Skip to content

rix4uni/medium-writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

Time Title Feed IsNew IsToday
Mon, 26 Jan 2026 21:01:22 GMT Reconnaissance: The Most Overlooked and Most Dangerous MITRE ATT&... cybersecurity Yes Yes
Mon, 26 Jan 2026 21:02:14 GMT Write-Up máquina PingPong de DockerLabs [ES] pentesting, cyber-sec Yes Yes
Mon, 26 Jan 2026 10:45:15 GMT Where Armor Is No Longer Required vulnerability Yes
Mon, 26 Jan 2026 12:51:36 GMT Powering Down Privacy: Tracking Tesla Powerwall Signatures using ... ethical-hacking Yes
Mon, 26 Jan 2026 10:42:01 GMT Injections for Dummies pentesting Yes
Mon, 26 Jan 2026 13:36:34 GMT 1. Web Cache Deception When Private User Data Becomes Public bug-bounty, hacking, infosec Yes
Mon, 26 Jan 2026 12:38:18 GMT SOC Burnout Depends on Dashboard Analyst Experience information-technology Yes
Mon, 26 Jan 2026 11:33:18 GMT The “Invisible Encryption� That Requires Showing Everyone You... infosec Yes
Mon, 26 Jan 2026 18:34:47 GMT WHEN MISFORTUNE BECOMES A CRIME SCENE: A SOCIETY THAT PROFITS FRO... security Yes
Mon, 26 Jan 2026 20:37:11 GMT SOC HomeLab — Part 3 (Building the User Device) cybersecurity Yes
Mon, 26 Jan 2026 16:00:51 GMT Mapping Security Frameworks and Regulations (ISO27001, NIS2, NIST... infosec, cyber-sec Yes
Mon, 26 Jan 2026 20:07:22 GMT Some Welcome Changes: Dissecting the OWASP Top 10 2025 cybersecurity, hacking Yes
Mon, 26 Jan 2026 17:44:27 GMT The Death of Objective Reality information-technology Yes
Mon, 26 Jan 2026 19:53:52 GMT All About OWASP Top 10 for Agentic AI Applications application-security Yes
Mon, 26 Jan 2026 16:41:22 GMT 9 Security Principles Every Beginner Must Know (Without Googling) cyber-security-awareness Yes
Mon, 26 Jan 2026 09:01:24 GMT Pasting Secrets into AI Chats: A Hidden Security Risk cyber-security-awareness Yes
Mon, 26 Jan 2026 18:02:42 GMT This Mobile App Trusted My Phone More Than It Should Have ⚠� bug-bounty, hacking, infosec, bug-bounty-tips Yes
Mon, 26 Jan 2026 20:42:19 GMT Bug Bounty in 2026: How to Find Your First Vulnerability (Without... bug-bounty, cybersecurity, hacking, ethical-hacking Yes
Mon, 26 Jan 2026 14:47:00 GMT VAmPI — Vulnerable API: API Security Testing application-security Yes
Mon, 26 Jan 2026 18:34:29 GMT IA como ferramenta, não como resposta security, information-security Yes
Mon, 26 Jan 2026 10:26:49 GMT HTB Web-Attacks Skills Assessment pentesting Yes
Mon, 26 Jan 2026 18:35:14 GMT How a Single Email Turned My ClawdBot Into a Data Leak security Yes
Mon, 26 Jan 2026 04:57:42 GMT How to Secure PHP Applications (With Real-World Breach Examples) web-security Yes
Mon, 26 Jan 2026 18:59:44 GMT TryHackMe OSINT Level 1 — What I learned ethical-hacking Yes
Mon, 26 Jan 2026 18:15:19 GMT Broken Object Level Authorization (BOLA) bug-bounty, security Yes
Mon, 26 Jan 2026 15:26:48 GMT The 2026 Business Tech Roadmap: Solving the Top 5 Implementation ... information-security Yes
Mon, 26 Jan 2026 16:57:22 GMT Understanding SSRF and Detecting It With AI, Enter See-SURF bug-bounty Yes
Mon, 26 Jan 2026 19:01:08 GMT Hardening AI Models: Why Your “State-of-the-Art� Model Will F... security Yes
Mon, 26 Jan 2026 10:01:05 GMT The Hiding Place of the High Achiever: Why I Chose a Career I Did... vulnerability Yes
Mon, 26 Jan 2026 13:44:25 GMT $1 Car Sale? Wondering what it is?? hacking Yes
Mon, 26 Jan 2026 16:25:11 GMT Everyday Digital Privacy: A Practical Guide to Protecting Your Da... information-security Yes
Mon, 26 Jan 2026 13:23:02 GMT Active Directory Penetration Testing penetration-testing Yes
Mon, 26 Jan 2026 20:17:49 GMT Créer un répertoire noexec sur macOS pour sécuriser ses télé... ethical-hacking Yes
Mon, 26 Jan 2026 15:32:53 GMT Functional Optics for Java: Why Mutability Bites You (Even If You... information-technology Yes
Mon, 26 Jan 2026 09:13:25 GMT Prompt Injection in Agentic AI bug-bounty-writeup Yes
Mon, 26 Jan 2026 18:14:42 GMT Is your iphone really secure security Yes
Mon, 26 Jan 2026 18:17:49 GMT How Lexius AI Transforms Retail Security with Real-Time Theft Det... security Yes
Mon, 26 Jan 2026 16:47:11 GMT REBEKAH vulnerability Yes
Mon, 26 Jan 2026 08:51:40 GMT How “Best Practices� Quietly Create Attack Paths ethical-hacking Yes
Mon, 26 Jan 2026 02:10:21 GMT The Truth About Internet Capital Markets bounty-program Yes
Mon, 26 Jan 2026 07:25:06 GMT How Forgotten DNS Records Lead to Subdomain Takeovers subdomain-takeover Yes
Mon, 26 Jan 2026 09:02:08 GMT Bug Bounty Checklist: 7 Things to Look for in LeakRadar Results bug-bounty-tips Yes
Mon, 26 Jan 2026 20:32:52 GMT Splunk Serisi #4: Bozuk Logları Tamir Etmek (TryHackMe — F... cybersecurity Yes
Mon, 26 Jan 2026 16:38:24 GMT V stages of Ethical hacking penetration-testing, ethical-hacking Yes
Mon, 26 Jan 2026 14:10:49 GMT How I Turned a Boring Self-XSS into a Real-World Attack Using CSR... bug-bounty, hackerone Yes
Mon, 26 Jan 2026 12:37:30 GMT Basic Pentesting Room- THM pentesting Yes
Mon, 26 Jan 2026 18:50:11 GMT Building Invisible Infrastructure: The Quiet Technology That Powe... information-technology Yes
Mon, 26 Jan 2026 17:32:02 GMT [PT-BR] CyberSploit1 — Walkthrough — PGPlay pentesting, ethical-hacking Yes
Mon, 26 Jan 2026 13:36:56 GMT Freezing the Autonomous Agent Layer: How I Found a Critical DoS ... bug-bounty, hacking Yes
Mon, 26 Jan 2026 13:29:56 GMT Why Open Ports Are Still the #1 Risk (And How to Close Them) infosec Yes
Mon, 26 Jan 2026 11:10:55 GMT Is Bug Bounty Playbook V2 worth your time? penetration-testing Yes
Mon, 26 Jan 2026 13:00:23 GMT 6 People You Should Never Trust With Your Vulnerability vulnerability Yes
Mon, 26 Jan 2026 06:36:55 GMT Mengamankan Container dari Kemungkinan Serangan Cyber — Dev... cyber-security-awareness Yes
Mon, 26 Jan 2026 17:15:20 GMT Cross-Site Scripting (XSS): From Basics to Battle-Tested Defense xss-attack, xss-vulnerability Yes
Mon, 26 Jan 2026 18:07:23 GMT How I Intercepted IP Camera Traffic Using NAT Redirect — A ... hacking Yes
Mon, 26 Jan 2026 13:57:42 GMT Securing the “Digital Lifeline�: The Urgency of Cybersecurity... information-technology, cyber-security-awareness Yes
Mon, 26 Jan 2026 03:11:46 GMT Why Walking Beats Driving for Wardriving Data recon Yes
Mon, 26 Jan 2026 15:17:42 GMT How I Passed TryHackMe’s Security Analyst Level 1 (SAL1): A Pra... information-security Yes
Mon, 26 Jan 2026 17:24:35 GMT Context-First Vulnerability Assessment and Persona Injection vulnerability, exploit Yes
Mon, 26 Jan 2026 13:00:59 GMT Fix Staff Shortage & Burnout in Your SOC with Better Threat Intel... cyber-security-awareness Yes
Mon, 26 Jan 2026 17:58:51 GMT Give your old computer a second life information-technology Yes
Mon, 26 Jan 2026 18:44:47 GMT How I Test a Website as a Red Team Intern (My Workflow) penetration-testing Yes
Mon, 26 Jan 2026 00:53:39 GMT Building a $5M Machine: Inside Our Production-Ready Web3 Bug Boun... bug-bounty-tips Yes
Mon, 26 Jan 2026 09:51:27 GMT Understanding Linux Persistence Techniques in Incident Response ethical-hacking Yes
Mon, 26 Jan 2026 18:02:46 GMT How to Set Up a VPN for Secure Crypto Gambling in 2026 | Privacy... security Yes
Mon, 26 Jan 2026 04:46:20 GMT 1000GB Mailbox Storage ✉�: Sounds Generous, Right? cyber-security-awareness Yes
Mon, 26 Jan 2026 14:02:03 GMT Understanding Testing vs. Evaluation in AI Systems penetration-testing Yes
Mon, 26 Jan 2026 14:20:28 GMT Forest — Hack The Box Write-Up penetration-testing Yes
Mon, 26 Jan 2026 17:22:14 GMT Utility Cloud Migration Readiness: A Practical Assessment Checkli... information-technology Yes
Mon, 26 Jan 2026 08:02:06 GMT Breaking Into Cybersecurity for Career Changers: A Step-by-Step G... cyber-security-awareness Yes
Mon, 26 Jan 2026 11:22:09 GMT PJPT Exam Review: Preparation, Methodology and the Reporting Proc... infosec Yes
Mon, 26 Jan 2026 09:13:30 GMT IoT Security — A Damn Vulnerable Intercom pentesting Yes
Mon, 26 Jan 2026 18:06:30 GMT Top HITRUST Providers and Who Should You Choose? cyber-security-awareness Yes
Mon, 26 Jan 2026 11:55:09 GMT eWPTXv3 Exam Review bug-bounty Yes
Mon, 26 Jan 2026 11:10:35 GMT How to start your Bug Hunting career penetration-testing, infosec Yes
Mon, 26 Jan 2026 17:32:47 GMT Chaining Low-Hanging Misconfigurations Into High-Impact Access penetration-testing, web-security Yes
Mon, 26 Jan 2026 14:15:46 GMT Secure Your Product: The 2026 Cyber Compliance Wave information-technology, infosec Yes
Mon, 26 Jan 2026 14:50:33 GMT New Windows PC Setup For Speed, Privacy, Stability information-technology, information-security Yes
Mon, 26 Jan 2026 09:43:43 GMT DOM-Based Cookie Manipulation xss-attack Yes
Mon, 26 Jan 2026 17:31:07 GMT Vitre cassée : que faire immédiatement pour sécuriser son log... security Yes
Mon, 26 Jan 2026 19:19:11 GMT The Cybersecurity Nexus — “AI� (January 2026) infosec Yes
Mon, 26 Jan 2026 20:13:18 GMT LLM Jailbreaks in the Wild — Attack Transcripts, Forensics,... cybersecurity Yes
Mon, 26 Jan 2026 20:38:48 GMT SOC HomeLab — Part 4 (TheHive, Cortex & MISP) cybersecurity Yes
Mon, 26 Jan 2026 15:02:22 GMT Cyber Briefing: 2026.01.26 information-security Yes
Mon, 26 Jan 2026 20:30:15 GMT MCP Security Part 3: Prevention Measures and Hardening cybersecurity Yes
Mon, 26 Jan 2026 13:16:41 GMT VulnLab: XML External Entity Attack, API Hacking, Path Traversal ... vulnerability Yes
Mon, 26 Jan 2026 13:43:52 GMT OSINT Python Tool Reveals EVERYTHING About Anyone!!! hacking Yes
Mon, 26 Jan 2026 10:28:25 GMT This is Sparta — Web Security Easy Challenge Write-Up web-security, pentesting Yes
Mon, 26 Jan 2026 18:19:31 GMT [EN] CyberSploit1 — Walkthrough — PGPlay pentesting, ethical-hacking Yes
Mon, 26 Jan 2026 14:02:02 GMT Letter â„–3: Our Silent Catastrophe (Part 1) vulnerability Yes
Mon, 26 Jan 2026 14:28:15 GMT Model Poisoning in the Cloud: How AI Systems Learn to Betray You information-security Yes
Mon, 26 Jan 2026 19:24:34 GMT The Hidden Costs of Free AI: Data, Bias, and the Price You Don’... information-security Yes
Mon, 26 Jan 2026 19:35:31 GMT What Learning API Security Taught Me About Building Systems for t... security, cyber-security-awareness Yes
Mon, 26 Jan 2026 18:21:52 GMT And maybe, crying is bravery on its purest form. vulnerability Yes
Mon, 26 Jan 2026 13:17:23 GMT Major Security Risks Revealed in AI Coding Tools — Insights... information-technology Yes
Mon, 26 Jan 2026 20:14:35 GMT The Digital Panopticon: cybersecurity Yes
Mon, 26 Jan 2026 14:29:03 GMT “lynda.com�, merger acquisition, and the flaw with browser t... web-security Yes
Mon, 26 Jan 2026 19:56:37 GMT I Lost My Phone in the Snow ,and Realized I’ve Been Lost Too vulnerability Yes
Mon, 26 Jan 2026 16:18:45 GMT Rebuilding — Day 4 bug-bounty, cyber-sec Yes
Mon, 26 Jan 2026 16:19:37 GMT Click Here for First Contact hacking Yes
Mon, 26 Jan 2026 18:35:53 GMT Hack The Box — Imagery Machine Walk-through penetration-testing, information-security Yes
Mon, 26 Jan 2026 19:46:37 GMT I’m Not Afraid to Write Anymore vulnerability Yes
Mon, 26 Jan 2026 20:16:26 GMT Zero to Windows Server Hero: My Complete MCSA Journey (Hands-On L... penetration-testing, infosec, information-security Yes
Mon, 26 Jan 2026 13:27:25 GMT How I Identified a Session Management Flaw and Pushed for Change ... bug-bounty Yes
Mon, 26 Jan 2026 17:00:08 GMT Proving Grounds: ClamAV hacking Yes
Sat, 01 Feb 2025 06:10:16 GMT How to Create Advanced Custom Wordlist? Dive into Recon Part 4 subdomain-enumeration
Sun, 17 Aug 2025 19:26:05 GMT ï·½ bug-bounty-program
Mon, 12 Jan 2026 08:39:44 GMT ColdFusion RCE (Remote Code Execution) Vulnerabilities: A Proacti... remote-code-execution
Tue, 18 Nov 2025 18:12:40 GMT Dork Labs Awarded AWS Activate Startup Grant dorks
Fri, 18 Jul 2025 01:35:17 GMT Lo-Fi TryHackMe Walkthrough/Write-up file-inclusion
Tue, 21 Oct 2025 09:47:05 GMT Proactive Third-Party Risk Management with Shodan Intelligence shodan
Sat, 06 Dec 2025 17:05:14 GMT GitHub Pages Subdomain Takeover on aiaa-dpw.larc.nasa.gov (NASA V... subdomain-takeover
Sat, 16 Aug 2025 17:33:22 GMT PDF.JS Viewer Endpoint Dorking dorking, zoomeye
Tue, 20 Jan 2026 23:10:21 GMT What Is Ethical Hacking? Complete Beginner’s Guide cybersecurity-tools
Wed, 23 Jul 2025 15:15:01 GMT TryHackMe Include walkthrough: SSRF, log poisoning & LFI2RCE, wit... log-poisoning
Sat, 17 Jan 2026 07:44:23 GMT Google Dorks to Find SQL Injection Vulnerable Websites google-dork
Thu, 25 Dec 2025 20:15:32 GMT Investigation into MSP Data Breach google-dork
Thu, 08 Jan 2026 15:16:07 GMT CVE-2025–63611: Stored Cross-Site Scripting(XSS) in Hostel Mana... xss-vulnerability
Tue, 16 Dec 2025 07:55:39 GMT CEHv12: Foot Printing and Reconnaissance (Practised)(Module 2) recon
Sun, 09 Nov 2025 22:10:20 GMT TryHackMe — File Inclusion — Walkthrough local-file-inclusion
Thu, 21 Aug 2025 19:05:59 GMT Cracking GeneQuest: Two Critical Bugs and My 19th Place Finish at... bug-bounty-hunting
Tue, 16 Dec 2025 13:38:33 GMT SOC170 — Passwd Found in Requested URL — Possible LFI... local-file-inclusion
Tue, 13 Jan 2026 01:46:03 GMT Hacker101 Micro-CMS v1 — CTF Walkthrough hackerone
Wed, 31 Dec 2025 16:50:18 GMT TryHackMe: MD2PDF Walkthrough local-file-inclusion
Wed, 13 Aug 2025 14:19:39 GMT Awesome Hacking & Cybersecurity Learning Path — Your Ultim... bug-bounty-hunting
Wed, 19 Nov 2025 21:40:04 GMT Cross Site Scripting (XSS) xss-bypass
Fri, 16 Jan 2026 17:59:33 GMT BAC = $$$ information-disclosure
Sat, 25 Oct 2025 12:23:25 GMT How to find leaks on GitHub as a beginner. Logic is main key github-dorking
Tue, 11 Nov 2025 16:43:14 GMT Beyond Google: Navigating the Hidden Internet with Shodan and Cen... shodan, censys
Tue, 22 Apr 2025 10:38:20 GMT Trump’s Tariffs Cut Out Censys — ZoomEye Steps In Strong! zoomeye
Sat, 24 Jan 2026 07:59:30 GMT I used to panic the moment my console turned red. bugs
Sun, 18 Jan 2026 12:20:41 GMT CSP (Content Security Policy): The XSS Kill Switch xss-attack
Sun, 11 Jan 2026 23:31:41 GMT Comprehensive & Rigorous VAPT Framework for Next.js Applications vapt
Mon, 29 Dec 2025 10:11:52 GMT How Network Vulnerability Scanners Detect Hidden Attack Surfaces? vulnerability-scanning
Wed, 07 Jan 2026 07:03:22 GMT Easy IDOR CTF Challange (Bugforge) idor
Fri, 09 Jan 2026 12:03:29 GMT Cyber Security Services for Modern Enterprises vapt
Sun, 14 Dec 2025 06:37:06 GMT My Bug Bounty Diary subdomain-enumeration
Sun, 25 Jan 2026 18:37:15 GMT Deep-Dive PII , Analyzing Impact and Reporting (Part 3/3 ) bug-bounty-tips, bug-bounty-writeup
Sun, 25 Jan 2026 22:05:11 GMT RPC Proxy Injection pentesting
Tue, 06 Jan 2026 16:02:54 GMT Spider-Man, Google Dorks e OSINT: quando cercare diventa un super... google-dorking
Tue, 06 Jan 2026 09:02:35 GMT Bug Bounty Shortcut: Skip Recon and Start With Real Credentials recon
Sun, 25 Jan 2026 17:46:07 GMT n8n: CVE-2025–68613 cve
Fri, 26 Dec 2025 23:48:17 GMT Understanding Cross-Site Scripting (XSS) Through Hands-On Practic... cross-site-scripting
Thu, 08 Jan 2026 14:06:29 GMT Akamai WAF Bypass: Escalating SSRF into Internal Port Scanning hackerone
Sun, 11 Jan 2026 20:50:00 GMT [Writeup] Proving Grounds: Flu (Linux) vulnerability-scanning
Mon, 12 Jan 2026 00:57:20 GMT Upload images to Minio using JavaScript file-upload
Mon, 12 Jan 2026 06:05:58 GMT How I Got My First Bug Bounty (And What I’d Do Differently) bug-bounty-hunter
Sat, 03 Jan 2026 07:59:36 GMT Mastering Web Cache Deception Bugs: Advanced Bug Hunter’s Guide web-cache-poisoning
Wed, 14 Jan 2026 08:56:53 GMT How IoT Devices Get Hacked and How to Prevent It? vapt
Mon, 19 Jan 2026 05:42:56 GMT Securing the Foundation: API Key Management for AI Development api-key
Sat, 24 Jan 2026 11:47:02 GMT I Followed the Password Reset Flow — and Ended Up Resettin... bug-bounty-tips
Tue, 23 Dec 2025 06:58:24 GMT How I Found Vulnerabilities in NASA and Got into the Hall of Fame vulnerability-disclosure
Thu, 16 Oct 2025 19:01:16 GMT Internet Reconnaissance Tools(osint) shodan
Sat, 10 Jan 2026 22:39:32 GMT TOP WEB challenge || FahemSec xss-vulnerability
Sun, 04 Jan 2026 03:49:09 GMT Intercom Deep Recon Techniques google-dorking
Mon, 17 Nov 2025 09:27:29 GMT 200 reports, 11 valid bugs, 0 critical issues. Here’s everythin... vdp
Wed, 07 Jan 2026 17:02:47 GMT Twin CVSS 10.0 bugs turn n8n workflows into an attacker’s playg... remote-code-execution
Sun, 25 Jan 2026 15:55:21 GMT OWASP Top 10 (2025): A Practical Application Security Perspective vapt
Fri, 08 Aug 2025 17:59:47 GMT TryHackMe File Inclusion Challenge walkthrough. file-inclusion
Mon, 12 Jan 2026 20:40:10 GMT I will give you the Exploit steps in CIRCLE company. and where is... exploit
Sat, 03 Jan 2026 18:16:27 GMT The two byte CPDoS web-cache-poisoning
Fri, 16 Jan 2026 18:36:11 GMT Understanding SSRF: How Hackers Turn Your Server Into a Secret Pr... ssrf
Mon, 08 Dec 2025 11:02:43 GMT Comisiones de trading DESACTIVADAS! bounty-program
Mon, 29 Dec 2025 20:17:33 GMT PortSwigger Academy Lab: Information disclosure in error messages information-disclosure
Sun, 05 Oct 2025 07:27:50 GMT DNS Hijacking for Dummies: Why Your API’s Domain Name is a Targ... subdomain-takeover
Thu, 18 Dec 2025 20:10:01 GMT Google Dorking Nedir? google-dork
Wed, 21 Jan 2026 08:58:17 GMT From Flashloans to Share Price Inflation: Anatomy of a Curve–Fr... exploit
Tue, 20 Jan 2026 09:16:19 GMT [Writeup] Proving Grounds: Plum (Linux) vulnerability-scanning
Thu, 22 Jan 2026 16:50:23 GMT API Keys vs. Tokens: Navigating Modern API Authentication api-key
Sun, 25 Jan 2026 17:23:10 GMT Secure SDLC: From Continuous Development to Secure Software Deliv... application-security
Wed, 21 Jan 2026 18:43:47 GMT Python Things I Wish I Had Learned Earlier (So I Didn’t Waste Y... bugs
Thu, 26 Dec 2024 15:23:03 GMT GitHub Dorking List: The Ultimate Guide to Exploring and Securing... github-dorking
Mon, 24 Nov 2025 16:40:00 GMT Workflow: speed up visual web based external exposure recon. shodan
Fri, 23 Jan 2026 10:08:11 GMT [Templates]  —  Exploiting PugJS Server-Side Template Inj... rce
Wed, 21 Jan 2026 16:38:04 GMT Reconnaissance: The Most Ignored Phase of an Attack security-research
Tue, 26 Aug 2025 04:38:54 GMT Why Most Directory Websites Fail (and How to Make Yours Succeed) directory-listing
Wed, 09 Jul 2025 05:05:20 GMT ZoomEye Dorking with Nuclei zoomeye
Mon, 11 Aug 2025 07:41:16 GMT How I Found an XSS Vulnerability in the KPK Website and Earned a ... vdp
Fri, 12 Dec 2025 08:27:15 GMT PwnTillDawn Morty Writeup lfi
Wed, 07 Jan 2026 13:44:20 GMT Testing file uploads file-upload
Tue, 18 Nov 2025 16:59:02 GMT TryHackMe:Farewell xss-bypass
Sun, 25 Jan 2026 22:42:13 GMT Proving Grounds Linux lab Levram ( Road to OSCP ) pentesting
Mon, 29 Dec 2025 04:06:10 GMT Information Disclosure Menggunakan Dirsearch information-disclosure
Sat, 10 Jan 2026 08:44:19 GMT Writing Penetration Test Reports pentest
Tue, 13 Jan 2026 16:18:39 GMT Bypassing XSS Protection: Thinking Beyond <script>� bugbounty-writeup
Sun, 07 Dec 2025 06:18:32 GMT Breaking the Perimeter: How My Custom Python Tool Bypassed a Fede... vdp
Sun, 26 Oct 2025 15:07:57 GMT LFI: A Guide to Exploit It lfi
Sun, 14 Jul 2024 11:56:11 GMT How I Can Get P1 Nasa easily — Dorking web-pentest
Tue, 13 Jan 2026 03:42:48 GMT Your Java File Upload Is a Security Risk. file-upload
Tue, 15 Jul 2025 08:14:04 GMT Level Up Your Bounties: How to Choose the Best Bug Bounty Program... bug-bounty-program
Mon, 15 Dec 2025 12:59:16 GMT Modat Magnify Cyber Dorking dorking
Tue, 15 Jul 2025 12:15:58 GMT “Secure� OPC UA Setups Are Being Hacked — Here’s Why censys
Mon, 19 Jan 2026 10:09:10 GMT GitHub Search Syntax for Finding Leaked API Keys, Secrets, and To... api-key
Thu, 15 Jan 2026 10:43:10 GMT Breaching the UAE: Real-World Penetration Testing Against Modern ... vapt
Fri, 07 Feb 2025 05:12:28 GMT Do You Struggle Finding Internal/Hidden Subdomains? Recon part 5 subdomain-enumeration
Fri, 25 Jul 2025 15:34:20 GMT Discover Top Local Businesses Effortlessly with List & Post directory-listing
Thu, 08 Jan 2026 19:01:16 GMT DOM XSS in jQuery anchor href attribute sink using location.searc... xss-vulnerability
Sat, 02 Aug 2025 14:15:23 GMT The Silent Risk in Your ICS: Why S7 Protocol Needs Security Atten... censys
Fri, 29 Aug 2025 04:43:21 GMT 9. The Secret Power of Google Dorking dorking
Mon, 03 Nov 2025 19:42:12 GMT Announcing DorkFi Go-Live Date: Liquidity is Coming dorks
Thu, 13 Feb 2025 03:29:37 GMT ZoomEye Meets DeepSeek: AI-Powered Cyberspace Intelligence zoomeye
Fri, 09 Jan 2026 11:49:46 GMT Make Contract Collaboration Effortless Across Teams with BoldSign... api-key
Tue, 20 Jan 2026 07:50:34 GMT FG-IR-25–084 (CVE-2025–25249) Teknik Analiz: cw_acd Heap Over... cve
Fri, 23 May 2025 06:02:53 GMT Search Skills censys
Wed, 31 Dec 2025 16:50:13 GMT PortSwigger Academy Lab: Source code disclosure via backup files information-disclosure
Fri, 09 Jan 2026 05:07:38 GMT IDOR in 2026: Same Bug, Bigger Damage — 10 GB of Chat Histo... idor
Sun, 13 Jul 2025 16:32:21 GMT ProConOS Exposed: What ICS Security Teams Need to Know censys
Sun, 25 Jan 2026 14:45:38 GMT UTC vs Timezone bugs that keep happening bugs
Thu, 04 Dec 2025 16:37:32 GMT How I Discovered a $50,000 Web3 Vulnerability That Exposed Thousa... bugcrowd
Mon, 24 Nov 2025 02:45:22 GMT The art of google dorking google-dork
Thu, 15 Jan 2026 17:49:31 GMT Static Malware Analysis — A Beginner-Friendly Step-by-Step ... vapt
Tue, 23 Dec 2025 07:43:20 GMT Integrating Shodan with HexStrike-AI Using Gemini-CLI shodan
Tue, 30 Dec 2025 15:51:07 GMT picoCTF caas (Cowsay as a Service)- Best Writeup remote-code-execution
Sat, 20 Dec 2025 14:06:10 GMT I Hacked Microsoft: Remote Code Execution (RCE) via Dependency Co... remote-code-execution
Sun, 21 Dec 2025 12:38:03 GMT Fixing Kali Linux apt update Errors (404 / NO_PUBKEY) — Ste... cybersecurity-tools
Tue, 13 Jan 2026 19:43:08 GMT When “Excellent Security� Still Fails: A Real-World SSRF Less... ssrf
Sun, 25 Jan 2026 16:43:38 GMT How To Bypass Captcha web-security, application-security
Wed, 21 Jan 2026 20:26:42 GMT Day-18 of Bug Bounty Journey : XSS Concept xss-attack, bugbounty-writeup
Wed, 21 Jan 2026 12:56:03 GMT How I Discovered the RXSS and Bypassed the WAF xss-attack, xss-vulnerability, xss-bypass
Sun, 09 Nov 2025 14:49:19 GMT Beginner’s BOUNTY Rewards Guide — November 2025 bounties
Sun, 23 Nov 2025 13:28:34 GMT When IP Whitelisting Isn’t What It Seems: A Real-World Case Stu... vulnerability-disclosure
Sun, 14 Dec 2025 03:48:47 GMT Lab: Web cache poisoning via ambiguous requests web-cache-poisoning
Fri, 19 Sep 2025 07:40:16 GMT How I Tracked Our Clients’ Device Versions Without Direct Repor... zoomeye
Sun, 25 Jan 2026 14:12:42 GMT How a Simple PDF Export Feature Led to a Critical Local File Incl... web-security, application-security
Sun, 25 Jan 2026 16:44:05 GMT How To Bypass OTP (One Time Password) application-security
Sun, 25 Jan 2026 09:41:04 GMT The Breach Nobody Saw Coming, Because Nobody Was Looking application-security
Thu, 09 Oct 2025 18:33:05 GMT 0-click Account Takeover via Punycode bug-bounty-program
Sun, 20 Jul 2025 18:02:47 GMT New in Town and Need a Makeup Artist? Here’s the Easiest Way to... directory-listing
Mon, 21 Nov 2022 22:42:17 GMT Explorando XSS no lugar do meu nome. web-pentest
Wed, 19 Nov 2025 19:44:02 GMT The Pulse of Liquidity: How DorkFi’s Interest Rates Adapt in Re... dorks
Thu, 01 Jan 2026 14:05:31 GMT Sıfırdan Otomasyona: Kapsamlı Recon Rehberi recon
Mon, 05 Jan 2026 13:52:09 GMT Top 15 Kali Linux GUI Tools Every Security Engineer Must Master (... cybersecurity-tools
Fri, 23 Jan 2026 20:58:19 GMT Portswigger : SSRF Exploitation ssrf
Tue, 13 Jan 2026 14:20:03 GMT Burp Suite: The Basics — THM Walkthrough xss-bypass
Mon, 10 Nov 2025 22:19:13 GMT The Hunt for a WAF Bypass: A Bug Bounty Story xss-bypass
Sun, 25 Jan 2026 17:24:01 GMT How I hacked NASA with an RCE!!! bug-bounty-tips, bug-bounty-writeup
Wed, 14 Jan 2026 12:28:16 GMT Tracking File Upload Progress on AWS S3 file-upload
Sun, 30 Nov 2025 12:48:56 GMT Beyond Nmap: Building Custom Recon Pipelines recon
Sat, 06 Dec 2025 06:43:54 GMT The Midnight Pwn: How a News Alert Led to a Critical Bounty vulnerability-disclosure
Wed, 07 Jan 2026 00:58:19 GMT Why Your Cache Rules are Leaking User Data (Web Cache Deception) web-cache-poisoning
Sun, 06 Jul 2025 07:51:30 GMT ZoomEye Dorking for API Keys zoomeye
Sat, 24 Jan 2026 17:03:28 GMT How I Found 3 Critical Reflected XSS Bugs Using Simple URL Encodi... security-research
Fri, 26 Dec 2025 07:43:53 GMT Beginner's Guide to Claiming BOUNTY Airdrop — Claim Up To $50,0... bounties
Wed, 05 Nov 2025 07:19:20 GMT Discovering the Secret Security That Makes Your Favorite Apps Wor... api-key
Thu, 08 Jan 2026 09:02:50 GMT osint-Forgotten Ruins bounty $$ bounties
Mon, 19 Jan 2026 20:05:48 GMT VAPT Report Example vapt
Thu, 04 Dec 2025 04:45:36 GMT What is Google Dorking? google-dorking, dorking, google-dork
Mon, 19 Jan 2026 03:29:36 GMT Host & Network Penetration Testing: Post-Exploitation CTF 2 pentest
Mon, 05 Jan 2026 14:33:42 GMT Mastering EIP-712: A Practical Hands-on Guide security-research
Sat, 24 Jan 2026 17:30:46 GMT CVE Quality-by-Design Manifesto cve
Tue, 13 Jan 2026 05:04:56 GMT Remote Code Execution (RCE) Zafiyeti rce
Thu, 04 Dec 2025 10:22:05 GMT The Billion-Naira Blueprint: How SuperteamNG Turned Nigerian Tale... bounties
Sun, 11 Jan 2026 13:46:11 GMT Hackers Exploiting VMware ESXi for gaining RCE security-research
Fri, 23 Jan 2026 15:29:49 GMT At-Least-Once Delivery Is a Feature, Not a Bug bugs
Sat, 27 Dec 2025 15:01:34 GMT Breaking the Team: A Deep Dive into Multi-Stage Linux Exploitatio... lfi
Thu, 22 Jan 2026 11:18:43 GMT OverTheWire Natas Level 4 — Referer Header Bypass ÇözümÃ... idor
Thu, 02 Oct 2025 06:59:46 GMT Endless Cashback Glitch:How I Unlocked Unlimited Free Orders with... bug-bounty-program
Tue, 20 Jan 2026 00:49:26 GMT Unauthenticated Client-Side Prize Manipulation Vulnerability in S... cve
Tue, 18 Nov 2025 21:32:05 GMT How I Received an Appreciation Letter from NASA for Identifying a... bounties
Wed, 03 Dec 2025 18:29:09 GMT How I Discovered a Flaw That Let Me Access Enterprise-Only Featur... bounty-program
Tue, 06 Jan 2026 06:05:21 GMT AlphaArena AI Model Battle: A Hands-On Guide to Replicating DeepS... api-key
Sat, 01 Nov 2025 20:09:17 GMT just memecoin — Best Platforms dorks
Wed, 21 Jan 2026 13:33:44 GMT Write-up: RazorBlack lab (Medium) on THM pentest
Wed, 14 Jan 2026 17:17:39 GMT 7 Ways Uploading Websites Streamline Custom Print Orders for Smal... file-upload
Mon, 17 Nov 2025 23:45:18 GMT DorkFi: The Triumph of a Team You Can Trust dorks
Tue, 06 Jan 2026 20:31:25 GMT How to Create a Cybersecurity Home Lab: A Beginner Tutorial for S... cybersecurity-tools
Sun, 21 Sep 2025 07:02:30 GMT Affordable but Vulnerable? The Dark Side of CMORE HMI censys
Thu, 22 Jan 2026 17:35:20 GMT Github Copilot Says-Its SQL Injection and Lead to Security Risk bugs
Tue, 06 Jan 2026 18:31:45 GMT Ghost in the Machine: Bypassing Authentication to Access Live Shi... vulnerability-disclosure
Fri, 16 Jan 2026 06:31:00 GMT How AI-Powered Fast Network Scanners Are Changing Cyber Defense? vapt
Sun, 26 Jan 2025 19:08:11 GMT Matrix strike’s back against honesty from a power stance web-pentest
Sun, 04 Jan 2026 07:12:14 GMT Stop Writing Your Own HTML Encoders: A Guide to XSS Prevention in... cross-site-scripting
Wed, 05 Nov 2025 12:42:46 GMT How I Hacked Bank’s Admin Portal vdp
Fri, 04 Jul 2025 09:25:20 GMT Lo-Fi — TryHackMe Writeup file-inclusion
Fri, 23 Jan 2026 06:03:40 GMT Magento SessionReaper Exploit (CVE‑2025‑54236): How to Protec... exploit
Mon, 29 Dec 2025 23:14:04 GMT Deep Dive Into CVE-2025–66478: Understanding React Server Compo... remote-code-execution
Thu, 25 Sep 2025 00:00:42 GMT Path Traversal — PortSwigger lfi
Tue, 06 Jan 2026 17:26:38 GMT The Future of Cybersecurity: Emerging Technologies, Evolving Thre... cybersecurity-tools
Tue, 08 Jul 2025 20:49:53 GMT UpDown-Linux-Medium file-inclusion
Thu, 04 Dec 2025 01:13:50 GMT WordPress Malware Removal | Penetration Testing & Cybersecurity ... recon
Thu, 11 Sep 2025 22:20:14 GMT It’s Coming: DorkFi Delivers PreFi Rewards Surge dorking
Mon, 27 Oct 2025 17:30:23 GMT LFI to ATO (Universal ) local-file-inclusion
Tue, 25 Nov 2025 09:25:11 GMT Step-by-Step BOUNTY Rewards Guide — November 2025 bounties
Fri, 11 Jul 2025 16:20:24 GMT PC WORX: The Hidden Risk in Your Industrial Network censys
Sat, 24 Jan 2026 11:55:25 GMT Simple Mistake, Big Security Nightmare: A True Story bug-bounty-tips, bug-bounty-writeup
Thu, 22 Jan 2026 11:08:11 GMT VAPT for Hospital Management Systems and Health Apps vapt
Tue, 18 Nov 2025 13:26:47 GMT GitHub Dorking: The Hunter’s Guide to Finding Secrets in Public... github-dorking
Sat, 24 Jan 2026 12:37:50 GMT XSS — Merry XSSMas xss-vulnerability
Thu, 22 Jan 2026 14:37:10 GMT What Is Nessus? A Beginner-Friendly Guide With Linux Installation vulnerability-scanning
Sat, 17 Jan 2026 11:02:58 GMT A Simple IDOR That Ignored Platform Logic idor
Tue, 16 Dec 2025 09:29:12 GMT Automating ZAP for CI/CD — an MVP vulnerability-scanning
Fri, 31 May 2024 13:29:16 GMT Map of the worlds best URLs 2025 log-poisoning
Tue, 20 Jan 2026 13:44:32 GMT From Job Hunting to Bug Hunting: Discovering an SQL Injection Vul... bugbounty-writeup
Wed, 14 Jan 2026 02:19:56 GMT CVEs as “Feature Catalogs�: The Terrifying Reality of Automat... exploit
Sat, 24 Jan 2026 19:34:56 GMT Smart Home (BUET CTF 2026 Preliminary) — Pre-Auth RCE via e... rce
Fri, 26 Dec 2025 00:33:19 GMT Google Dork and OSINT: Discovering Exposed Systems Through Search... google-dorking
Fri, 28 Jun 2024 14:51:14 GMT X-Forwarded HTTP header-ləri : Qısa izah log-poisoning
Mon, 05 Jan 2026 16:28:35 GMT Lab: Web cache poisoning with multiple headers | Portswigger web-cache-poisoning
Wed, 03 Dec 2025 20:15:27 GMT “Potato Hacks a Machine� — A Fun & Interactive Pentest... lfi
Wed, 21 Jan 2026 18:32:24 GMT WP File Upload Plugin — Front End Upload & Download Manage... file-upload
Tue, 09 Sep 2025 10:14:01 GMT The Psychology of Listings: Why Users Trust Some Directories More... directory-listing
Sun, 18 Jan 2026 20:28:02 GMT Lab: Reflected XSS into HTML context with nothing encoded xss-attack
Tue, 23 Dec 2025 18:32:40 GMT The Night I Found a Backup ZIP File Sitting in Plain Sight —... bug-bounty-hunter, bounties
Sat, 23 Aug 2025 09:23:31 GMT URLScan Dorking to find WordPress Registration Endpoint dorking
Sun, 16 Nov 2025 11:17:50 GMT Five Bounties, One Bug: Exploiting the Same SSRF via Five Unique ... bounty-program
Wed, 03 Dec 2025 23:26:26 GMT TryHackMe-TakeOver-WriteUp subdomain-takeover
Fri, 16 Jan 2026 13:06:30 GMT IDOR idor
Thu, 13 Mar 2025 18:09:56 GMT How I Found Sensitive Information using Github Dorks in Bug Bount... github-dorking
Fri, 31 Oct 2025 21:30:34 GMT Simple BOUNTY Bonus Guide — October 2025 bounties
Sat, 24 Jan 2026 18:06:03 GMT How I Got CVE-2025–53092: Technical Overview bug-bounty-writeup, cve
Fri, 19 Dec 2025 20:23:57 GMT How I Found an Unauthenticated XXE That Allowed Arbitrary File Re... vulnerability-disclosure
Sun, 11 Jan 2026 09:10:26 GMT Production Websites vs. Other Websites: A Cybersecurity Perspecti... vapt
Wed, 30 Apr 2025 17:08:29 GMT Exploring Subdomains: What They Are and How to Find Them subdomain-enumeration
Fri, 28 Nov 2025 12:11:42 GMT How I Pwned Telemetry on Amsterdam.nl bounty-program
Fri, 07 Nov 2025 04:15:45 GMT Secure Flutter Apps — How to Hide API Keys & Use .env File... api-key
Fri, 23 Jan 2026 13:57:04 GMT XSS Payloads Made Easy: How to Build One (Step by Step) xss-attack, bug-bounty-writeup
Sat, 10 Jan 2026 16:44:51 GMT Automating HackerOne Program Updates with Telegram Notifications hackerone
Tue, 13 Jan 2026 16:36:27 GMT Crypto Heists exploit
Wed, 10 Dec 2025 12:06:41 GMT Strengthening Web3 Security: Recent Vulnerability Findings from Y... vulnerability-disclosure
Wed, 06 Aug 2025 18:09:04 GMT Making dorks from HTML Comment dorking
Wed, 03 Dec 2025 18:57:29 GMT The Three Recon Moves That Almost Always Reveal Something Valuabl... recon
Sun, 14 Dec 2025 21:35:07 GMT ⚡�Advanced XSS Bypass for Akamai WAF xss-bypass
Sun, 18 Jan 2026 21:51:31 GMT [Rabbit Store]  —  JWT Manipulation, SSRF, SSTI Leading t... rce, ssrf
Thu, 15 Jan 2026 02:38:52 GMT Sc0rp10n, el grupo hacker menos precavido. exploit
Sun, 18 Jan 2026 18:19:03 GMT [Writeup] Proving Grounds: Pyloader (Linux) vulnerability-scanning
Tue, 06 Jan 2026 06:42:57 GMT WHAT IS A SHODAN? shodan
Sat, 24 Jan 2026 11:39:52 GMT How Your Coffee Shop Wi-Fi Explains OpenShift TLS Security application-security
Thu, 18 Dec 2025 21:21:21 GMT Google Dorking: Arama Motorunu Bir Güvenlik Aracına Dönüştü... google-dorking
Wed, 12 Feb 2025 22:46:35 GMT https://www.express.co.uk/life-style/property/2012927/cleaning-ch... web-pentest
Tue, 06 Jan 2026 12:27:01 GMT CVE-2025–55184: A pre-authenticated DOS Attack in React Server ... vdp
Tue, 23 Dec 2025 16:08:20 GMT React2Shell: The Critical Vulnerability Every Developer Needs to ... remote-code-execution
Wed, 14 Jan 2026 05:53:36 GMT IDOR, YOU-DOR, WE ALL DOR for BugForge idor
Sat, 17 Jan 2026 04:54:58 GMT Breaking Rate Limiting: Where It Breaks and How Attackers Bypass ... bugbounty-writeup
Tue, 13 Jan 2026 08:05:53 GMT API Recon Deep Dive: How to Discover Docs, Endpoints, and Hidden ... bugbounty-writeup
Wed, 24 Dec 2025 19:07:01 GMT The Art of Discovery: Mastering Web Crawlers in Bug Bounty & Pent... bug-bounty-hunter
Sun, 28 Dec 2025 08:13:44 GMT Subzy Tool subdomain-takeover
Thu, 21 Aug 2025 10:04:08 GMT Dork Like a Demon: FOFA Edition for Hackers & Bug Bounty Hunters dorking
Fri, 06 Jun 2025 15:47:21 GMT ��♂� GitHub Dorking for Bug Bounty: Hackers' Hidden Playg... github-dorking
Sun, 25 Jan 2026 23:01:22 GMT Detecting Malicious Activity in Highly Imbalanced System Logs security-research
Wed, 24 Dec 2025 06:00:48 GMT PortSwigger Web Security Academy: All Information Disclosure Labs... information-disclosure
Wed, 26 Nov 2025 08:20:32 GMT $1,500 Recon Secrets: Dorks to Dollars google-dork
Wed, 10 Dec 2025 18:07:22 GMT #xss0r Community — December Gift! xss-bypass
Thu, 13 Nov 2025 06:32:14 GMT Create the perfect Amazon Wedding & Baby Registry: easy, trusted,... bounty-program
Sat, 17 Jan 2026 11:59:27 GMT How JS Analysis Led to PII Disclosure information-disclosure
Sun, 11 Jan 2026 02:45:54 GMT Threat Management as Frontend Engineer — XSS xss-vulnerability
Wed, 26 Nov 2025 12:34:58 GMT From Control to Confidence: How Information Security Became the L... cyber-sec
Fri, 19 Dec 2025 18:16:46 GMT Information disclosure, but not in the way you might expect information-disclosure
Wed, 21 Jan 2026 15:09:15 GMT Lab: Weak isolation on dual-use endpoint | Portswigger web-cache-poisoning
Tue, 23 Sep 2025 13:01:51 GMT Why Email Marketing Is the Secret Growth Tool for Directory Websi... directory-listing
Fri, 02 Jan 2026 04:23:21 GMT WordPress Plugin LFI Vuln Lab 1 local-file-inclusion
Sat, 20 Dec 2025 18:21:40 GMT N0aziXss SubSpectre: Advanced Subdomain Discovery with Intelligen... subdomain-enumeration
Sat, 24 Jan 2026 00:02:11 GMT What is a Penetration Test? And Other Penetration Testing FAQs pentest
Sun, 28 Dec 2025 10:15:40 GMT Cross-Site Scripting (XSS) | Vulnerability cross-site-scripting
Wed, 14 Jan 2026 12:29:05 GMT Exposing the Vulnerable: A Narrative of a Full System Takeover (T... local-file-inclusion
Thu, 27 Nov 2025 13:53:54 GMT xss0r Black Friday Special Offer — 50% OFF ALL PLANS! xss-bypass
Sat, 03 Jan 2026 17:51:10 GMT Espelho, espelho meu : Existe alguém mais exposto do que Eu? shodan
Sun, 25 Jan 2026 02:18:44 GMT Bypassing Rate Limits via Race Conditions web-security
Fri, 23 Jan 2026 15:27:58 GMT Broken Access Control: How I Viewed Admin-Only Configs as a Stand... bug-bounty-tips, bug-bounty-writeup
Sun, 04 Jan 2026 12:43:39 GMT Patch Management in Cybersecurity: Tools, Strategies, and Benefit... cybersecurity-tools
Sun, 24 Aug 2025 20:18:55 GMT How I found an Account Lockout Vulnerability Without Any Tools bug-bounty-program
Thu, 22 Jan 2026 13:32:43 GMT VulnLab: File Inclusion Çözümü local-file-inclusion
Mon, 19 Jan 2026 10:52:27 GMT Lab: SSRF with whitelist-based input filter (writeups) ssrf
Fri, 23 Jan 2026 09:04:32 GMT [Writeup] Proving Grounds: Jordak (Linux) cve
Tue, 09 Dec 2025 06:49:39 GMT How Free Unlimited Unified AI APIs Are Redefining Development api-key
Sat, 04 Jan 2025 17:20:23 GMT GitHub dork github-dorking
Tue, 13 Jan 2026 09:45:31 GMT Daily PortSwigger Academy Lab Walkthrough: SQLi & CSS cross-site-scripting
Wed, 16 Jul 2025 13:50:36 GMT Bug Bounties, Broken Promises bug-bounty-program
Fri, 19 Dec 2025 10:48:46 GMT Lab: Server-side template injection with information disclosure v... information-disclosure
Wed, 31 Dec 2025 09:03:44 GMT Prototype Pollution → Template Injection → RCE The Vulnerable... rce
Sun, 12 Oct 2025 14:40:10 GMT Exploring Shodan: The Search Engine for Hackers and Security Rese... shodan
Sun, 09 Nov 2025 08:20:56 GMT Breaking Stored XSS Through Filter Bypass xss-bypass
Fri, 23 Jan 2026 19:43:34 GMT Your App Worked Perfectly… Until the OS Killed It bugs
Tue, 13 Jan 2026 21:34:44 GMT When ‘Dead’ Pets Come Back to Life: A Bug I Found on a Pet P... bugbounty-writeup
Tue, 18 Nov 2025 08:33:41 GMT A Chain of Vulnerabilities Leading to Critical Information Disclo... bug-bounty-program
Sun, 23 Nov 2025 15:58:33 GMT just memecoin Rewards Eligibility & Claim Guide — November 2025 dorks
Sun, 25 Jan 2026 19:59:41 GMT Getting Started with SonarQube and SonarScanner: A Step-by-Step S... application-security
Thu, 04 Dec 2025 00:58:22 GMT Zero In on Targets: Automating the Modern Attack Surface with Ze... bug-bounty-hunting
Wed, 03 Dec 2025 22:42:41 GMT Critical Vulnerabilities in React and Next.js: Security Advisory shodan
Sat, 25 Oct 2025 17:53:34 GMT How I Found and Claimed a Subdomain Takeover (My First Article) subdomain-takeover
Sat, 10 Jan 2026 04:56:57 GMT [TryHackMe Write-up] Airplane local-file-inclusion
Sat, 27 Dec 2025 14:27:02 GMT What Happens When You Run a Vulnerability Scan? vulnerability-scanning
Mon, 18 Aug 2025 18:06:38 GMT The Importance of Legal Directory Listings for Your Practice directory-listing
Fri, 12 Dec 2025 06:49:56 GMT How Variable Data Technology is Transforming Postcard & Brochure ... vdp
Sat, 06 Dec 2025 08:29:35 GMT The Midnight Epiphany: How a News Notification Cracked My Stubbor... vulnerability-disclosure
Tue, 05 Aug 2025 00:19:11 GMT Breaking Recon with AMASS subdomain-enumeration
Sat, 20 Apr 2024 17:20:58 GMT TryHackMe — Brute Walkthrough | TheHiker log-poisoning
Mon, 12 Jan 2026 13:27:35 GMT From Failure to $32,000: My Bug Bounty Journey bug-bounty-hunter
Sat, 24 Jan 2026 10:35:32 GMT Broken Access control Port swigger (Apprentice Labs) bugs
Thu, 22 Jan 2026 17:15:54 GMT FULL ACCOUNT WILL DIE bugcrowd
Fri, 19 Dec 2025 14:42:48 GMT Arbitrary Code Execution (ACE) vs Remote Code Execution (RCE) remote-code-execution
Sat, 17 Jan 2026 11:28:25 GMT Write-up: Internal lab (Hard) on THM pentest
Wed, 31 Dec 2025 20:27:03 GMT After More Than 2 Years in Bug Bounty: Here’s My Methodology hackerone
Sun, 18 Jan 2026 21:15:25 GMT Schneider’s Unlocked Keypad: Giving the Lua Shell a Warm Welcom... remote-code-execution
Mon, 01 Dec 2025 19:38:31 GMT Bugcrowd for Ethical Hackers: A Complete Framework to Build Reput... bugcrowd
Wed, 26 Nov 2025 13:15:53 GMT How i earned $100 in one minute bounty-program
Sat, 24 Jan 2026 19:23:42 GMT The Multi-Bug Streak: Uncovering 4 Vulnerabilities on a Single Ta... bug-bounty-tips, bug-bounty-writeup
Wed, 16 Jul 2025 12:07:42 GMT Hackers Love This 1979 Protocol (Because It Can’t Defend Itself... censys
Thu, 08 Jan 2026 07:21:07 GMT Critical n8n Security Vulnerability (CVE-2026–21858) Demands Im... rce
Sun, 23 Feb 2025 11:17:25 GMT $1000-$10k worth Leaks via Github Secret Dorks github-dorking
Fri, 23 Jan 2026 03:30:42 GMT Getting Started with Nessus: Your Fast Lane to Vulnerability Scan... vulnerability-scanning
Wed, 21 Jan 2026 04:48:08 GMT Bypass RootBeer Frida: Panduan Bypass RASP dan SSL Pinning pada A... pentest
Wed, 07 Jan 2026 10:06:39 GMT OTP Bypass in Email Verification via Response Manipulation During... bug-bounty-hunter, bug-bounty-hunting
Mon, 27 Jan 2025 16:51:28 GMT The man who suffered 11 years in hell for freedom has now been fr... web-pentest
Wed, 09 Jul 2025 01:02:19 GMT Start with VDPs Before Aiming for Private Bug Bounty Programs vdp
Wed, 14 Jan 2026 09:06:30 GMT Lab: Web cache poisoning via an unkeyed query string | Portswige... web-cache-poisoning
Thu, 20 Nov 2025 17:16:47 GMT The Health Factor: How DorkFi Keeps Your Position Safe dorks
Fri, 01 Aug 2025 06:17:06 GMT 15,000 Critical Systems Are Exposed — Thanks to This Outdat... censys
Tue, 23 Sep 2025 06:36:22 GMT Mengamankan File Sensitif & Directory Listing website dengan .ht... directory-listing
Tue, 20 Jan 2026 09:28:37 GMT DOM-Based Open Redirection xss-vulnerability
Tue, 30 Dec 2025 01:21:19 GMT API Keys, Tokens & Secrets: How They Leak and How Developers can ... api-key
Fri, 23 Jan 2026 07:42:59 GMT Simple Endpoint, Critical Impact: How I Sabotaged Refunds bug-bounty-writeup
Mon, 15 Dec 2025 07:46:53 GMT The Pivot: Hunting Hidden Doors with Fuzzing and Multi-Platform M... google-dorking
Thu, 22 Jan 2026 10:35:38 GMT How I Earned a $500 Bug Bounty for a P5 Informational Vulnerabili... bugs, hackerone, bugcrowd, bug-bounty-hunter
Sun, 18 Jan 2026 15:49:22 GMT ID Parametresi Üzerinden Yetki Aşımı /IDOR bugbounty-writeup, idor
Tue, 04 Nov 2025 07:31:55 GMT Google Dorking dorks
Fri, 23 Jan 2026 03:31:20 GMT Unlocking the Power of Nessus: Advanced Techniques for Real-World... vulnerability-scanning
Fri, 09 Jan 2026 18:30:51 GMT TryHackMe — Poster: A PostgreSQL Exploitation Journey rce
Sat, 10 Jan 2026 08:51:39 GMT We Are Shipping More Features and Creating Worse Software file-upload
Sun, 06 Jul 2025 06:33:18 GMT Path Traversal part-1 : File path traversal, simple case file-inclusion
Thu, 14 Aug 2025 10:54:38 GMT Unlocking the Hidden Power of Search Engines censys
Fri, 23 Jan 2026 08:04:16 GMT CVE-2026–24061: The GNU InetUtils telnetd Bug That Lets Attacke... bugs
Sun, 04 Jan 2026 07:56:03 GMT Local File Inclusion lead to Admin Account Takeover local-file-inclusion
Mon, 11 Dec 2023 18:17:01 GMT Exploiting a Log Poisoning. log-poisoning
Sun, 11 Jan 2026 04:42:01 GMT Bypassing SSRF Protections: A $10,000 Lesson from Slack ssrf
Fri, 24 Oct 2025 12:05:27 GMT Hackers are hijacking domains via forgotten DNS records subdomain-takeover
Sun, 28 Dec 2025 18:59:18 GMT Google Appspot XSS CTF Walkthrough cross-site-scripting
Sun, 07 Dec 2025 06:30:47 GMT Advanced Search Techniques for Exposed Information — By Rej... google-dorking
Sun, 18 Jan 2026 16:14:35 GMT Design-Level Stored XSS in Matomo i18n Rendering xss-attack
Fri, 09 Jan 2026 05:50:02 GMT Caches, Edge, and Exploits web-cache-poisoning
Sat, 06 Dec 2025 23:06:15 GMT Big News from DorkFi — PreFi Rewards Drop + Contest Live! dorks
Wed, 07 Jan 2026 13:06:38 GMT When the default configuration turns you “Super(up)set�? security-research
Wed, 08 Oct 2025 13:36:28 GMT Shodan.io|THM - 100-Day Cyber Exploration Writeup..|Day-1 . shodan
Tue, 13 Jan 2026 16:24:48 GMT Testing PSPDFKit License Validity via Client-Side PoC bugbounty-writeup
Wed, 14 Jan 2026 11:51:40 GMT � Custom Exploit Development: A Journey into the Depths of Memo... exploit
Sun, 22 Oct 2023 19:57:30 GMT Performing a Log Poisoning Attack log-poisoning
Wed, 17 Dec 2025 09:57:30 GMT The Mother Lode: Hacking with GitHub Dorking github-dorking
Sun, 11 Jan 2026 12:43:40 GMT Local File Inclusion(LFI) Vulnerability lfi
Fri, 25 Jul 2025 16:41:01 GMT � SubDNS-UI: Build Your Own Subdomain + DNS Enumerator with a C... subdomain-enumeration
Sun, 25 Jan 2026 10:00:45 GMT Every Interview Asks SSL, TLS, HTTPS — 90% Developers Still... web-security
Thu, 27 Mar 2025 23:46:11 GMT Make Break and Betrayal web-pentest
Sun, 18 Jan 2026 19:43:44 GMT Bounty Hacker Walkthrough vulnerability-scanning
Mon, 24 Nov 2025 13:28:01 GMT Building India’s Largest Bug Bounty Platform & Revolutionizing ... bug-bounty-hunting
Mon, 24 Nov 2025 01:14:16 GMT How xxx.com Helped Me Land $10K Bounties in Just 1 Week bounty-program
Tue, 07 Oct 2025 04:21:28 GMT Fastly Subdomain Takeover leading to $$$$ Bounty Reward subdomain-takeover
Fri, 28 Nov 2025 23:28:34 GMT How I Found a Critical SQL Injection in Mercedes-Benz My First W... bugcrowd
Sun, 18 Jan 2026 11:18:38 GMT Unrestricted File Upload Leads to Stored XSS, SSRF, and Phishing ssrf
Sun, 11 Jan 2026 13:59:41 GMT Broken Access Control Is a Trust Problem idor
Wed, 07 Jan 2026 19:40:29 GMT n8n RCE 101: Analyzing CVE-2025–68613 remote-code-execution
Mon, 05 Jan 2026 15:43:35 GMT End-to-End Reconciliation Solution for Finance Teams recon
Fri, 23 Jan 2026 09:36:08 GMT SON DÖNEMİN EN KRİTİK SİBER GÜVENLİK AÇIKLARI: Gerçek CV... cve
Tue, 12 Aug 2025 17:24:22 GMT How I Removed Other User`s Uploaded Images in a Few Clicks bug-bounty-program
Tue, 04 Nov 2025 10:31:54 GMT LFI vs RFI — When Your Website Starts Reading the Wrong Fil... lfi
Thu, 18 Sep 2025 05:45:26 GMT Data Accuracy in Directory Websites: Why Clean Listings = Loyal U... directory-listing
Tue, 13 Jan 2026 10:42:15 GMT Unmasking Critical RCE Flaws in the World’s Most Popular Orches... rce
Mon, 26 May 2025 15:44:42 GMT File Upload Vulnerabilities file-inclusion
Sun, 21 Sep 2025 03:55:56 GMT Is it easy to discover a critical vulnerability [P1] ? directory-listing
Sun, 25 Jan 2026 14:58:07 GMT IdentityServer, JWT ve Mikroservis Mimarisi: .NET ile Güvenli v... web-security
Sat, 27 Dec 2025 11:18:11 GMT Reflected XSS using Google Dorking on webmail application powered... cross-site-scripting
Fri, 02 Jan 2026 09:59:04 GMT 2 Years of Silence, 1 Critical Exploit: My Return to the Leaderbo... bugcrowd
Thu, 11 Dec 2025 17:36:39 GMT � Digital Archaeology: How to Unearth Hidden Technical Manuals ... google-dork
Sat, 29 Nov 2025 10:42:26 GMT Bahaya Google Dorking: Data Sensitif Mahasiswa Bocor! google-dork
Sat, 17 Jan 2026 12:37:35 GMT OSINT for Beginners: How Security Teams Use Public Data to Stop A... security-research
Sun, 25 Jan 2026 18:20:12 GMT Getting Started with Penetration Testing (Pentest) — A Begi... pentest
Sat, 10 Jan 2026 12:56:32 GMT Cobalt Strike Advanced DATA | Red Team Operations + Command & Co... pentest
Tue, 06 Jan 2026 10:19:48 GMT Send Large Files Securely Online: The Complete Guide to Modern Fi... file-upload
Tue, 14 Oct 2025 01:36:00 GMT Hackviser  —  File Inclusion Labs file-inclusion
Thu, 22 Jan 2026 09:08:23 GMT The Ghost in the Shell: How Vue.js Component Reuse Can Cost You T... bugs
Mon, 15 Dec 2025 18:46:12 GMT The CGI Script That Should Have Stayed Hidden — How a Forg... bugcrowd
Tue, 06 Jan 2026 18:21:03 GMT How I found a Race condition on Like Function bug-bounty-hunter
Mon, 27 Oct 2025 19:05:39 GMT eJPT — 4.1 CTF 1 Web Application Penetration Testing local-file-inclusion
Sat, 27 Dec 2025 07:53:36 GMT DOM XSS Using Web Messages and Javascript URL (window.postMessag... cross-site-scripting
Sat, 24 Jan 2026 06:47:12 GMT Google Dorkware Pro google-dorking, google-dork
Tue, 19 Aug 2025 10:37:07 GMT Dari Teori ke Praktik: SSRF, File Inclusion, dan Command Injectio... file-inclusion
Tue, 15 Jul 2025 18:57:57 GMT ZoomEye Dorking | JSON Endpoints zoomeye
Thu, 18 Dec 2025 09:40:45 GMT DOM XSS Using Web Messages and Javascript URL (window.postMessag... cross-site-scripting
Sun, 04 Jan 2026 13:19:37 GMT How I Got an Easy $100 Bounty in Just 2 Minutes hackerone
Sat, 25 Jan 2025 23:20:10 GMT Full GitHub Dorking guide: for OSINT and BugBounty (Reconnaissanc... github-dorking
Wed, 19 Nov 2025 13:57:21 GMT BurpSuite + Ffuf | Make Your Life Easier lfi
Tue, 20 Jan 2026 18:19:30 GMT Walkthrough Portswigger Lab: Reflected XSS with some SVG markup a... xss-attack
Wed, 07 Jan 2026 03:42:13 GMT 2026 Techniques to find Hidden Bugcrowd & HackerOne Programs bug-bounty-hunter
Tue, 04 Nov 2025 16:00:15 GMT Lo-Fi Writeup (TryHackMe Easy Machine) lfi
Thu, 22 Jan 2026 06:57:21 GMT Top 20 Tools Inside Parrot OS Explained (With Real-World Use Case... cybersecurity-tools
Sun, 18 Jan 2026 19:37:52 GMT An Introduction to EDR: cybersecurity-tools
Tue, 20 Jan 2026 19:15:22 GMT Introduction into SOAR cybersecurity-tools
Tue, 21 Oct 2025 03:46:36 GMT The Postal Heist of the Web: An Introduction to HTTP Request Smug... bug-bounty-hunting
Mon, 12 Jan 2026 15:11:17 GMT How Have I Been Pwned works and What it does cybersecurity-tools
Tue, 19 Aug 2025 11:22:08 GMT How to Get Started with Bug Bounties bug-bounty-hunting
Mon, 01 Sep 2025 06:53:22 GMT HTB-LAB Local File Inclusion (LFI) file-inclusion
Mon, 07 Jul 2025 05:15:45 GMT ZoomEye Dorking | Advanced OSINT zoomeye
Wed, 17 Dec 2025 04:39:27 GMT Cross-Site Scripting Via Unsanitized Input In a PHP Endpoint cross-site-scripting
Wed, 14 Jan 2026 11:30:22 GMT How Pro Hackers Test Internal Subdomains (admin, stage, dev) With... bugbounty-writeup
Wed, 22 Oct 2025 14:11:32 GMT Mastering Subdomain Enumeration: A Beginner’s Guide to Expandin... subdomain-enumeration
Fri, 21 Nov 2025 20:24:09 GMT Bypassing University Email Verification: A Logical Flaw in a Saud... vulnerability-disclosure
Tue, 06 Jan 2026 15:29:55 GMT Lab: Web cache poisoning via a fat GET request | Portswigger web-cache-poisoning
Wed, 10 Dec 2025 06:33:24 GMT “ReconFTW — Unified Reconnaissance Engine for Bug‑Bount... recon
Thu, 28 Sep 2023 23:05:39 GMT Archangel — TryHackMe log-poisoning
Tue, 05 Dec 2023 07:54:40 GMT LFI via SMTP log poisoning log-poisoning
Fri, 10 Nov 2023 03:38:01 GMT Apache error.log advanced Log poisoning RCE log-poisoning
Thu, 08 Jan 2026 11:02:21 GMT Why Reflected XSS Is Still Dangerous (Even When Developers Ignore... xss-vulnerability
Wed, 07 Jan 2026 03:27:29 GMT Automating HackerOne Scope Parsing with qsv for Bug Bounty Recon recon
Thu, 01 Jan 2026 08:03:59 GMT AI Agent to Find XSS cross-site-scripting
Mon, 19 Jan 2026 22:35:28 GMT How Much Does a Penetration Test Actually Cost? pentest
Tue, 13 Jan 2026 12:02:54 GMT How to Add Video Preview in Angular File Upload Before Uploading file-upload
Wed, 21 Jan 2026 08:30:36 GMT CVE-2025–68926 Explained: A Critical RustFS Hardcoded Credentia... cve
Wed, 19 Nov 2025 02:35:37 GMT CVE-2025-63872: SVG-Based XSS in DeepSeek Chat V3.2 vulnerability-disclosure
Wed, 15 Oct 2025 05:12:26 GMT Subdomain Takeover: The Forgotten DNS Records Hijacking Your Bran... subdomain-takeover
Sun, 25 Jan 2026 14:24:44 GMT This Login Page Trusted My OTP Way Too Much web-security
Fri, 23 Jan 2026 01:15:28 GMT Pentester’s Guide to SMB, SMTP, and SNMP Enumeration bug-bounty-writeup
Fri, 24 Jan 2025 00:08:47 GMT A majestic temple opportunity of wellbeing and wellness web-pentest
Tue, 13 Jan 2026 13:27:13 GMT Hacking “Time�: When Critical Infrastructure Forgets to Set a... vulnerability-disclosure
Mon, 29 Dec 2025 22:31:02 GMT PortSwigger Academy Lab: Information disclosure on debug page information-disclosure
Tue, 23 Dec 2025 15:55:25 GMT Smuggling Orders Past Business Logic bug-bounty-hunter
Mon, 29 Dec 2025 19:09:04 GMT How i found Sensitive Data Exposure in NASA Vulnerable Disclosure... google-dorking
Sat, 10 Jan 2026 17:29:52 GMT React2Shell (CVE-2025–55182): From React Server Components to U... rce
Fri, 16 Jan 2026 15:05:34 GMT From Enumeration to Exploitation: Hacking Metasploitable 2 via Sa... exploit
Sun, 25 Jan 2026 17:13:20 GMT My First CVE: CVE-2026–21641 cve
Mon, 19 Jan 2026 07:08:26 GMT Insecure Direct Object Reference Allows Cross-Organization Resour... idor
Tue, 05 Aug 2025 07:25:48 GMT CXF Service List Endpoint Recon dorking, zoomeye
Wed, 14 Jan 2026 03:32:48 GMT 6 Common SSRF Risks in Node.js ssrf
Wed, 07 Jan 2026 01:32:27 GMT FastAPI Streaming Multipart Uploads: Resumable Ingest for Flaky M... file-upload
Sun, 17 Aug 2025 17:58:45 GMT $$$ How I Exploited a Business Logic Flaw to Slash Product Prices... bug-bounty-program
Thu, 20 Nov 2025 09:45:04 GMT Timber Doors in Surrey: Style, Durability, and Value Explained dorking
Mon, 24 Nov 2025 02:22:21 GMT Padelify Writeup lfi
Sat, 24 Jan 2026 07:54:28 GMT Write-up: Gatekeeper lab (Medium) on THM pentest
Sun, 25 Jan 2026 18:06:50 GMT Blind XSS : Even a beginner can understand xss-attack
Sun, 21 Dec 2025 21:12:19 GMT I Found My First Bugs in 48 Hours: A Beginner’s Real-World Guid... bugcrowd
Tue, 30 Dec 2025 07:53:12 GMT One Mantle DevCard, Three Reward Pools for Mantle Global Hackatho... bounty-program
Thu, 25 Dec 2025 00:47:15 GMT Subdomain Takeover Explained: Complete Step-by-Step Guide (Recon ... subdomain-takeover
Mon, 21 Jul 2025 14:07:41 GMT “403 Forbidden? vdp
Sat, 10 Jan 2026 05:03:45 GMT Lab:Web cache poisoning via an unkeyed query parameter | Portswi... web-cache-poisoning
Thu, 04 Dec 2025 05:32:24 GMT ChainBounty Rewards & Bonus Guide — December 2025 bounties
Thu, 18 Dec 2025 10:06:53 GMT Learn Google Dorking: Arama Motorlarıyla Bilgi Keşfi google-dorking, google-dork
Thu, 15 Jan 2026 14:45:10 GMT The Complete Guide to ASP.NET ViewState Exploitation rce
Fri, 09 Jan 2026 15:36:38 GMT SSRF in PDF Generators ssrf
Fri, 24 Jan 2025 09:34:52 GMT A new Holistic temple opening InLeeds web-pentest
Sun, 11 Jan 2026 16:22:52 GMT (CVE-2026-0830) AWS Kiro GitLab Helper Remote Code Execution security-research
Wed, 21 Jan 2026 13:32:48 GMT MyExpense: 1 Lab WalkThrough xss-vulnerability
Sun, 18 Jan 2026 16:22:17 GMT HackerOne HTML Injection Fix Bypass� hackerone
Wed, 31 Dec 2025 19:14:30 GMT A New Year Thank You to Everyone Walking This Path Together hackerone
Sun, 25 Jan 2026 11:22:37 GMT Firmalyzer: A Comprehensive Automated Framework for IoT Firmware ... application-security
Fri, 02 Jan 2026 14:24:24 GMT Cross-Site Scripting (XSS) Vulnerability in DeepSeeks AI Input Fi... xss-bypass
Sun, 21 Dec 2025 10:09:54 GMT From “Valid Bug� to “No Bounty�: VRP, VRT, P4, and P5 on ... bugcrowd
Thu, 14 Aug 2025 10:08:18 GMT Predictive Analytics and Voice Technology: A Winning Combination ... vdp
Wed, 21 Jan 2026 13:47:20 GMT VulnLab: Insecure Direct Object Reference (IDOR) Çözümü idor
Sun, 04 Jan 2026 10:33:02 GMT The return to blogging and a blind SQL injection security-research
Sun, 25 Jan 2026 14:24:48 GMT easy $100 | bypass 403 to 200 ok bug-bounty-tips
Thu, 15 Jan 2026 16:54:38 GMT Yearn Finance, TMXTribe, Prism Protocol: $10.5M exploit
Mon, 19 Jan 2026 14:15:31 GMT Telegram Proxy Links: A Client-Side IP Exposure Risk Hiding Behin... security-research