Skip to content

rix4uni/medium-writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

Time Title Feed IsNew IsToday
Tue, 16 Sep 2025 16:24:20 GMT Hack the Box — Union — WriteUp penetration-testing, web-security Yes Yes
Tue, 16 Sep 2025 15:58:13 GMT Cracking the OWASP Juice Shop — My Story of Finding Vulnera... pentesting Yes Yes
Tue, 16 Sep 2025 16:07:11 GMT Unified AI Frameworks: The Next Leap in Creative Collaboration (2... information-technology Yes Yes
Tue, 16 Sep 2025 16:12:43 GMT Deepsearch & Reliable AI Agents Under Pressure : Operational rec... security Yes Yes
Tue, 16 Sep 2025 16:01:59 GMT Back on Track: Diving Deep into macOS and iOS Security cybersecurity, hacking Yes Yes
Tue, 16 Sep 2025 16:03:05 GMT The Quiet Click: When Trust Turns Against You cybersecurity Yes Yes
Tue, 16 Sep 2025 16:20:05 GMT 10 Cloud Security Best Practices Every Small Business Must Follow information-technology Yes Yes
Tue, 16 Sep 2025 16:08:33 GMT The Hack That Stole 147 Million Identities: Equifax’s 2017 Nigh... cybersecurity, hacking Yes Yes
Tue, 16 Sep 2025 16:20:48 GMT Cybersecurity Compliance: What It Means for UK Businesses cybersecurity, cyber-security-awareness Yes Yes
Tue, 16 Sep 2025 16:26:18 GMT Mr. Robot: Hacking the System, Hacking the Self hacking Yes Yes
Tue, 16 Sep 2025 16:23:42 GMT VPN Explained: What It Is and Why You Should Use One cybersecurity Yes Yes
Tue, 16 Sep 2025 16:25:56 GMT Pemrograman Dasar Mikrokontroler: Latihan / Tugas information-technology Yes Yes
Tue, 16 Sep 2025 04:50:37 GMT TO BECOME A SOC EXPERT(DAY-4) bug-bounty Yes
Tue, 16 Sep 2025 04:31:44 GMT When a Chatbot Becomes an Impostor bug-bounty, bug-bounty-tips, bug-bounty-writeup Yes
Tue, 16 Sep 2025 11:51:08 GMT Beautiful Benevolence vulnerability Yes
Tue, 16 Sep 2025 11:18:05 GMT How to Renew an SSL Certificate for Your Website web-security Yes
Tue, 16 Sep 2025 15:08:06 GMT Game Over? Nope. Instant Replay, Anyone? hacking Yes
Tue, 16 Sep 2025 11:05:12 GMT The Next 3 Years in Cybersecurity: What’s Changing Fast (2025â€... information-security Yes
Tue, 16 Sep 2025 09:16:45 GMT Why AI Security Needs Continuous Red Teaming information-security Yes
Tue, 16 Sep 2025 11:54:29 GMT Hackers + AI: The Unholy Alliance That’s Already Here cyber-security-awareness Yes
Tue, 16 Sep 2025 13:41:32 GMT The Role of Files and Folders in Operating Systems — okcomp... file-upload Yes
Tue, 16 Sep 2025 04:53:44 GMT Web shell upload via path traversal (Portswigger Lab Walkthrough) bug-bounty Yes
Tue, 16 Sep 2025 09:08:58 GMT Day 9 — Opening the Gates: Port Forwarding, Triggering & DM... ethical-hacking Yes
Tue, 16 Sep 2025 15:46:07 GMT Pemrograman Dasar Mikrokontroler: Laporan information-technology Yes
Tue, 16 Sep 2025 14:31:18 GMT Lab: Reflected XSS into a template literal with angle brackets, s... xss-attack, xss-vulnerability Yes
Tue, 16 Sep 2025 05:30:57 GMT Cyber Security Details: Wireless Security Protocols cyber-sec Yes
Tue, 16 Sep 2025 14:13:26 GMT CodeTwo Write-up Hack The Box penetration-testing, hacking Yes
Tue, 16 Sep 2025 11:33:31 GMT The Unfiltered 2025 Guide to Web Pentesting & Bug Bounties: From ... bug-bounty Yes
Tue, 16 Sep 2025 11:52:04 GMT �נחנו חיי� בתקופה שבה כמעט כל מה ש�נ... information-security Yes
Tue, 16 Sep 2025 15:33:01 GMT The Day JavaScript’s Package Manager Was Hijacked cybersecurity Yes
Tue, 16 Sep 2025 12:42:21 GMT Benchmarking Against ZTA, CIS, and NIST Standards: How to Get Sta... cyber-security-awareness Yes
Tue, 16 Sep 2025 14:52:22 GMT 2025년 4월 SK텔레콤 침해사고 security Yes
Tue, 16 Sep 2025 14:36:56 GMT Zero Trust? More Like Zero Understanding. security, infosec Yes
Tue, 16 Sep 2025 15:04:42 GMT AI pentesting from robo burglar tactics to cyber red teaming infosec, pentesting, cyber-security-awareness Yes
Tue, 16 Sep 2025 08:32:32 GMT Subdomain Takeover vapt, subdomain-takeover Yes
Tue, 16 Sep 2025 08:22:15 GMT 6 Things That Make Endpoint Security Fail (and How to Fix Them) information-security Yes
Tue, 16 Sep 2025 11:57:02 GMT Why Cybersecurity Matters in 2025 cyber-security-awareness Yes
Tue, 16 Sep 2025 15:04:38 GMT Vulnerability vulnerability Yes
Tue, 16 Sep 2025 07:59:28 GMT Why Information Gathering Is the Most Important Step in a Pentest penetration-testing Yes
Tue, 16 Sep 2025 14:14:03 GMT Python : Operasi Logika, Komparasi logika, dan Elif information-technology Yes
Tue, 16 Sep 2025 11:04:35 GMT What Linux File Permissions Really Mean (A Practical Guide) ethical-hacking Yes
Tue, 16 Sep 2025 14:37:56 GMT Wenn Ihr Unternehmen wächst, wächst auch die Angriffsfläche fÃ... cyber-security-awareness Yes
Tue, 16 Sep 2025 05:31:11 GMT The Importance of Threat Intelligence: Cyber Security Details infosec, cyber-sec Yes
Tue, 16 Sep 2025 13:16:28 GMT What is Cyber Security: A Complete Guide cyber-security-awareness Yes
Tue, 16 Sep 2025 08:33:18 GMT What I Learned From a Bug That Fixed Itself (and Why You Should T... bugs Yes
Tue, 16 Sep 2025 05:32:45 GMT Cyber Security Details: Managing Digital Identities cyber-sec Yes
Tue, 16 Sep 2025 14:11:01 GMT 10 Things You Didn’t Know About Security Companies in Ventura C... security Yes
Tue, 16 Sep 2025 14:31:42 GMT Lets Hacks Printers Now!! hacking Yes
Tue, 16 Sep 2025 05:32:28 GMT The Battle Against Botnets: Cyber Security Details cyber-sec Yes
Tue, 16 Sep 2025 15:27:28 GMT AI on the Line: How Smart Safety Is Transforming Modern Manufactu... security Yes
Tue, 16 Sep 2025 07:27:43 GMT Incident Response Steps and Practical Examples infosec Yes
Tue, 16 Sep 2025 07:19:18 GMT How to Supercharge your Yields with BUG: A Guide to Maximizing Yo... bugs Yes
Tue, 16 Sep 2025 09:28:39 GMT Letters to the Fear That Fell Asleep on My Desk vulnerability Yes
Tue, 16 Sep 2025 11:17:59 GMT Beyond the Datasheet: What UART and Firmware Revealed Inside a Hi... ethical-hacking Yes
Tue, 16 Sep 2025 05:31:03 GMT Cyber Security Details: Data Backup and Recovery cyber-sec Yes
Tue, 16 Sep 2025 05:32:31 GMT Cyber Security Details: Advanced Persistent Threats (APTs) cyber-sec Yes
Tue, 16 Sep 2025 15:07:39 GMT The Weight of an Unsent Message vulnerability Yes
Tue, 16 Sep 2025 14:48:32 GMT The rise of biometric spoofing: How hackers fool your fingerprint... information-security Yes
Tue, 16 Sep 2025 12:36:42 GMT Day-4 How I got a 9.8 CVSS score for a 4.4 bug — the power ... web-security, bug-bounty-tips, hackerone, ethical-hacking Yes
Tue, 16 Sep 2025 14:11:01 GMT Blind XSS with AI bug-bounty, penetration-testing, hacking, infosec Yes
Tue, 16 Sep 2025 10:17:06 GMT Secure Your Business Future with ISO 27001 in Al Murqab, Kuwait information-security Yes
Tue, 16 Sep 2025 13:21:01 GMT Ficha de Contacto y Protocolo de Escalamiento pentesting Yes
Tue, 16 Sep 2025 09:42:25 GMT Intro 1 : Owasp Juice Shop pentesting Yes
Tue, 16 Sep 2025 00:22:04 GMT O código que você não escreveu: O ponto cego da segurança de ... application-security Yes
Tue, 16 Sep 2025 13:51:15 GMT Microsoft Edge DLL Hijack vulnerability, hacking Yes
Tue, 16 Sep 2025 09:16:33 GMT How Telecoms Can Accelerate Innovation with DevSecOps and AI information-security Yes
Tue, 16 Sep 2025 08:28:22 GMT HTB Soulmate Write-up — Türkçe penetration-testing Yes
Tue, 16 Sep 2025 07:18:20 GMT Cloud Ransomware Campaign Codefinger: Abusing AWS for S3 Encrypti... security-research Yes
Tue, 16 Sep 2025 13:24:43 GMT One Number, One Change: How I Took Over an Account Using Local St... bug-bounty Yes
Tue, 16 Sep 2025 11:55:05 GMT Digital Privacy in the Modern Age: Why Protecting Your Data Matt... information-security Yes
Tue, 16 Sep 2025 10:41:34 GMT So You Think Red Teaming Wins? Why Purple Teaming Actually Pays t... penetration-testing Yes
Tue, 16 Sep 2025 05:32:33 GMT Securing the Edge: Cyber Security Details infosec, cyber-sec Yes
Tue, 16 Sep 2025 15:02:54 GMT Drive-Thrus, Kitchens & AI: How Quick Service Restaurants Are Rai... security Yes
Tue, 16 Sep 2025 14:59:31 GMT This Is Why Hackers Fear the Spring Security FilterChain security Yes
Tue, 16 Sep 2025 08:15:47 GMT Defenders Need to Think Like Attackers: 5 Key Hacking Tools Expla... ethical-hacking, cybersecurity-tools Yes
Tue, 16 Sep 2025 05:31:08 GMT Cyber Security Details: Protecting Intellectual Property infosec, cyber-sec Yes
Tue, 16 Sep 2025 10:58:26 GMT Zivver, “Zero-Knowledge� en de Kiteworks-overname: wat klopt ... information-security Yes
Tue, 16 Sep 2025 15:04:55 GMT ¿Qué es el malware? hacking Yes
Tue, 16 Sep 2025 14:08:14 GMT Why companies are paying hackers ? Everything about Bug Bounties... bug-bounty, information-technology Yes
Tue, 16 Sep 2025 09:56:03 GMT The Day I Learned Even Sunshine Has a Shadow vulnerability Yes
Tue, 16 Sep 2025 15:05:25 GMT Build Dynamic Image Transformations with Filestack file-upload Yes
Tue, 16 Sep 2025 13:37:22 GMT Complete Guide to File Uploads in Next.js — AWS S3, Presign... file-upload Yes
Tue, 16 Sep 2025 14:01:51 GMT Cyber Briefing: 2025.09.16 information-technology Yes
Tue, 16 Sep 2025 09:02:29 GMT Think Your Patient Data Is Safe? Think Again. ethical-hacking Yes
Tue, 16 Sep 2025 15:32:11 GMT HIRE A HACKER FOR CRYPTO SCAM RECOVERY SERVICES, CALL MALICE CYBE... cybersecurity, cyber-security-awareness Yes
Tue, 16 Sep 2025 15:51:00 GMT The Role of Employee Awareness in Successful Cybersecurity Strate... cybersecurity, infosec Yes
Tue, 16 Sep 2025 14:33:48 GMT RAM: Random Access Mayhem Download For PC & Windows information-technology Yes
Tue, 16 Sep 2025 06:25:48 GMT Smartbi Login Bypass Vulnerability — Patch Now Before RCE R... rce Yes
Tue, 16 Sep 2025 14:45:41 GMT The Night, a Single Click Nearly ruined my Career — Why Eve... web-security Yes
Tue, 16 Sep 2025 09:38:23 GMT Dear Diary, I Lost Myself Yesterday. I Might Lose You, Too. vulnerability Yes
Tue, 16 Sep 2025 13:06:01 GMT Discover The Internet’s Hidden Secrets With Shodan ethical-hacking, shodan Yes
Tue, 16 Sep 2025 10:51:38 GMT My Experience at The Hackers Meetup: WordPress Security infosec Yes
Tue, 16 Sep 2025 14:50:40 GMT CraxsRat latest version 7.7 download link hacking Yes
Tue, 16 Sep 2025 10:14:09 GMT Packing Feelings Into Meta Tags: A Modern Tragedy vulnerability Yes
Tue, 16 Sep 2025 14:17:24 GMT Log4j security, vulnerability Yes
Tue, 16 Sep 2025 15:25:49 GMT Microsoft’s September Patch Tuesday 86 Vulnerabilities: Why You... vulnerability Yes
Tue, 16 Sep 2025 11:34:24 GMT Why Ethical AI Is Impossible ethical-hacking Yes
Tue, 16 Sep 2025 15:31:26 GMT TEMPEST CTF 2025 [Qualifying] — Mobile Security Write-Up cybersecurity Yes
Tue, 16 Sep 2025 14:39:23 GMT Big Data : Instalasi Apache Hadoop dan Apache Spark information-technology Yes
Tue, 16 Sep 2025 14:26:04 GMT The CTF That Broke Me bug-bounty Yes
Tue, 16 Sep 2025 06:17:59 GMT Linux Security Exploitation: Understanding Vulnerabilities exploit Yes
Tue, 16 Sep 2025 05:31:11 GMT Cyber Security Details: Security Incident Management cyber-sec Yes
Tue, 16 Sep 2025 14:36:07 GMT No, I’m not a Human best Indie, Simulation Game For Windows information-technology Yes
Tue, 16 Sep 2025 05:31:00 GMT Protecting Against DDoS Attacks: Cyber Security Details cyber-sec Yes
Tue, 16 Sep 2025 15:49:06 GMT TryHackMe: Simple CTF Walkthrough cybersecurity, penetration-testing, ethical-hacking Yes
Tue, 16 Sep 2025 14:46:43 GMT The Curse of Knowledge: The Danger of Studying Too Much ethical-hacking Yes
Tue, 16 Sep 2025 15:51:58 GMT Understanding Active Directory Architecture — Explained wit... penetration-testing Yes
Tue, 16 Sep 2025 06:02:11 GMT Open-Source S3 Alternatives| Introduction To MinIO file-upload Yes
Tue, 16 Sep 2025 10:55:57 GMT Nessus vs Metasploit A Practical Comparison for Vulnerability Ass... penetration-testing Yes
Tue, 16 Sep 2025 06:42:40 GMT CVE Deep Dive : CVE-2025–32462 infosec, cve Yes
Tue, 16 Sep 2025 14:28:58 GMT Implementing Authentication in React with JWT & Refresh Tokens security Yes
Tue, 16 Sep 2025 10:35:37 GMT DockerLabs Writeup — File (Spanish) pentesting Yes
Tue, 16 Sep 2025 08:00:16 GMT The Most Popular Cyberspace Search Engine — ZoomEye bug-bounty, cve Yes
Tue, 16 Sep 2025 15:24:17 GMT NejvÄ›tší hrozbou jsou obyÄ�ejné podvody: phishing a sociálnÃ... cyber-security-awareness Yes
Tue, 16 Sep 2025 14:05:53 GMT Play_Session_Injection — Walkthrough penetration-testing Yes
Tue, 16 Sep 2025 10:06:13 GMT Best Network Management Service Provider In India | Optimize You... cyber-security-awareness Yes
Tue, 16 Sep 2025 08:36:36 GMT Bug Bounty: Bypass — Forgot Password Verification bug-bounty, bug-bounty-tips, bugs, bug-bounty-writeup Yes
Tue, 16 Sep 2025 14:44:23 GMT ISO 27001 for Startups: How to Know When It’s Time to Get Certi... security Yes
Tue, 16 Sep 2025 10:02:22 GMT Zero Trust Cloud Security: Strengthen Cybersecurity & Safeguard V... information-security Yes
Tue, 02 Sep 2025 15:53:08 GMT Google Dorking: The Hidden Side of Search Engines google-dorking
Mon, 15 Sep 2025 18:54:05 GMT Ethical hacking | penetration testing — Roadmap cybersecurity-tools
Sun, 20 Jul 2025 03:20:32 GMT ChainBounty Announces Reward Cascade: Bag BOUNTY Today bounties
Tue, 22 Jul 2025 21:32:52 GMT Insufficient Access Controls in GraphQL Enables Unauthorized User... bug-bounty-hunting
Sat, 06 Sep 2025 10:46:29 GMT Understanding XSS Vulnerabilities cross-site-scripting, xss-vulnerability
Fri, 13 Sep 2024 20:07:54 GMT Unleashing GitHub Dorks: The Ultimate Hack for Finding Hidden Sec... github-dorking
Fri, 15 Aug 2025 20:21:45 GMT File Inclusion lfi
Tue, 19 Aug 2025 11:22:08 GMT How to Get Started with Bug Bounties bug-bounty-hunting
Sun, 22 Oct 2023 19:57:30 GMT Performing a Log Poisoning Attack log-poisoning
Sun, 14 Sep 2025 18:02:00 GMT Bug Bounty: Open Redirect: el fallo que nadie respeta… pero to... bugbounty-writeup, bug-bounty-hunter
Sun, 26 Jan 2025 19:08:11 GMT Matrix strike’s back against honesty from a power stance web-pentest
Wed, 03 Sep 2025 05:37:42 GMT Otomatisasi Directory Listing: Panduan Praktis untuk Efisiensi Bu... pentest
Mon, 15 Sep 2025 21:13:42 GMT TryHackMe — Thompson pentesting
Fri, 05 Sep 2025 21:18:31 GMT How i Got $500 From Information Disclosure By Sending a Jpeg information-disclosure
Tue, 02 Sep 2025 20:30:00 GMT MD2PDF- TryHackMe WriteUp ssrf
Mon, 15 Sep 2025 12:19:33 GMT Spookifier | HTB Walkthrough web-security
Thu, 28 Aug 2025 15:58:12 GMT Portswigger Cross-site scripting Labs — Expert cross-site-scripting
Sat, 16 Aug 2025 10:22:32 GMT AlertNinja: A Network and Vulnerability Scanning Tool. vulnerability-scanning
Wed, 03 Sep 2025 05:01:28 GMT 10. Hunting for IDORs: The Most Underrated Vulnerability idor
Mon, 01 Sep 2025 07:03:20 GMT Web Cache Nedir, Web Cache Poisoning Nedir, Nasıl Tespit Edilir,... web-cache-poisoning
Sat, 13 Sep 2025 23:43:22 GMT Anon.Cat: Free, Anonymous, and Secure File Uploads file-upload
Sun, 14 Sep 2025 08:22:11 GMT CVE-2025–57833: Deep Dive into Django ORM FilteredRelation Alia... cve
Sat, 06 Sep 2025 17:08:22 GMT GXSS and KXSS: Peeking Into the Hidden Corners of the Web xss-vulnerability
Sat, 06 Sep 2025 19:09:46 GMT [Guide] Crafting a neat and valuable bug bounty report bounty-program
Wed, 10 Sep 2025 10:23:09 GMT Responder Tool Footprints in NTLM Credential Theft security-research
Mon, 15 Sep 2025 21:07:26 GMT TryHackMe — Anthem pentesting
Thu, 04 Sep 2025 03:11:22 GMT Yonyou U8 Cloud RCE: File Upload Bypass Confirmed rce
Sat, 07 Sep 2024 07:42:54 GMT The Easiest Way to Find CVEs at the Moment? GitHub Dorks! github-dorking
Tue, 10 Dec 2024 15:26:15 GMT Mastering Bug Bounty Recon: Essential Techniques for Ethical Hack... subdomain-enumeration
Thu, 28 Aug 2025 16:05:33 GMT Simple IDOR Led to PII & Passport Leaks (and a $1,000 Bounty) idor
Tue, 06 May 2025 08:09:58 GMT Prevent File Inclusion Vulnerability in Symfony file-inclusion
Fri, 29 Aug 2025 04:43:21 GMT 9. The Secret Power of Google Dorking dorking
Fri, 22 Aug 2025 08:44:51 GMT Vulnerability Scanning vs. Penetration Testing: Understanding the... vulnerability-scanning
Tue, 19 Nov 2024 17:26:48 GMT How to Install and Use dnsx for Subdomain Enumeration and DNS Rec... subdomain-enumeration
Sun, 14 Sep 2025 17:23:19 GMT Hacker101- H1 Thermostat-CTF hackerone
Sat, 06 Sep 2025 16:27:56 GMT Hacking Methodology From Crash to Code vapt
Fri, 12 Sep 2025 11:51:57 GMT Understanding CVE-2022–26923: A Vulnerability in Active Directo... cve
Sun, 07 Sep 2025 04:52:41 GMT Shodan Recon Tips shodan
Sun, 06 Jul 2025 06:33:18 GMT Path Traversal part-1 : File path traversal, simple case file-inclusion
Wed, 16 Jul 2025 12:07:42 GMT Hackers Love This 1979 Protocol (Because It Can’t Defend Itself... censys
Sun, 14 Sep 2025 13:46:26 GMT Day 2 — The Token Bugs Nobody Talks About bounties
Fri, 01 Aug 2025 16:05:55 GMT Local File Inclusion — Double encoding [Root-Me] Writeup lfi
Tue, 12 Aug 2025 05:21:56 GMT Forbidden No More — How Hackers Slip Past 403 & 401 Errors ... bug-bounty-hunting
Sat, 06 Sep 2025 09:50:58 GMT Exploiting SSRF in TryHackMe’s MD2PDF Room: A Hands-On Walkthro... ssrf
Fri, 23 May 2025 06:02:53 GMT Search Skills censys
Mon, 15 Sep 2025 23:06:06 GMT I Started Bug Hunting on an External Program… And Accidentally ... bug-bounty-tips, bugs, bug-bounty-writeup
Thu, 11 Sep 2025 04:50:06 GMT Automated pentesting tool (Pentera) pentest
Mon, 08 Sep 2025 10:49:40 GMT How I Hack Websites With Just HTML Injection recon
Wed, 10 Sep 2025 19:22:01 GMT Web API Authentication and Authorization: A Friendly Guide with R... api-key
Sat, 13 Sep 2025 20:17:18 GMT Supercharge Your Bug Bounty Toolkit: API Testing, DTO Validation,... bug-bounty-hunter
Wed, 13 Aug 2025 14:19:39 GMT Awesome Hacking & Cybersecurity Learning Path — Your Ultim... bug-bounty-hunting
Sun, 14 Sep 2025 19:30:35 GMT Cross-site scripting xss-attack
Tue, 15 Jul 2025 08:14:04 GMT Level Up Your Bounties: How to Choose the Best Bug Bounty Program... bug-bounty-program
Sun, 09 Feb 2025 06:54:39 GMT From Duplicate to Letter of Appreciation: How I Hacked NASA vdp
Tue, 02 Sep 2025 23:03:48 GMT From Theory to Practice: Understanding IDOR Through a Real Scenar... idor
Fri, 22 Aug 2025 18:14:14 GMT Subdomain Takeover: Beyond Basics (From a Bug Bounty Hunter’s P... subdomain-takeover
Mon, 15 Sep 2025 20:48:01 GMT How Pen Testers Really Break In: The Methodology Behind the Breac... pentesting
Wed, 20 Aug 2025 14:32:08 GMT Web Cache Poisoning & Cache Deception: The Hidden Threats in Mod... web-cache-poisoning
Fri, 05 Sep 2025 02:47:18 GMT Weaver e-cology Vulnerability: Frontend File Upload RCE Risk rce
Fri, 11 Jul 2025 16:20:24 GMT PC WORX: The Hidden Risk in Your Industrial Network censys
Wed, 10 Sep 2025 05:14:48 GMT Application Security Testing: SAST, DAST, and IAST Explained application-security
Mon, 21 Jul 2025 14:07:41 GMT “403 Forbidden? vdp
Mon, 25 Aug 2025 13:33:44 GMT Advanced Local File Inclusion — Leveraging PHP Filters When... local-file-inclusion
Sat, 13 Sep 2025 15:37:05 GMT Legacy Systems and CVEs: The Unseen Threat to Ghana’s Digital L... vapt
Wed, 10 Sep 2025 20:54:18 GMT Next.js Middleware SSRF via Header Injection ssrf
Fri, 05 Sep 2025 02:30:45 GMT HackTheBox-CPTS: XSS Exploitation Walk-through xss-vulnerability
Fri, 08 Aug 2025 20:39:03 GMT Find Leaked Secret Keys (OPENAI, DeepSeek, Ollama , HuggingFace)... api-key
Mon, 15 Sep 2025 06:43:39 GMT Bug Bounty for Nuclei Template Contribution bug-bounty-tips
Fri, 01 Aug 2025 21:44:09 GMT PHP Wrappers lfi
Fri, 12 Sep 2025 07:09:29 GMT Rilis: Ghauri GUI v1 — Cara cepat menjalankan SQLi scan di ... pentest
Fri, 25 Jul 2025 00:36:13 GMT These 10 Burp Extensions Changed the Way I Do Bug Bounties bugcrowd
Mon, 08 Sep 2025 03:32:43 GMT Parameter Cloaking in Web Cache Poisoning Using Rails Parameter C... web-cache-poisoning
Tue, 22 Apr 2025 10:38:20 GMT Trump’s Tariffs Cut Out Censys — ZoomEye Steps In Strong! zoomeye
Sat, 04 Jan 2025 17:20:23 GMT GitHub dork github-dorking
Wed, 30 Apr 2025 17:08:29 GMT Exploring Subdomains: What They Are and How to Find Them subdomain-enumeration
Fri, 12 Sep 2025 07:26:35 GMT DVWA Modules:- walkthrough, XSS (Reflected & Stored) xss-vulnerability
Tue, 09 Sep 2025 21:23:35 GMT From Monoliths to Microservices: Tracing the Evolution of Backend... application-security
Fri, 25 Jul 2025 16:41:01 GMT � SubDNS-UI: Build Your Own Subdomain + DNS Enumerator with a C... subdomain-enumeration
Sun, 13 Jul 2025 16:32:21 GMT ProConOS Exposed: What ICS Security Teams Need to Know censys
Fri, 15 Aug 2025 18:10:18 GMT How to Earn from Apple’s ₹17.5 Crore Security Bounty Program bounty-program
Tue, 26 Aug 2025 11:39:54 GMT Meta-Level Finance: Why EODHD Is Your Secret Weapon for Market Da... api-key
Fri, 12 Sep 2025 15:10:16 GMT Lab: Reflected XSS into a JavaScript string with single quote and... xss-attack
Sun, 31 Aug 2025 14:59:30 GMT The Cookie Bomb: My First $10K in Bug Bounties hackerone, bugcrowd
Mon, 11 Aug 2025 07:41:16 GMT How I Found an XSS Vulnerability in the KPK Website and Earned a ... vdp
Thu, 26 Dec 2024 15:23:03 GMT GitHub Dorking List: The Ultimate Guide to Exploring and Securing... github-dorking
Sun, 31 Aug 2025 17:14:03 GMT Reflected XSS in Login Form (Email & Password Fields) Vvveb CMS v... cross-site-scripting, vulnerability-disclosure, security-research
Sun, 17 Aug 2025 18:48:00 GMT Baltimore City Water: Leaking Customer Information information-disclosure
Sun, 10 Aug 2025 17:18:43 GMT THM — Inclusion Writeup lfi
Mon, 15 Sep 2025 22:55:47 GMT First Blood in Cyshield CTF (Helwan University ) —  OS Comm... web-security
Sun, 14 Sep 2025 21:42:57 GMT Maximize Your Passive Income with BUG BUG bugs
Fri, 11 Jul 2025 07:49:47 GMT Platform Showdown: The Ultimate Guide to Choosing Your Bug Bounty... bug-bounty-program
Fri, 05 Sep 2025 19:07:26 GMT Watcher | TryHackMe rce, lfi
Sun, 17 Aug 2025 18:33:25 GMT Mobile Security security-research
Tue, 15 Jul 2025 12:15:58 GMT “Secure� OPC UA Setups Are Being Hacked — Here’s Why censys
Sat, 26 Jul 2025 02:05:18 GMT Claim Exclusive BOUNTY Through ChainBounty's Distribution Wave bounties
Mon, 15 Sep 2025 18:02:01 GMT Account Takeover vía endpoint de reset password: cuando el sist... bug-bounty-tips, bugbounty-writeup, bug-bounty-writeup, bug-bounty-hunter
Fri, 12 Sep 2025 14:48:14 GMT Dependency Confusion Attacks — How Malicious Packages Threa... rce
Sun, 31 Aug 2025 10:15:41 GMT Cyberus CTF 2025 - PhantomBlog and PhantomBlog - Revenge Writeups idor
Mon, 15 Sep 2025 08:03:08 GMT How to Set Up a File Manager in WordPress [Step-by-Step] file-upload
Wed, 09 Jul 2025 05:05:20 GMT ZoomEye Dorking with Nuclei zoomeye
Tue, 09 Sep 2025 07:32:08 GMT Bug Bounty: No hay payload que sustituya a una buena intuición bug-bounty-hunter
Sat, 23 Aug 2025 09:23:31 GMT URLScan Dorking to find WordPress Registration Endpoint dorking
Sat, 26 Jul 2025 08:25:41 GMT ��♂� Beyond XSS: Weaponizing HTML Injection in the Real W... xss-bypass
Fri, 12 Sep 2025 12:09:12 GMT SUBHUB your next level to a reliable interaction with your enviro... bounty-program
Tue, 09 Sep 2025 18:01:42 GMT Nuevo Video Bug Bounty: Hackeando Reddit Sin Filtros bugbounty-writeup, bug-bounty-hunter
Sun, 14 Sep 2025 19:49:07 GMT How I found Critical Bugs Easily on GitHub information-disclosure
Thu, 28 Aug 2025 10:15:04 GMT File Inclusion local-file-inclusion
Sun, 14 Jul 2024 11:56:11 GMT How I Can Get P1 Nasa easily — Dorking web-pentest
Wed, 03 Sep 2025 10:42:48 GMT Chrome 140 Update Patches Six Critical Vulnerabilities Allowing R... remote-code-execution
Sat, 25 Jan 2025 23:20:10 GMT Full GitHub Dorking guide: for OSINT and BugBounty (Reconnaissanc... github-dorking
Fri, 25 Jul 2025 12:16:47 GMT Recon Solana Announces Token Surge: Get RECON Today recon
Tue, 26 Aug 2025 09:27:02 GMT Stored XSS Leading to Full Account Takeover (The Art of Content-T... xss-bypass
Mon, 25 Aug 2025 14:13:34 GMT How to find an Information Disclosure (ID) vulnerabilities information-disclosure
Thu, 28 Aug 2025 16:46:38 GMT How I (Accidentally) Poisoned a Cache with Just the Host Header web-cache-poisoning
Tue, 19 Aug 2025 14:37:45 GMT Web cache poisoning web-cache-poisoning
Tue, 19 Aug 2025 21:49:26 GMT Kubernetes for Everyone | TryHackMe Walkthrough lfi
Fri, 15 Aug 2025 19:37:05 GMT XSS: Um bypass interessante em limite de caracteres xss-bypass
Fri, 18 Jul 2025 01:35:17 GMT Lo-Fi TryHackMe Walkthrough/Write-up file-inclusion
Tue, 22 Jul 2025 18:51:36 GMT From Zero to Root — Day 11: Breaks, Burnout & Back into the... google-dork
Fri, 15 Aug 2025 13:45:52 GMT Hackviser — PostgreSQL COPY TO/FROM PROGRAM Authenticated Remot... remote-code-execution
Fri, 08 Aug 2025 16:02:23 GMT Cracking Pensive: A Deep Dive into Bugcrowd’s BlackHat USA CTF ... bugcrowd
Mon, 15 Sep 2025 21:41:51 GMT WinAPI Wrapper for Import Address Table Evasion pentesting
Mon, 15 Sep 2025 05:14:34 GMT Secrets in Plain Sight: How I Found a Hardcoded API Key in a Publ... bug-bounty-writeup
Sun, 14 Sep 2025 14:09:44 GMT The Art of Secure, User-Friendly Login Portals application-security
Thu, 13 Mar 2025 18:09:56 GMT How I Found Sensitive Information using Github Dorks in Bug Bount... github-dorking
Fri, 07 Feb 2025 05:12:28 GMT Do You Struggle Finding Internal/Hidden Subdomains? Recon part 5 subdomain-enumeration
Sat, 30 Aug 2025 15:30:24 GMT FREE 10-Day GOLDEN PLAN for xss0r V5 — As Promised! xss-bypass
Tue, 09 Sep 2025 17:30:55 GMT Secure by Default: Practical Web App Security Checklist application-security
Fri, 01 Aug 2025 17:37:05 GMT Local File Inclusion — Wrappers [Root-me] lfi
Mon, 08 Sep 2025 08:09:34 GMT Network Sniffing on Linux with Wireshark: A Beginner’s Guide to... cybersecurity-tools
Sun, 23 Feb 2025 11:17:25 GMT $1000-$10k worth Leaks via Github Secret Dorks github-dorking
Sun, 06 Jul 2025 09:17:36 GMT How To Use Reddit for SaaS Marketing directory-listing
Mon, 08 Sep 2025 13:47:07 GMT Blind SQL Injection Attacks xss-vulnerability
Thu, 21 Aug 2025 17:03:55 GMT Shodan: Search Engine Where U Must Learn How to Search shodan
Sun, 13 Jul 2025 04:17:45 GMT How To Instantly Claim $DORK dorks
Fri, 18 Jul 2025 14:43:59 GMT Bug Bounty 101: Step-by-Step Practical Approach to Recon and Disc... bug-bounty-hunting
Sat, 02 Aug 2025 14:15:23 GMT The Silent Risk in Your ICS: Why S7 Protocol Needs Security Atten... censys
Mon, 15 Sep 2025 12:38:19 GMT What is Cryptojacking ? — Dude Earned 48,000$ with NOTHING... bug-bounty-tips
Mon, 02 Dec 2024 20:19:13 GMT Master Advanced Subdomain Enumeration with AlterX: A Bug Bounty H... subdomain-enumeration
Fri, 04 Jul 2025 09:25:20 GMT Lo-Fi — TryHackMe Writeup file-inclusion
Sun, 07 Sep 2025 17:09:26 GMT Shodan Nedir? İnternetin Arama Motoruyla Açık Portları Keşfe... shodan
Mon, 25 Aug 2025 00:08:30 GMT Malicious Uses of OSINT by Cybercriminals and Hackers shodan
Sat, 06 Sep 2025 07:56:58 GMT Stop Hardcoding API Keys — Try This Secret Instead! api-key
Fri, 12 Sep 2025 05:00:25 GMT The Language of Exploits: Cyber Security Details exploit
Sun, 14 Sep 2025 16:57:04 GMT Chrome Remote Code Execution Vulnerability: A Call for Immediate ... remote-code-execution
Fri, 15 Aug 2025 19:02:24 GMT The Day a Null Byte Outsmarted an XSS Filter xss-bypass
Wed, 03 Sep 2025 06:50:21 GMT Top 10 AI Cybersecurity Tools (2025–2026) cybersecurity-tools
Thu, 21 Aug 2025 02:01:32 GMT Web Cache Poisoning via an Unkeyed Query Parameter web-cache-poisoning
Tue, 12 Aug 2025 20:58:47 GMT Server Security, Vulnerability Assessment & Governance Solution vulnerability-scanning
Fri, 10 Nov 2023 03:38:01 GMT Apache error.log advanced Log poisoning RCE log-poisoning
Mon, 15 Sep 2025 03:28:37 GMT Analysis of rar file leads to a phishing site and two vulnerabili... cve
Sun, 07 Sep 2025 13:32:16 GMT Git Can Steal Your Data: Problem Explained and How to Stay Safe xss-vulnerability
Mon, 18 Aug 2025 18:06:38 GMT The Importance of Legal Directory Listings for Your Practice directory-listing
Sun, 24 Aug 2025 13:54:11 GMT DVWA Reflected XSS (ALL LEVELS) cross-site-scripting
Sat, 30 Aug 2025 22:35:50 GMT File Upload Bypass: Understanding and Mitigating Risks in Web App... remote-code-execution
Sun, 14 Sep 2025 17:38:27 GMT The Secret Playbook: How Bug Hunters Spot Vulnerabilities Before ... vapt
Fri, 12 Sep 2025 02:53:47 GMT Join the SubHub Content Bounty: 500,000 $SUBHUB Scores + NFTs Up ... bounty-program
Fri, 12 Sep 2025 18:01:42 GMT RCE realista basado en un caso real pagado con $30,000 bugbounty-writeup, bug-bounty-hunter
Sun, 13 Jul 2025 08:35:40 GMT Subdomain Takeover on mailgun[.]org subdomain-takeover
Sat, 13 Sep 2025 08:50:06 GMT Compare the security mechanisms in Django (CSRF, XSS protection) ... xss-attack
Tue, 05 Dec 2023 07:54:40 GMT LFI via SMTP log poisoning log-poisoning
Sat, 05 Jul 2025 14:44:33 GMT Subdomain Takeover: When Your Own Domain Becomes Your Enemy ï¸�â€... subdomain-takeover
Tue, 26 Aug 2025 10:16:56 GMT 3 XSS HackerOne Report got Duplicate cross-site-scripting
Sat, 26 Apr 2025 20:38:42 GMT Subdomain Takeover on VDP vdp
Fri, 25 Jul 2025 15:34:20 GMT Discover Top Local Businesses Effortlessly with List & Post directory-listing
Sun, 14 Sep 2025 18:03:54 GMT THREAT BRIEF (HIGH): Adobe Commerce Flaw Lets Hackers Take Over C... cve
Thu, 21 Aug 2025 10:04:08 GMT Dork Like a Demon: FOFA Edition for Hackers & Bug Bounty Hunters dorking, dorks
Tue, 09 Sep 2025 20:16:11 GMT 7 Best Practices to Prevent Vulnerabilities When You Upload Files... file-upload
Mon, 08 Sep 2025 10:02:51 GMT StorX Network: $SRX Ecosystem Bounty Program for Storage Node Ope... bounty-program
Sat, 06 Sep 2025 07:16:23 GMT So You Want to Be a Hacker? Forget the RGB. hackerone
Tue, 19 Aug 2025 10:37:07 GMT Dari Teori ke Praktik: SSRF, File Inclusion, dan Command Injectio... file-inclusion
Mon, 15 Sep 2025 06:46:42 GMT ⌛ Pending Invite Hijack — Takeover via Improper Identity ... bug-bounty-tips, bug-bounty-writeup
Mon, 15 Sep 2025 20:55:32 GMT How I Got My First Valid Bug (and Yes, It Was Just a ') bug-bounty-writeup
Sun, 07 Sep 2025 01:15:09 GMT Impact of AI on the Pentesting Industry pentest
Fri, 12 Sep 2025 05:34:33 GMT Code Review : SSRF ssrf
Fri, 12 Sep 2025 08:27:50 GMT CVE-2025–56426: Upcoming Cart Price Manipulation Vulnerability cve
Sat, 06 Sep 2025 15:01:04 GMT SQL Injection Vulnerability Scanner Tools bounties
Sun, 17 Aug 2025 17:28:32 GMT � KeySentry v2 — Stop API Key Leaks Before They Stop You api-key
Mon, 15 Sep 2025 19:51:21 GMT WAF Bypass + XSS + Business Logic Flaw = Account Takeover xss-attack
Mon, 15 Sep 2025 18:30:25 GMT Learning Bug Bounty — Day 4: Exploring Burp Suite web-security
Wed, 30 Jul 2025 12:27:54 GMT From Path Guessing to Dashboard Takeover: Full Access to Governme... bugcrowd
Mon, 08 Sep 2025 09:54:11 GMT Ultimate Google Dorking: A Comprehensive Guide google-dork
Sun, 10 Aug 2025 05:37:41 GMT $10,000 Google Bug Bounty: How a Deserialization RCE in AppSheet... remote-code-execution, bug-bounty-hunting
Fri, 01 Aug 2025 22:14:03 GMT Local File Inclusion Double encoding @ Root-me Walkthrough local-file-inclusion
Sun, 07 Sep 2025 04:01:39 GMT How to Protect Your Data from Ransomware Attacks in 2025 vapt
Fri, 28 Jun 2024 14:51:14 GMT X-Forwarded HTTP header-ləri : Qısa izah log-poisoning
Mon, 01 Sep 2025 15:31:11 GMT Detecting exposed llm servers: shodan case study on ollama shodan
Sun, 17 Aug 2025 03:44:14 GMT Just bought Shodan Lifetime Membership for $5 shodan
Mon, 15 Sep 2025 06:07:21 GMT Cracking JWTs: From None Algorithm to Key Confusion application-security
Mon, 21 Nov 2022 22:42:17 GMT Explorando XSS no lugar do meu nome. web-pentest
Thu, 14 Aug 2025 12:46:15 GMT ☕ Web Cache Poisoning — How to Trick the Internet’s Mem... web-cache-poisoning
Tue, 05 Aug 2025 17:44:32 GMT DVWA XSS (Reflected) — Exploiting Every Security Level wit... xss-bypass
Fri, 24 Jan 2025 00:08:47 GMT A majestic temple opportunity of wellbeing and wellness web-pentest
Thu, 11 Sep 2025 19:41:41 GMT Smol thm walkthrough lfi
Sun, 31 Aug 2025 20:22:03 GMT Mapping: A Complementary Step in Mobile Application Security pentest
Mon, 01 Sep 2025 06:53:22 GMT HTB-LAB Local File Inclusion (LFI) lfi, file-inclusion
Mon, 15 Sep 2025 19:18:31 GMT TryHackMe — Retro pentesting
Thu, 14 Aug 2025 10:42:04 GMT How I Found a Sensitive Data Exposure And PII in NASA’s EarthDa... bugcrowd
Sat, 16 Aug 2025 17:33:22 GMT PDF.JS Viewer Endpoint Dorking google-dorking, dorking, shodan, zoomeye
Tue, 24 Dec 2024 11:36:05 GMT Bug Bounty Journey — Valid Report 1 vdp
Sun, 10 Aug 2025 14:21:50 GMT How to Install and Configure OpenVAS on Kali Linux VM (with Admin... vulnerability-scanning
Sun, 13 Jul 2025 09:23:25 GMT Check for Subdomain Takeover in Symfony: Step-by-Step Guide subdomain-takeover
Sat, 20 Apr 2024 17:20:58 GMT TryHackMe — Brute Walkthrough | TheHiker log-poisoning
Sat, 09 Aug 2025 05:32:30 GMT لعبة ONE PIECE Bounty Rush | نصائح واستراتيجي... bounties
Mon, 11 Aug 2025 00:43:01 GMT The Authentication Evolution: How Bearer Tokens Solve API Keys’... api-key
Sun, 31 Aug 2025 23:41:13 GMT Advanced GitHub Recon for Sensitive Data Exposure (Like a Pro Bu... google-dork, recon
Tue, 03 Jun 2025 17:29:57 GMT How Hackers Help NASA Stay Secure: Inside the NASA VDP vdp
Mon, 26 May 2025 15:44:42 GMT File Upload Vulnerabilities file-inclusion
Wed, 02 Jul 2025 16:08:53 GMT 10 Best WordPress Directory and listing Themes in 2025 directory-listing
Wed, 03 Sep 2025 05:05:59 GMT How to Easily Generate Your Odoo API Key in 4 Simple Steps api-key
Sat, 23 Aug 2025 11:16:00 GMT Managed Vulnerability Scanning Services to Detect Problems Early ... vulnerability-scanning
Fri, 29 Aug 2025 22:16:47 GMT How Hackers Can Take Over a Company’s Subdomain (And How It Wor... subdomain-takeover
Mon, 21 Jul 2025 08:59:00 GMT How I learned about Subdomain takeover? subdomain-takeover
Wed, 03 Sep 2025 12:50:12 GMT The Problem with Web3 Rewards and How ORYX Solves It bounties
Sat, 16 Aug 2025 08:00:03 GMT A Beginner’s Guide to Google Dorking: Unlocking Hidden Web Data google-dorking
Thu, 27 Mar 2025 23:46:11 GMT Make Break and Betrayal web-pentest
Sat, 13 Sep 2025 13:37:41 GMT $1,500 Bounty: Business Logic Flaw in Project Secrets Management bugbounty-writeup
Tue, 26 Aug 2025 17:52:17 GMT TuesdayTool 33: Gui-Dorking: A Modern Approach to Google Dorking google-dork
Fri, 12 Sep 2025 05:20:36 GMT How Hackers Turn Upload Files For Gaining System Access remote-code-execution
Tue, 26 Aug 2025 21:51:57 GMT Ant Lab RWA Research Bounty — Call for Papers bounty-program
Sun, 17 Aug 2025 17:58:45 GMT $$$ How I Exploited a Business Logic Flaw to Slash Product Prices... bug-bounty-program
Sun, 31 Aug 2025 13:40:48 GMT O Impacto e a Mitigação de Insecure Direct Object Reference (ID... idor
Mon, 11 Dec 2023 18:17:01 GMT Exploiting a Log Poisoning. log-poisoning
Mon, 04 Aug 2025 22:03:49 GMT Roam Global eSIM Bounty Program bounty-program
Mon, 04 Aug 2025 02:17:48 GMT The Public Exposure Of Your AI Conversations: Some Facts google-dorking
Fri, 12 Sep 2025 08:34:53 GMT Digisol DG-GR1321 Router Vulnerability: Improper Access Control (... vulnerability-disclosure, cve
Wed, 13 Aug 2025 11:20:37 GMT Lo-Fi | TryHackMe — Write-Up local-file-inclusion
Mon, 04 Aug 2025 11:25:07 GMT ��♂� How I Bypassed the “Admin� Name Filter on exampl... recon
Wed, 27 Aug 2025 15:37:32 GMT Analyzing Malware Analysis for Secure Systems security-research
Mon, 15 Sep 2025 14:00:53 GMT Gmail OAuth Enforcement Bypass 100$ deal. bug-bounty-writeup
Wed, 10 Sep 2025 05:25:42 GMT Forensics: Collection of Links to know exploit
Sun, 14 Sep 2025 02:47:22 GMT Memahami “Scope� dalam CVSS v3.1 Menurut NIST pentest
Fri, 22 Aug 2025 21:35:55 GMT When a Valid Critical Goes Nowhere: Lessons from 14 Weeks in Immu... security-research
Thu, 28 Aug 2025 17:49:11 GMT From Shodan to SQLi: Hacking an Exposed Company Dashboard shodan
Wed, 30 Jul 2025 19:19:16 GMT Embarking on the Bug Bounty Journey: A Deep Dive into the Top Bug... bugcrowd
Wed, 10 Sep 2025 18:41:18 GMT The Silent Killer in Web Apps: SSRF Explained ssrf
Sun, 20 Jul 2025 18:02:47 GMT New in Town and Need a Makeup Artist? Here’s the Easiest Way to... directory-listing
Mon, 27 Jan 2025 16:51:28 GMT The man who suffered 11 years in hell for freedom has now been fr... web-pentest
Mon, 15 Sep 2025 11:49:24 GMT AI Powered Villager Pen Testing Tool Raises Concerns After 11,000... cybersecurity-tools
Mon, 01 Sep 2025 01:24:34 GMT Cloud-Native or Containerized? What Really Works for Pentest Deli... pentest
Wed, 16 Jul 2025 13:50:36 GMT Bug Bounties, Broken Promises bug-bounty-program
Sun, 07 Sep 2025 17:39:00 GMT Cross-API Vulnerability Chaining: From Misconfigured CORS to RCE ... rce
Fri, 06 Jun 2025 15:47:21 GMT ��♂� GitHub Dorking for Bug Bounty: Hackers' Hidden Playg... github-dorking
Sun, 14 Sep 2025 12:38:06 GMT Your npm install might be stealing your crypto exploit
Thu, 04 Sep 2025 09:54:05 GMT Using HTML as a ladder — ssrf
Sun, 07 Sep 2025 16:44:57 GMT Análise da Exposição de Ativos da Algar Telecom S/A Utilizando... shodan
Tue, 20 May 2025 08:43:46 GMT Second-Order Takeover: Scoring High Rewards! subdomain-takeover
Mon, 15 Sep 2025 16:39:47 GMT Her Şey Injection — SQLi web-security
Mon, 15 Sep 2025 13:52:06 GMT Don’t Waste Your Time on Social Media or Fake Online Course!: bug-bounty-tips
Tue, 09 Sep 2025 16:34:51 GMT Cybersecurity Tools — Selecting, Running Complex PoCs on, a... cybersecurity-tools
Fri, 12 Sep 2025 10:33:08 GMT Why You Should Never Hardcode Secrets in Your Code application-security
Mon, 21 Jul 2025 14:39:55 GMT $DORK Yield Generation for Maximum Returns on StakingRewards dorks
Thu, 28 Aug 2025 13:56:17 GMT From CSV Injection to Client-Side SSRF: A Real Bug Bounty Story security-research
Sun, 14 Sep 2025 11:57:53 GMT Auth Attacks Part xss-vulnerability
Sun, 17 Aug 2025 10:56:08 GMT WebSockets xss-bypass
Mon, 15 Sep 2025 18:41:56 GMT A Pesty Pest If There Ever Was One bugs
Mon, 30 Jun 2025 14:33:38 GMT ⚔� TryHackMe — Kenobi Walkthrough vulnerability-disclosure
Tue, 09 Sep 2025 09:26:24 GMT UMInk — A Different Take on Cloud Storage: Lower Cost, Plus... file-upload
Fri, 12 Sep 2025 22:11:41 GMT CVE-2025–56448: Replay Attack Vulnerability in Positron PX360BT... cve
Tue, 05 Aug 2025 14:50:11 GMT Root-Me: XSS — Stored 1 xss-bypass
Mon, 15 Sep 2025 03:55:49 GMT Why It’s Okay to Feel Dumb While Learning Programming bugs
Tue, 12 Aug 2025 07:59:14 GMT Exploiting a Mass Assignment API Vulnerability information-disclosure
Fri, 15 Aug 2025 19:10:32 GMT WordPress Plugin LFI Code Review local-file-inclusion
Thu, 11 Sep 2025 11:51:17 GMT How Pattern Recognition Led to a Critical IDOR in a Public Portal idor
Mon, 03 Mar 2025 19:57:38 GMT Bug Bounty Hunting with Censys: Finding an Unsecured Elasticsearc... censys
Mon, 15 Sep 2025 16:59:21 GMT A Web Application Security Assessment of Vuln-Bank (Part 2) xss-attack
Fri, 29 Aug 2025 12:24:25 GMT Reflections from the Field: Why Web Storage Is a Goldmine on Our ... cross-site-scripting
Fri, 05 Sep 2025 14:55:29 GMT Hacking WordPress hackerone
Wed, 09 Apr 2025 00:45:00 GMT Bug Bounty Journey — Valid Report Part 5 vdp
Thu, 21 Aug 2025 14:17:42 GMT Information Disclosure information-disclosure
Sun, 07 Sep 2025 19:40:01 GMT My Journey to Becoming an INE Junior Penetration Tester (eJPT) Ce... vapt
Thu, 11 Sep 2025 18:02:01 GMT El mejor camino para entrar es entender por qué otros no lo ven bugbounty-writeup, bug-bounty-hunter
Fri, 22 Aug 2025 07:15:42 GMT What have I been doing lately? bugcrowd
Tue, 09 Sep 2025 15:51:12 GMT The Bug Bounty Hunter Begins bug-bounty-hunter
Sat, 06 Sep 2025 08:24:55 GMT Flatline TryHackMe Walkthrough — Complete Step-by-Step Guid... rce
Thu, 14 Aug 2025 10:54:38 GMT Unlocking the Hidden Power of Search Engines censys
Sat, 21 Jun 2025 13:44:14 GMT Subdomain Takeover Made Easy: How to Detect Vulnerabilities Using... subdomain-takeover
Mon, 18 Aug 2025 14:20:43 GMT Server-side Template Injection with Information Disclosure via Us... information-disclosure
Mon, 08 Sep 2025 19:54:39 GMT Top 7 Tools Every Ethical Hacker Must Master cybersecurity-tools
Fri, 08 Aug 2025 17:59:47 GMT TryHackMe File Inclusion Challenge walkthrough. file-inclusion
Sun, 17 Aug 2025 19:26:05 GMT ï·½ bug-bounty-program
Mon, 15 Sep 2025 17:00:48 GMT I Cracked a JWT Secret and Became Admin application-security
Sun, 31 Aug 2025 17:24:40 GMT When Access Control Fails: Local File Inclusion ($100–$500) local-file-inclusion
Wed, 10 Sep 2025 02:42:08 GMT Hacking Minds with Ansh Bhawanani— The BSides Weekly [S1E8] vapt
Fri, 12 Sep 2025 05:31:53 GMT picoCTF 2024: Trickster file-upload
Mon, 11 Aug 2025 07:01:28 GMT Bugcrowd’s Blackhat USA CTF — Writeup bugcrowd
Fri, 05 Sep 2025 03:40:14 GMT Top Tools for White-Box Penetration Testing: A Comprehensive Guid... cybersecurity-tools
Fri, 01 Aug 2025 06:17:06 GMT 15,000 Critical Systems Are Exposed — Thanks to This Outdat... censys
Tue, 05 Aug 2025 07:25:48 GMT CXF Service List Endpoint Recon dorking, zoomeye
Wed, 23 Jul 2025 15:15:01 GMT TryHackMe Include walkthrough: SSRF, log poisoning & LFI2RCE, wit... log-poisoning
Fri, 31 May 2024 13:29:16 GMT Map of the worlds best URLs 2025 log-poisoning
Mon, 11 Aug 2025 22:05:30 GMT Up and Running with GitHound for secret scanning in 5 minutes recon
Sat, 13 Sep 2025 18:01:45 GMT Bug Bounty: Lo que se automatiza sin entender, no se encuentra de... bugbounty-writeup, bug-bounty-hunter
Mon, 04 Aug 2025 05:56:23 GMT Google dorking/Hacking google-dorking
Mon, 15 Sep 2025 15:30:13 GMT Common Smart Contract Vulnerabilities in 2025: Reviewing Recent V... exploit
Fri, 12 Sep 2025 17:57:42 GMT Portswigger Web Cache Poisoning Labs — Expert web-cache-poisoning
Mon, 25 Aug 2025 02:27:12 GMT DursGo — The Go-Powered Web Application Scanner vulnerability-scanning
Tue, 12 Aug 2025 17:24:22 GMT How I Removed Other User`s Uploaded Images in a Few Clicks bug-bounty-program
Tue, 26 Aug 2025 12:23:46 GMT Information Disclosure: The Hidden Risks in Web Applications information-disclosure
Mon, 04 Aug 2025 20:17:00 GMT Session Fixation in Vvveb CMS v1.0.6.1 vulnerability-disclosure
Tue, 26 Aug 2025 12:10:13 GMT VulnHub: DC 9 Writeup local-file-inclusion
Thu, 17 Jul 2025 06:15:20 GMT Unlock Exclusive BOUNTY Through ChainBounty's Community Drop bounties
Thu, 11 Sep 2025 22:11:33 GMT Server-Side Request Forgery (SSRF) Explained: From Basics to Adva... ssrf
Mon, 15 Sep 2025 22:48:43 GMT Alpine Linux + Docker on Proxmox: Lightweight DVWA Lab Setup for ... web-security
Sat, 13 Sep 2025 11:50:06 GMT How I Discovered a Reflected XSS on the MOD UK Police Website (WA... xss-attack
Fri, 12 Sep 2025 14:42:34 GMT Hacking Jira hackerone
Wed, 03 Sep 2025 13:06:48 GMT The Overlooked Side of Bug Bounties: Hidden Vulnerabilities Begin... hackerone, bugcrowd
Fri, 05 Sep 2025 15:36:40 GMT Subzy and the Case of the False Positive: Why Manual Validation M... cybersecurity-tools
Wed, 03 Sep 2025 03:00:25 GMT à¸�ารทำ Pentest ต่างà¸�ับ VA อย่างà... pentest
Sat, 30 Aug 2025 16:00:09 GMT SSRF hackerone, ssrf
Fri, 29 Aug 2025 16:06:16 GMT CVE-2018–25115: D-Link Routers RCE — Your Router’s Wide... rce
Sun, 14 Sep 2025 22:11:54 GMT How Freestyle Thinks About Security, Auditing, and Best Practices... remote-code-execution
Tue, 09 Sep 2025 10:14:01 GMT The Psychology of Listings: Why Users Trust Some Directories More... directory-listing
Fri, 12 Sep 2025 07:13:23 GMT Crypto Airdrops vs. Bounty Programs in 2025: What’s the Best? bounty-program
Fri, 01 Aug 2025 08:47:59 GMT What is Google Dorking / Google Hacking?(Google Dorking à¶šà·’à¶... google-dork
Tue, 09 Sep 2025 15:32:29 GMT Bunni, Numa, Woo X: $22.7M Lost to Rounding Bugs, Forced Liquidat... exploit
Wed, 27 Aug 2025 15:39:22 GMT Analyzing Malware Analysis in the Digital Era security-research
Mon, 25 Aug 2025 08:37:01 GMT What is XXS? cross-site-scripting
Thu, 14 Aug 2025 10:08:18 GMT Predictive Analytics and Voice Technology: A Winning Combination ... vdp
Sat, 06 Sep 2025 04:02:21 GMT Top Cybersecurity Threats Businesses Face in 2025 (And How to Def... vapt
Thu, 14 Aug 2025 12:22:26 GMT Penetrasyon Testi - Servis Tarama ve Açıkların Tespiti vulnerability-scanning
Wed, 27 Aug 2025 13:35:15 GMT Secure Code Analysis: A04 — Insecure Direct Object Referenc... idor
Thu, 04 Sep 2025 15:28:23 GMT � Linux Kernel Security & Exploitation Resources pentest
Thu, 14 Aug 2025 20:22:41 GMT Reverse engineering Authy: the open source method for exporting y... security-research
Wed, 10 Sep 2025 07:20:18 GMT How I Got an Unexpected Bounty from REDETECT.com bugbounty-writeup
Tue, 26 Aug 2025 04:38:54 GMT Why Most Directory Websites Fail (and How to Make Yours Succeed) directory-listing
Mon, 15 Sep 2025 06:04:36 GMT Healthcheck in the Wild — How an Unauthenticated Endpoint ... bugbounty-writeup, bug-bounty-writeup
Sun, 20 Jul 2025 18:28:50 GMT Security Misconfiguration — Sensitive Data Exposure via Goo... google-dork
Tue, 05 Aug 2025 17:19:44 GMT Bug Bounty Hunting — Are Self Hosted Programs Any Better? bug-bounty-hunting
Mon, 08 Sep 2025 10:50:42 GMT Continuous Threat Exposure Management: Why It Matters and How to ... pentest
Sun, 14 Sep 2025 14:10:27 GMT Can Bug Bounty Hunting Make One A Millionaire? bug-bounty-hunter, bug-bounty-hunting
Wed, 06 Aug 2025 18:09:04 GMT Making dorks from HTML Comment dorking
Tue, 05 Aug 2025 10:07:40 GMT 25 Hidden Google Dorks for 2025 Bug Bounty Hunters: Real Targets... google-dork
Wed, 03 Sep 2025 16:54:31 GMT CVE-2025–53772: The Silent Risk in Microsoft Web Deploy remote-code-execution
Thu, 04 Sep 2025 13:24:08 GMT Six Network Scanners Rewiring Hybrid-Cloud Security (What Your Ol... vulnerability-scanning
Thu, 13 Feb 2025 03:29:37 GMT ZoomEye Meets DeepSeek: AI-Powered Cyberspace Intelligence zoomeye
Tue, 09 Sep 2025 13:11:39 GMT DNS Exfiltration Explained exploit
Wed, 10 Sep 2025 13:23:56 GMT Handling File Uploads & Downloads in Spring Boot file-upload
Thu, 28 Aug 2025 10:59:34 GMT Cross-Site Scripting cross-site-scripting
Mon, 24 Feb 2025 21:37:57 GMT CÓMO DESCUBR� UNA VULNERABILIDAD XSS EN UN PROGRAMA VDP vdp
Wed, 16 Jul 2025 10:29:09 GMT Google Dorking My Way Out of Exam Stress (And Into the Hall of Fa... vulnerability-disclosure
Thu, 15 Feb 2024 14:36:19 GMT Github Dorking: A Beginner’s Guide to Finding Secrets in Reposi... github-dorking
Thu, 28 Sep 2023 23:05:39 GMT Archangel — TryHackMe log-poisoning
Sat, 19 Jul 2025 19:59:42 GMT Snag Exclusive BOUNTY Through ChainBounty's Launch Bonus bounties
Sat, 13 Sep 2025 10:43:26 GMT Understanding Exploit Kits: Cyber Security Details exploit
Tue, 05 Aug 2025 00:19:11 GMT Breaking Recon with AMASS subdomain-enumeration
Sat, 16 Aug 2025 20:21:41 GMT My first serious security vulnerability report security-research
Sat, 26 Jul 2025 06:55:47 GMT Capture Exclusive RECON Through Recon Solana's Bonus Rollout recon
Sat, 06 Sep 2025 06:32:44 GMT Is Your API Key Alive or Dead? — Validate in Minutes with S... api-key
Wed, 10 Sep 2025 07:42:35 GMT When WordPress Errors Leak Too Much: Lessons From a Real-World C... information-disclosure
Thu, 04 Sep 2025 14:14:52 GMT Vulnerability Disclosure Challenges in Open Source Projects vulnerability-disclosure
Sat, 26 Jul 2025 11:23:52 GMT Breaking Filter: XSS Bypass using ononmouseovermouseover, ONMOUSE... xss-bypass
Mon, 15 Sep 2025 19:51:35 GMT Earn More with BUG BUG by following this step-by-step guide. bugs
Sat, 13 Sep 2025 14:47:43 GMT Bridging the Gap: My Journey with copilot-security-instructions application-security
Thu, 11 Sep 2025 12:20:45 GMT What is OWASP, and the OWASP Top 10 vapt
Tue, 02 Sep 2025 04:16:27 GMT API7:2023 — Server-Side Request Forgery: API’yi İç Sist... ssrf
Sun, 14 Sep 2025 07:55:54 GMT “Stop Being a Script Kiddie: Rethink Your Recon� cve
Mon, 08 Sep 2025 12:30:17 GMT API Key Vs. OAuth — How to Choose the best Authentication api-key
Thu, 11 Sep 2025 22:20:14 GMT It’s Coming: DorkFi Delivers PreFi Rewards Surge dorking
Mon, 15 Sep 2025 03:51:56 GMT 0day Vulnerability Found in nginxWebUI: Remote Code Execution (RC... rce
Tue, 08 Jul 2025 20:49:53 GMT UpDown-Linux-Medium file-inclusion
Mon, 15 Sep 2025 07:09:27 GMT Top 5 SSL issues to understand (and avoid) web-security
Mon, 04 Aug 2025 14:37:56 GMT Hi Researcher! bugcrowd
Fri, 29 Aug 2025 12:31:38 GMT 2025’s Top Automated Reconciliation Systems for Seamless Financ... recon
Sat, 16 Aug 2025 00:42:40 GMT Announcing the NewBitcoin “Drive & Earnâ€� Bounty Campaign â€... bounty-program, bounties
Mon, 08 Sep 2025 04:10:15 GMT Cloud Security: Design Principles and Tools for a Safer Cloud cybersecurity-tools
Mon, 15 Sep 2025 14:29:34 GMT Lab: Stored XSS into onclick event with angle brackets and double... xss-attack, xss-vulnerability
Sun, 14 Sep 2025 18:14:51 GMT Understanding Cross-Site Scripting (XSS) Vulnerabilities cross-site-scripting
Fri, 05 Sep 2025 05:10:06 GMT Why Big Tech Pays Millions for Bugs (And How You Can Too) hackerone
Wed, 10 Sep 2025 21:14:45 GMT Kittens and Code: Google Dorks for Ethical Hackers google-dorking, google-dork, dorks
Wed, 03 Sep 2025 06:15:55 GMT ThunderCipher-[Unleashing the Shell 1] remote-code-execution
Fri, 05 Sep 2025 11:31:39 GMT SSRF (Server-Side Request Forgery) Vulnerabilities ssrf
Sun, 14 Sep 2025 14:53:26 GMT The Bug Behind the Delete Button: How I Found a Critical IDOR idor
Mon, 15 Sep 2025 15:55:02 GMT How a Shared Upload URL Let Me Take Over qaAccounts bug-bounty-tips, bugs, bug-bounty-writeup
Sun, 24 Aug 2025 20:18:55 GMT How I found an Account Lockout Vulnerability Without Any Tools bug-bounty-program
Wed, 13 Aug 2025 13:14:30 GMT How to Find Any Information Using Google Dorking in 2025 google-dorking
Fri, 22 Aug 2025 05:00:23 GMT Step-by-Step: Exploiting LFI to Gain Shell Access (CTF Walkthroug... lfi
Sun, 13 Jul 2025 16:21:12 GMT Why Listing Your Business in a Tribe-Centered Directory Like Unit... directory-listing
Wed, 29 Jan 2025 17:20:22 GMT The $500 Vulnerability: How Censys Search Led Me to a Quick Bug B... censys
Mon, 07 Jul 2025 05:15:45 GMT ZoomEye Dorking | Advanced OSINT zoomeye
Tue, 12 Aug 2025 00:00:51 GMT Protect and Safeguard Mobile API Keys api-key
Sun, 24 Aug 2025 21:07:03 GMT Google Is Still Leaking Your Secrets in 2025 — Here’s the... google-dork
Tue, 09 Sep 2025 03:46:02 GMT Apache RocketMQ RCE (CVE-2023–37582): Are Your Servers Still Ex... rce
Tue, 05 Aug 2025 14:43:56 GMT Web Security — SMT Program 2025 Write-up local-file-inclusion
Mon, 01 Sep 2025 07:28:34 GMT Dursgo v 1.1.0 : AI-Powered Analysis vulnerability-scanning
Mon, 28 Apr 2025 18:22:07 GMT Local File Inclusion (LFI) vs Remote File Inclusion (RFI) file-inclusion
Tue, 02 Sep 2025 12:31:37 GMT How Reconciliation Software Supports Real-Time Financial Visibili... recon
Fri, 11 Jul 2025 03:48:37 GMT Why the FOFA dorking is so important dorking
Sat, 13 Sep 2025 18:57:47 GMT How I hacked the Placement portal of my college to leak the entir... information-disclosure
Thu, 11 Sep 2025 18:02:16 GMT One Click Account Takeover: how an insecure password-reset flow +... vulnerability-disclosure
Thu, 11 Sep 2025 12:31:40 GMT Search Exploit Like Real Hackers.. exploit
Fri, 01 Aug 2025 12:09:09 GMT Advanced Google Dorking | Part 19 google-dork
Fri, 24 Jan 2025 09:34:52 GMT A new Holistic temple opening InLeeds web-pentest
Tue, 09 Sep 2025 01:26:09 GMT Web Cache Poisoning via Fat GET Requests: Exploiting Cache Key Fl... web-cache-poisoning
Sun, 14 Sep 2025 03:36:18 GMT How Capture the Flag (CTF) Prepares You for Bug Bounty Hunting bounty-program
Thu, 11 Sep 2025 04:39:49 GMT Subdomain Takeover: Quick-Check Cheat sheet for Security Testing bugbounty-writeup
Fri, 12 Sep 2025 06:22:26 GMT Siber Güvenlikte En Çok Kullanılan Araçlar: Ağ, Uygulama, B... application-security
Sat, 13 Sep 2025 14:10:34 GMT Lab: Reflected XSS into a JavaScript string with angle brackets a... xss-attack, xss-vulnerability, xss-bypass
Sun, 17 Aug 2025 16:49:46 GMT Mastering Google Dorking: Search Operators for Deep Recon & Bug B... google-dorking
Sat, 01 Feb 2025 06:10:16 GMT How to Create Advanced Custom Wordlist? Dive into Recon Part 4 subdomain-enumeration
Sat, 13 Sep 2025 18:43:55 GMT How I Found a Critical IDOR Leading to Full Account Takeover and ... idor
Mon, 04 Aug 2025 21:44:20 GMT The 2025 GitHub Recon Checklist for Bug Bounty Hunters recon
Wed, 09 Jul 2025 01:02:19 GMT Start with VDPs Before Aiming for Private Bug Bounty Programs vdp
Wed, 10 Sep 2025 02:15:11 GMT URL Normalization Turns a Harmless Request into a Cache-Poisoned ... web-cache-poisoning
Wed, 12 Feb 2025 22:46:35 GMT https://www.express.co.uk/life-style/property/2012927/cleaning-ch... web-pentest
Fri, 12 Sep 2025 02:17:34 GMT Install and Explore Kali Linux exploit
Sat, 09 Aug 2025 10:30:07 GMT Vault Fault Exposes Critical Logic Flaws in CyberArk and HashiCor... remote-code-execution
Thu, 11 Sep 2025 22:12:34 GMT ��♂� TryHackMe Team local-file-inclusion
Sat, 13 Sep 2025 10:31:42 GMT When URLs Betray You: The Security Risk of IDOR idor
Sun, 22 Jun 2025 12:31:36 GMT � Day 5/30 Google Dorking: The Hacker’s Open Secret for Findi... dorking
Fri, 05 Sep 2025 08:48:16 GMT Bridging the Gap Between Vulnerability Scanning and Remediation vulnerability-scanning
Sun, 14 Sep 2025 20:22:00 GMT The Indexing Bug That Only Shows Up in Rust Database Layers bugs
Sat, 23 Aug 2025 17:01:05 GMT Cross-Site Scripting (XSS) Vulnerability in a Plain-View cross-site-scripting
Thu, 11 Sep 2025 19:28:19 GMT Google Dorking Tricks: Uncovering Hidden Risks on the Web google-dorking
Mon, 07 Jul 2025 14:05:53 GMT Google Dorking dorking
Sat, 23 Aug 2025 23:42:37 GMT Smol | Tryhackme Walkthrough local-file-inclusion
Tue, 15 Jul 2025 18:57:57 GMT ZoomEye Dorking | JSON Endpoints zoomeye
Sun, 06 Jul 2025 07:51:30 GMT ZoomEye Dorking for API Keys zoomeye
Thu, 21 Aug 2025 19:05:59 GMT Cracking GeneQuest: Two Critical Bugs and My 19th Place Finish at... vulnerability-disclosure, bug-bounty-hunting
Mon, 14 Jul 2025 09:25:40 GMT La importancia de los directorios locales en el SEO directory-listing