepSeek: AI-Powered Cyberspace Intelligence zoomeye
Tue, 10 Jun 2025 09:11:48 GMT დáƒ�ბუსტე შენი კრიპტáƒ� პáƒ�რáƒ... bounty-program
Mon, 02 Jun 2025 00:02:29 GMT Common Web Vulnerabilities: Cross-Site Scripting (XSS) cross-site-scripting
Mon, 01 Apr 2024 05:56:59 GMT Django vs. Flask: Who Has More Users? zoomeye
Wed, 18 Dec 2024 19:27:33 GMT Siber Güvenlik: Dijital Dünyanın Kalkanı cyber-sec
Sun, 15 Jun 2025 18:06:52 GMT How a Simple IDOR that causes PII Disclosure idor
Mon, 09 Jun 2025 12:32:12 GMT Best Reconciliation Software for Small Businesses: Save Time and ... recon
Sun, 08 Jun 2025 10:02:16 GMT How I Earned a Bounty Using VirusTotal Recon recon
Fri, 21 Mar 2025 20:40:42 GMT Understanding And Protecting Your Business from Subdomain Takeove... subdomain-takeover
Thu, 05 Jun 2025 15:48:42 GMT n8n tutorial : Setup an AI WhatsApp Agent from Scratch api-key
Wed, 11 Jun 2025 09:31:35 GMT How to install GO LANG and Run from anywhere in the system (Autom... bugbounty-writeup
Wed, 28 May 2025 15:28:17 GMT How Web Cache Poisoning via Unkeyed Query Strings Can Lead to Ref... web-cache-poisoning
Tue, 17 Jun 2025 03:56:59 GMT Instant $LFI : Your Path to Earning Passive Income lfi
Sun, 08 Jun 2025 09:55:07 GMT ESC1 AD CS Misconfigurations exploitation — Active Director... pentest
Mon, 16 Jun 2025 12:45:02 GMT File Upload With React Native Document Picker Updated: How to Use... file-upload
Mon, 12 May 2025 20:20:52 GMT Malvertising’s New Threat: Exploiting Trusted Google Domains security-research
Sun, 15 Jun 2025 05:26:37 GMT Race Condition in Upload Quota — Free Storage via Parallel ... bug-bounty-hunter
Sun, 18 May 2025 12:42:11 GMT Google Like a Hacker: Secrets Lurking in Plain Search. google-dorking
Mon, 27 Jan 2025 16:51:28 GMT The man who suffered 11 years in hell for freedom has now been fr... web-pentest
Tue, 19 Nov 2024 18:10:58 GMT HOW I FOUND A BUG IN NASA vdp
Thu, 22 May 2025 22:24:42 GMT Web Cache Poisoning lead to DoS Attack web-cache-poisoning
Fri, 16 May 2025 19:16:54 GMT Automated Recon with Python: Scanning IP Ranges for Reverse DNS a... directory-listing
Thu, 29 May 2025 12:14:31 GMT How I Rebuild a Linux Server After a Suspected Compromise (Step b... cyber-sec
Sat, 21 Jun 2025 13:27:33 GMT Bug Hunting Within the Law: A Friendly Guide bugs
Sat, 14 Jun 2025 16:28:40 GMT How I Got into NASA’s Hall of Fame in Just 4 Hours Using a Sim... google-dorking, bug-bounty-hunting
Sat, 05 Apr 2025 19:43:28 GMT Cache Poisoning Attacks: The Silent Saboteur of Web Caching web-cache-poisoning
Fri, 28 Mar 2025 06:30:45 GMT File Inclusion, Path Traversal : TryHackMe local-file-inclusion
Sun, 15 Jun 2025 05:25:14 GMT A classic file based IDOR on a government institute application p... idor
Mon, 02 Jun 2025 21:54:58 GMT Sometimes an informative report can also get you $$ in Bug Bounty... bounty-program
Thu, 19 Jun 2025 20:50:40 GMT ClickHouse Executable Table Abuse by Low Privilege User application-security
Sat, 26 Apr 2025 20:38:42 GMT Subdomain Takeover on VDP vdp
Thu, 19 Dec 2024 10:13:19 GMT Variable Data Printing: Personalization Redefined vdp
Fri, 20 Jun 2025 21:34:03 GMT BASE — How Low Can Your Docker CVEs Go? cve

About

This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_URL, https://freedium.cfd/Medium_URL

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Go 100.0%
0