Skip to content

rix4uni/medium-writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

44,154 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Time Title Feed IsNew IsToday
Fri, 27 Feb 2026 20:59:38 GMT Cross-Site Scripting (XSS) Attack Lab: A Hands-On Journey Through... penetration-testing, ethical-hacking Yes Yes
Fri, 27 Feb 2026 20:58:32 GMT SRUM-DUMP v3: A Practical Guide to Windows Forensics with the New... information-security Yes Yes
Fri, 27 Feb 2026 20:41:28 GMT UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Back... cybersecurity Yes Yes
Fri, 27 Feb 2026 20:24:51 GMT The First Crucial Step to Secure AI cybersecurity Yes
Fri, 27 Feb 2026 20:03:48 GMT Cybersecurity Bootcamp Week 2 : Advent of The Relics 1 cybersecurity Yes
Fri, 27 Feb 2026 16:06:28 GMT A New Era of Passwords: Designed, Not Typed cyber-security-awareness Yes
Fri, 27 Feb 2026 19:27:59 GMT The Linux Security Journey — SSH Password based Authentication security, information-security Yes
Fri, 27 Feb 2026 16:31:19 GMT The Price for Intelligence information-technology Yes
Fri, 27 Feb 2026 09:52:50 GMT How AI Helped Me Fix Angular Bugs 5x Faster bugs Yes
Fri, 27 Feb 2026 17:45:10 GMT The Digital Battlefield: A Student’s Guide to Ethical Hacking a... cyber-security-awareness Yes
Fri, 27 Feb 2026 12:14:21 GMT Quantum Computers Will Break the Internet’s Locks cyber-security-awareness Yes
Fri, 27 Feb 2026 16:31:39 GMT APT3 vs APT29: A Comparative Cyber Threat Intelligence Analysis U... information-security, ethical-hacking Yes
Fri, 27 Feb 2026 16:57:00 GMT Lab: Basic server-side template injection (code context) | PortS... bug-bounty, web-security, pentesting Yes
Fri, 27 Feb 2026 13:17:41 GMT Recognition and enumeration: the true power of the hacker who und... pentesting Yes
Fri, 27 Feb 2026 12:45:01 GMT Understanding IDOR (Insecure Direct Object Reference) infosec, web-security, vapt Yes
Fri, 27 Feb 2026 20:14:13 GMT I Roasted a Service Account and Walked Out with the Whole Domain:... cybersecurity, penetration-testing, ethical-hacking Yes
Fri, 27 Feb 2026 19:19:45 GMT Setting up OWASP BLT on the go! Fast and Free. hacking Yes
Fri, 27 Feb 2026 11:38:23 GMT Cap Htb Writeup pentesting Yes
Fri, 27 Feb 2026 18:16:21 GMT Safety by Ignorance vs Safety by Understanding: What the Claudeâ€... security Yes
Fri, 27 Feb 2026 17:37:23 GMT Beyond Web Apps: A Complete Guide to Thick Client Application Sec... penetration-testing Yes
Fri, 27 Feb 2026 17:48:14 GMT Try Hack Me- HTTP in Detail Walkthrough penetration-testing Yes
Fri, 27 Feb 2026 17:26:37 GMT The Ultimate TryHackMe Roadmap: Don’t Start Your Cybersecurity ... infosec Yes
Fri, 27 Feb 2026 12:35:54 GMT OpenClaw: What I Learned Hardening a 3-Month-Old AI System That B... infosec Yes
Fri, 27 Feb 2026 02:15:13 GMT 15 JavaScript Tricks That Make Your Code Slower bugs Yes
Fri, 27 Feb 2026 18:54:57 GMT Remote Code Execution in Offline Hospital Management System (CVE-... bug-bounty, infosec, cve Yes
Fri, 27 Feb 2026 18:55:47 GMT A World Without Cybersecurity in the Age of Generative AI cyber-security-awareness Yes
Fri, 27 Feb 2026 09:01:04 GMT I Checked 10 Random Companies for Leaked Credentials. All 10 Were... infosec Yes
Fri, 27 Feb 2026 14:53:53 GMT ChatGPT Ads Are Here — Why They’re More Dangerous Than Search... cyber-security-awareness Yes
Fri, 27 Feb 2026 18:10:31 GMT Introducing Me vulnerability Yes
Fri, 27 Feb 2026 19:08:00 GMT Consistent Bug Bounty Income Is Not About Finding More Bugs — H... bug-bounty, bug-bounty-tips Yes
Fri, 27 Feb 2026 20:19:08 GMT Membedah Arsitektur MCP: Komponen dan Layer Protokol cybersecurity Yes
Fri, 27 Feb 2026 19:43:53 GMT ‘Not For Human Consumption’ label on Groceries information-disclosure Yes
Fri, 27 Feb 2026 20:17:24 GMT PortSwigger Access Control Vulnerabilities Lab Notes bug-bounty, web-security Yes
Fri, 27 Feb 2026 16:06:57 GMT TryHackMe | Compiled — Write-Up hacking Yes
Fri, 27 Feb 2026 11:55:00 GMT Forbidden Paths-picoCTF infosec Yes
Fri, 27 Feb 2026 11:06:56 GMT Why is the “Update� Button The Most Dangerous Attacker? (Chan... infosec Yes
Fri, 27 Feb 2026 19:08:09 GMT Most Beginner Bug Bounty Hunters Never Turn Pro — Here’s the ... bug-bounty, bug-bounty-tips Yes
Fri, 27 Feb 2026 13:53:30 GMT Road to Comptia PenTest+ (PT0–003): Tactical Playbook penetration-testing Yes
Fri, 27 Feb 2026 12:53:18 GMT Contact McAfee Customer Service UK information-technology Yes
Fri, 27 Feb 2026 20:16:09 GMT Monitoramento de domínios suspeitos security, cybersecurity Yes
Fri, 27 Feb 2026 17:01:01 GMT Cybersecurity Awareness Scenario #2 hacking Yes
Fri, 27 Feb 2026 15:50:24 GMT Exploiting an Exported Android Activity via Intent Injection bug-bounty, hacking, bug-bounty-writeup Yes
Fri, 27 Feb 2026 13:05:44 GMT stuck in maybe vulnerability Yes
Fri, 27 Feb 2026 17:42:40 GMT Threat Actors Build an Active Phishing Empire Targeting Ghana’s... hacking Yes
Fri, 27 Feb 2026 18:43:29 GMT The Difference Between a Hardware Bug and a Hardware Backdoor security Yes
Fri, 27 Feb 2026 13:21:57 GMT xZeroProtect: A File-Based PHP Firewall With No External Dependen... web-security Yes
Fri, 27 Feb 2026 05:58:57 GMT From SSRF to AWS Pwnage: A Hacker’s Guide to Cloud-Native Expl... bug-bounty-tips, hackerone, bug-bounty-writeup Yes
Fri, 27 Feb 2026 16:52:06 GMT ��� Timelapse — One Certificate. Full Compromise bug-bounty, hacking, bug-bounty-tips, ethical-hacking Yes
Fri, 27 Feb 2026 19:56:04 GMT Luxury Home Security: Protecting Your Estate Without Compromising... security Yes
Fri, 27 Feb 2026 16:00:28 GMT Preparing for a Panel of Technical Interviews information-technology Yes
Fri, 27 Feb 2026 15:37:33 GMT From Student to Ethical Hacker: My 2026 Journey Into Cybersecurit... infosec, ethical-hacking Yes
Fri, 27 Feb 2026 13:57:36 GMT Information Gathering in Web Security Testing: The Initial Stage ... web-security Yes
Fri, 27 Feb 2026 09:23:38 GMT WP-Hunter: Smarter WordPress Recon with Heuristic Scoring + Semgr... bugbounty-writeup Yes
Fri, 27 Feb 2026 07:19:11 GMT WHAT IS DNS AND WHAT IS ITS ROLE IN THE WORKING OF THE WEB? application-security Yes
Fri, 27 Feb 2026 18:56:32 GMT Why Cyber Investigation Matters More Than Ever information-security Yes
Fri, 27 Feb 2026 14:39:39 GMT Designing a Data-Driven IT Performance Dashboard as a Systems Adm... information-technology Yes
Fri, 27 Feb 2026 09:52:32 GMT How to Connect & Use Burp MCP with Antigravity? security-research Yes
Fri, 27 Feb 2026 16:25:13 GMT The bus just left, and it’s okay vulnerability Yes
Fri, 27 Feb 2026 11:52:14 GMT AI-Driven Penetration Testing with Kali Linux & Claude — Part 1... pentesting Yes
Fri, 27 Feb 2026 10:02:48 GMT Best Cybersecurity Service Company in India (2026) vapt Yes
Fri, 27 Feb 2026 14:47:25 GMT funboxeasy walkthrough (Educational & Defensive Analysis) vulnerability, information-security Yes
Fri, 27 Feb 2026 20:09:56 GMT Prevenção a Fraudes na Black Friday cybersecurity Yes
Fri, 27 Feb 2026 10:49:14 GMT � Leveling Up: Web Security Essentials web-security Yes
Fri, 27 Feb 2026 14:01:01 GMT Don’t You Want Someone? The Exhausting Truth About Trying to Mo... vulnerability Yes
Fri, 27 Feb 2026 09:03:06 GMT DockerLabs Writeup — Fooding (Spanish) pentesting Yes
Fri, 27 Feb 2026 14:21:31 GMT Mitigating Zero-Day Impact with Runtime Enforcement cve Yes
Fri, 27 Feb 2026 13:28:14 GMT Paywall Bypass: How Client-Side Trust Led to a Free Premium Upgra... vulnerability Yes
Fri, 27 Feb 2026 15:54:33 GMT Ransomware Is a Billion-Dollar Industry information-security Yes
Fri, 27 Feb 2026 17:19:47 GMT Tech#53 — NextSaaS: “Would Your SaaS Pass a Security Audit? (... security Yes
Fri, 27 Feb 2026 17:53:43 GMT “Any lawful use� meets data fusion: why Anthropic drew a line information-security Yes
Fri, 27 Feb 2026 19:56:56 GMT I Thought I Understood Computers… Until I Opened One information-technology Yes
Fri, 27 Feb 2026 08:45:30 GMT JWT Authentication Bypass Using HackUtils — PortSwigger Lab Wal... pentesting Yes
Fri, 27 Feb 2026 14:42:15 GMT CVE-2026–21522 | Microsoft ACI Confidential Containers Elevati... vulnerability, cve Yes
Fri, 27 Feb 2026 12:15:13 GMT Threat Intelligence in Incident Response: Turning Data into Actio... cyber-security-awareness Yes
Fri, 27 Feb 2026 00:44:16 GMT Walkthrough: Web Application Attacks - XSS, SQL Injections, Direc... local-file-inclusion Yes
Fri, 27 Feb 2026 13:18:20 GMT Information disclosure in version control history | Portswigger ... web-security, information-disclosure Yes
Fri, 27 Feb 2026 16:27:42 GMT IPv6 Is Not Just Bigger Addresses — It Quietly Fixes 40 Years o... information-security Yes
Fri, 27 Feb 2026 11:36:00 GMT The $2.3 Million Lesson Hidden in 14 Lines of Code bugbounty-writeup, cyber-security-awareness Yes
Fri, 27 Feb 2026 09:06:00 GMT Investigasi Forensik Digital: Membongkar Forum Kriminal Dalam Ope... infosec Yes
Fri, 27 Feb 2026 01:50:41 GMT 9 JavaScript Patterns That Reduce Bugs Before They Exist bugs Yes
Fri, 27 Feb 2026 16:42:02 GMT Linux Kernel Exploitation for Beginners: Arbitrary Function Point... exploit Yes
Fri, 27 Feb 2026 17:23:08 GMT Broken Access Control: From IDOR to Privilege Escalation bug-bounty, web-security Yes
Fri, 27 Feb 2026 14:11:24 GMT Top Cybersecurity Solutions for Small Businesses cyber-security-awareness Yes
Fri, 27 Feb 2026 18:28:06 GMT Digital Rights in the Modern Era: Why Policy Matters More Than Ev... information-technology Yes
Fri, 27 Feb 2026 18:19:07 GMT Wizer #61 Write Up penetration-testing, information-security Yes
Fri, 27 Feb 2026 16:08:28 GMT CVE-2025–55182 (React2Shell): Vulnerable Docker Container with ... bug-bounty Yes
Fri, 27 Feb 2026 13:31:13 GMT McAfee Customer Service Australia information-technology Yes
Fri, 27 Feb 2026 19:03:53 GMT Compliance Theater Presents: The Phantom of the Audit security, cyber-security-awareness Yes
Fri, 27 Feb 2026 14:09:31 GMT Top Cybersecurity Solutions for Small Businesses cyber-security-awareness Yes
Fri, 27 Feb 2026 20:06:30 GMT The Mission Layer [1/4]: Every AI Defense Broke. The Pattern Te... security, cybersecurity Yes
Fri, 27 Feb 2026 08:42:20 GMT How I Bypassed Email Verification on a Bug Bounty Target Using Ju... bug-bounty-writeup Yes
Fri, 27 Feb 2026 20:41:00 GMT INE-Web Application Penetration Testing CTF 1 by Singkhon cybersecurity, penetration-testing Yes
Fri, 27 Feb 2026 08:02:41 GMT Beyond the Trigger: Uncovering SSRF in Azure Functions ssrf Yes
Fri, 27 Feb 2026 09:30:45 GMT HTB: Era rce, idor Yes
Fri, 27 Feb 2026 11:32:06 GMT Day 9 — Breaking Login With a Single Quote (SQL Injection ... pentesting, vapt Yes
Fri, 27 Feb 2026 18:31:07 GMT Bug Bounty in 2026: Look for these Bugs! bug-bounty, bug-bounty-tips, bugbounty-writeup Yes
Fri, 27 Feb 2026 00:06:02 GMT Exploiting HTTP request smuggling to bypass front-end security co... pentesting Yes
Fri, 27 Feb 2026 15:23:13 GMT Read Team penetration-testing Yes
Fri, 27 Feb 2026 16:35:35 GMT How the Xbox Was Hacked in the 2000s — And Why the Lessons Stil... hacking Yes
Fri, 27 Feb 2026 17:45:46 GMT Authentication & Authorization: A Practical Guide for Web Develop... security Yes
Fri, 27 Feb 2026 18:02:22 GMT Learning Exploit Active Directory penetration-testing Yes
Fri, 27 Feb 2026 17:01:58 GMT The first feedback at work and how it taught me a lesson to never... information-technology Yes
Fri, 27 Feb 2026 18:36:47 GMT Mexican Government Data Exposed in AI-Assisted Cyberattack security, hacking Yes
Fri, 27 Feb 2026 13:03:46 GMT Contact AVG Customer Service UK information-technology Yes
Fri, 27 Feb 2026 18:12:18 GMT CSP and CORS in Modern Web Applications web-security Yes
Fri, 27 Feb 2026 15:16:31 GMT Solving a Bugforge Challenge — Exploiting JWT Forging in Sokudo ethical-hacking Yes
Fri, 27 Feb 2026 17:11:32 GMT vtrains:This is a control panel based on Whisper. hacking, pentesting Yes
Fri, 27 Feb 2026 13:47:09 GMT The Chapter You Almost Cut vulnerability Yes
Fri, 27 Feb 2026 07:11:35 GMT Weekly Threat Intelligence Report 16 Feb 2026 infosec Yes
Fri, 27 Feb 2026 19:16:32 GMT Wordpress: CVE-2021–29447 (THM) Tryhackme Write-Up With Answer vulnerability, hacking Yes
Fri, 27 Feb 2026 10:31:03 GMT WebStrike Lab Write-Up: Investigating a Web Shell Attack Using Wi... web-security Yes
Fri, 27 Feb 2026 19:16:00 GMT File security and structured document management are critical for... file-upload Yes
Fri, 27 Feb 2026 17:00:51 GMT We learned that ethical hacking is not about breaking systems for... ethical-hacking Yes
Fri, 27 Feb 2026 18:17:37 GMT TryHackMe -Room Team Writeup ethical-hacking Yes
Fri, 27 Feb 2026 15:53:32 GMT Next.js Feels Mature, and That Comes With TradeOffs vulnerability Yes
Fri, 27 Feb 2026 20:24:11 GMT SQL Injection Attack Lab: A Hands-On Journey Through Database Exp... cybersecurity, penetration-testing, ethical-hacking Yes
Fri, 27 Feb 2026 17:03:28 GMT PRISM’den Algoritmalara: Sosyal Medya Bir Gözetim Aracı mı? information-technology, information-security Yes
Fri, 27 Feb 2026 17:43:45 GMT The Rise of Agentic AI: Why Automated Pentesting Is Our Best Defe... ethical-hacking Yes
Wed, 12 Feb 2025 22:46:35 GMT https://www.express.co.uk/life-style/property/2012927/cleaning-ch... web-pentest
Thu, 18 Sep 2025 05:45:26 GMT Data Accuracy in Directory Websites: Why Clean Listings = Loyal U... directory-listing
Wed, 09 Jul 2025 05:05:20 GMT ZoomEye Dorking with Nuclei zoomeye
Mon, 27 Jan 2025 16:51:28 GMT The man who suffered 11 years in hell for freedom has now been fr... web-pentest
Wed, 25 Feb 2026 06:40:34 GMT When Error Handling Becomes a Security Risk: A Responsible Disclo... vapt
Fri, 01 Aug 2025 06:17:06 GMT 15,000 Critical Systems Are Exposed — Thanks to This Outdat... censys
Sun, 23 Nov 2025 15:58:33 GMT just memecoin Rewards Eligibility & Claim Guide — November 2025 dorks
Tue, 03 Feb 2026 10:03:23 GMT Cross‑Site Scripting in 2026: Why Your Frontend Is Still Vulner... cross-site-scripting
Fri, 30 Jan 2026 08:30:04 GMT Lab: Remote code execution via server-side prototype pollution |... remote-code-execution
Sun, 07 Dec 2025 06:18:32 GMT Breaking the Perimeter: How My Custom Python Tool Bypassed a Fede... vdp
Sun, 22 Feb 2026 09:53:24 GMT I Found a Critical SSRF Vulnerability That Could Have Exposed an ... ssrf
Tue, 17 Feb 2026 17:37:18 GMT Document version control is critical for growing businesses. file-upload
Tue, 05 Aug 2025 07:25:48 GMT CXF Service List Endpoint Recon zoomeye
Wed, 11 Feb 2026 18:30:13 GMT Understanding Vulnerabilities, Threats, and OWASP Standard Testin... cyber-sec
Thu, 26 Feb 2026 08:46:42 GMT When a Link Becomes JavaScript (Stored XSS via javascript: URL) xss-attack, vapt
Thu, 12 Feb 2026 03:21:30 GMT Lumma Stealer dan Evolusi Social Engineering pentest
Wed, 15 Oct 2025 05:12:26 GMT Subdomain Takeover: The Forgotten DNS Records Hijacking Your Bran... subdomain-takeover
Tue, 24 Feb 2026 14:24:56 GMT Exploring NAS Trends and Top Models in 2025–2026 bugs
Tue, 17 Feb 2026 19:13:30 GMT Chapter 12: Remote Code Execution remote-code-execution
Sat, 04 Jan 2025 17:20:23 GMT GitHub dork github-dorking
Wed, 26 Nov 2025 12:34:58 GMT From Control to Confidence: How Information Security Became the L... cyber-sec
Sat, 31 Jan 2026 13:52:11 GMT SSRF via Referer Header: How a Simple Header Led to a Serious Fin... bugcrowd
Sun, 06 Jul 2025 06:33:18 GMT Path Traversal part-1 : File path traversal, simple case file-inclusion
Wed, 03 Dec 2025 23:26:26 GMT TryHackMe-TakeOver-WriteUp subdomain-takeover
Wed, 28 Jan 2026 07:57:40 GMT API SECURITY #2: API Keys vs OAuth vs JWTs vs mTLS api-key
Tue, 24 Feb 2026 02:41:36 GMT Recon? Fuzzing? Exploitation? No just a web sec write-up. hackerone
Tue, 15 Jul 2025 18:57:57 GMT ZoomEye Dorking | JSON Endpoints zoomeye
Sat, 25 Oct 2025 17:53:34 GMT How I Found and Claimed a Subdomain Takeover (My First Article) subdomain-takeover
Thu, 26 Feb 2026 15:23:18 GMT Why Most Ethical Hackers Never Get Paid — And the Complete Bug ... bug-bounty-tips
Sat, 14 Feb 2026 17:57:35 GMT Exploiting Local File Inclusion: A DefHawk CTF Writeup local-file-inclusion
Mon, 08 Dec 2025 11:02:43 GMT Comisiones de trading DESACTIVADAS! bounty-program
Thu, 26 Feb 2026 12:18:28 GMT What Happens to Your Data After You Delete an App? application-security
Tue, 20 Jan 2026 23:10:21 GMT What Is Ethical Hacking? Complete Beginner’s Guide cybersecurity-tools
Wed, 06 Aug 2025 18:09:04 GMT Making dorks from HTML Comment dorking
Thu, 14 Aug 2025 10:08:18 GMT Predictive Analytics and Voice Technology: A Winning Combination ... vdp
Sat, 06 Dec 2025 08:29:35 GMT The Midnight Epiphany: How a News Notification Cracked My Stubbor... vulnerability-disclosure
Mon, 16 Feb 2026 04:16:35 GMT Gratuité des transports au Mans : une promesse audacieuse de LFI lfi
Fri, 04 Jul 2025 09:25:20 GMT Lo-Fi — TryHackMe Writeup file-inclusion
Thu, 26 Feb 2026 00:47:58 GMT From Shodan Recon to Multiple Security Flaws in the Same Program hackerone, shodan
Tue, 03 Feb 2026 11:35:56 GMT My bug bounty journey: Full account takeover caused by SSO token ... bug-bounty-hunter
Thu, 08 Jan 2026 09:02:50 GMT osint-Forgotten Ruins bounty $$ bounties
Sun, 01 Feb 2026 08:07:50 GMT From Unauthenticated Access to Full Root Compromise: A Linux Pene... remote-code-execution
Wed, 07 Jan 2026 10:06:39 GMT OTP Bypass in Email Verification via Response Manipulation During... bug-bounty-hunting
Mon, 11 Dec 2023 18:17:01 GMT Exploiting a Log Poisoning. log-poisoning
Thu, 26 Feb 2026 20:56:16 GMT Lab: Reflected XSS into a JavaScript string with angle brackets H... xss-attack
Sat, 21 Feb 2026 16:39:23 GMT React2shell remote-code-execution
Tue, 06 Jan 2026 17:26:38 GMT The Future of Cybersecurity: Emerging Technologies, Evolving Thre... cybersecurity-tools
Fri, 24 Jan 2025 00:08:47 GMT A majestic temple opportunity of wellbeing and wellness web-pentest
Mon, 16 Feb 2026 08:42:31 GMT Lab: Exploiting HTTP request smuggling to perform web cache poiso... web-cache-poisoning
Sat, 25 Jan 2025 23:20:10 GMT Full GitHub Dorking guide: for OSINT and BugBounty (Reconnaissanc... github-dorking
Tue, 21 Oct 2025 09:47:05 GMT Proactive Third-Party Risk Management with Shodan Intelligence shodan
Mon, 23 Feb 2026 17:43:03 GMT CVE-2025–15556 分æž�:Notepad++ 的供應é�ˆæ”»æ“Šèˆ‡é˜²ç¦¦ç­... cve
Mon, 24 Nov 2025 16:40:00 GMT Workflow: speed up visual web based external exposure recon. shodan
Thu, 13 Mar 2025 18:09:56 GMT How I Found Sensitive Information using Github Dorks in Bug Bount... github-dorking
Mon, 26 Jan 2026 21:02:14 GMT Write-Up máquina PingPong de DockerLabs [ES] cyber-sec
Tue, 23 Sep 2025 13:01:51 GMT Why Email Marketing Is the Secret Growth Tool for Directory Websi... directory-listing
Wed, 11 Feb 2026 09:33:16 GMT Passive Reconnaissance Analysis of paulstamatiou.com: A Detailed ... vulnerability-scanning
Wed, 30 Apr 2025 17:08:29 GMT Exploring Subdomains: What They Are and How to Find Them subdomain-enumeration
Sat, 21 Feb 2026 17:56:38 GMT You made $10k from a finding .. so what bugbounty-writeup
Wed, 26 Nov 2025 08:20:32 GMT $1,500 Recon Secrets: Dorks to Dollars google-dork
Wed, 09 Jul 2025 01:02:19 GMT Start with VDPs Before Aiming for Private Bug Bounty Programs vdp
Mon, 02 Feb 2026 01:07:46 GMT STATIC ANALYSIS security-research
Mon, 26 Jan 2026 16:00:51 GMT Mapping Security Frameworks and Regulations (ISO27001, NIS2, NIST... cyber-sec
Sun, 15 Feb 2026 09:26:13 GMT TryHackMe Walkthrough -Subdomain Enumeration subdomain-enumeration
Fri, 06 Feb 2026 16:39:20 GMT Conhecendo o BOLT, uma ferramenta da APIsec. pentest
Sat, 14 Feb 2026 05:46:19 GMT CVE-2025–4406 Writeup: Stored XSS on wpForo Forum xss-bypass
Tue, 18 Nov 2025 08:33:41 GMT A Chain of Vulnerabilities Leading to Critical Information Disclo... bug-bounty-program
Sun, 24 Aug 2025 20:18:55 GMT How I found an Account Lockout Vulnerability Without Any Tools bug-bounty-program
Mon, 16 Feb 2026 21:15:14 GMT local file inclusion via xml local-file-inclusion
Fri, 06 Feb 2026 19:19:54 GMT File InclusionVulnerability Analysis in DVWA (Low to Impossible) local-file-inclusion
Wed, 03 Dec 2025 18:29:09 GMT How I Discovered a Flaw That Let Me Access Enterprise-Only Featur... bounty-program
Mon, 02 Feb 2026 07:50:38 GMT A Beginner’s Guide to Bird Hunting in Michigan bug-bounty-hunter
Tue, 20 Jan 2026 19:15:22 GMT Introduction into SOAR cybersecurity-tools
Mon, 24 Nov 2025 13:28:01 GMT Building India’s Largest Bug Bounty Platform & Revolutionizing ... bug-bounty-hunting
Thu, 12 Feb 2026 06:25:56 GMT Day 5 of PortSwigger Academy Lab Walkthrough: SSRF, OS command in... ssrf
Mon, 23 Feb 2026 02:21:08 GMT Practical OSINT techniques with Shodan leading to CVE shodan
Sun, 22 Feb 2026 14:57:32 GMT How Domain Enumeration, Content Discovery, Leaked Secrets, and Se... recon
Tue, 27 Jan 2026 19:12:22 GMT Tracing the Boiler Control System: From Internet Search to CISA C... security-research
Sun, 28 Dec 2025 08:13:44 GMT Subzy Tool subdomain-takeover
Mon, 16 Feb 2026 19:34:44 GMT Notepad’in Evrimi ve CVE-2026–20841 exploit
Thu, 12 Feb 2026 15:16:03 GMT Practical Research Article: Email OSINT Tool — Epieos cybersecurity-tools
Tue, 03 Feb 2026 17:12:47 GMT My First Week: 3 Business Logic Bugs in Major E-Commerce bug-bounty-hunter, bug-bounty-program
Wed, 25 Feb 2026 16:18:04 GMT How to Handle Large File Uploads in Spring Boot file-upload
Thu, 26 Feb 2026 19:01:00 GMT Username & Email Collision Leading to Account Lockout and identit... bug-bounty-tips, bug-bounty-writeup
Thu, 26 Feb 2026 08:59:52 GMT $1,500 PII Leak via GraphQL Field-Level Permission Bypass hackerone, bugbounty-writeup
Wed, 25 Feb 2026 16:09:30 GMT IDORs Explained: How One Number Can Hack an Entire Company bug-bounty-writeup
Sat, 24 Jan 2026 06:47:12 GMT Google Dorkware Pro google-dorking, google-dork
Sat, 07 Feb 2026 12:54:00 GMT Learning AppSec the Practical Way with DVWA pentest
Wed, 17 Dec 2025 09:57:30 GMT The Mother Lode: Hacking with GitHub Dorking github-dorking
Mon, 17 Nov 2025 09:27:29 GMT 200 reports, 11 valid bugs, 0 critical issues. Here’s everythin... vdp
Mon, 17 Nov 2025 23:45:18 GMT DorkFi: The Triumph of a Team You Can Trust dorks
Sat, 01 Nov 2025 20:09:17 GMT just memecoin — Best Platforms dorks
Sun, 08 Feb 2026 04:50:00 GMT DOM XSS Vulnerability Analysis in DVWA (Low to Impossible) xss-vulnerability
Thu, 04 Dec 2025 05:32:24 GMT ChainBounty Rewards & Bonus Guide — December 2025 bounties
Tue, 10 Feb 2026 06:10:51 GMT Behind the Link: A Guide to Mastering URL Analysis security-research
Wed, 25 Feb 2026 00:40:05 GMT Icy “Doodle� Site | ATC CTF 2.0 | Google Dorking| CTFs google-dorking
Sat, 14 Feb 2026 10:24:45 GMT I Found Real Credentials in Archived Data — And It Was on a Bu... information-disclosure
Tue, 08 Jul 2025 20:49:53 GMT UpDown-Linux-Medium file-inclusion
Fri, 23 May 2025 06:02:53 GMT Search Skills censys
Sun, 09 Nov 2025 14:49:19 GMT Beginner’s BOUNTY Rewards Guide — November 2025 bounties
Sat, 21 Feb 2026 11:10:34 GMT How I found CVE-2026–27146 (CSRF)| Cyber Tamarin xss-vulnerability
Thu, 21 Aug 2025 10:04:08 GMT Dork Like a Demon: FOFA Edition for Hackers & Bug Bounty Hunters dorking
Sat, 10 Jan 2026 05:03:45 GMT Lab:Web cache poisoning via an unkeyed query parameter | Portswi... web-cache-poisoning
Mon, 23 Feb 2026 02:41:34 GMT Double Compromise: Unearthing Unauthenticated SSRF and Weaponized... ssrf
Sun, 04 Jan 2026 03:49:09 GMT Intercom Deep Recon Techniques google-dorking
Sat, 31 Jan 2026 20:15:23 GMT Belajar Open Source dari Bug Nyata: Menambahkan Dukungan pacman d... pentest
Mon, 09 Feb 2026 16:07:10 GMT File Upload Validation: Size, Type, and Content Security file-upload
Thu, 25 Dec 2025 20:15:32 GMT Investigation into MSP Data Breach google-dork
Sat, 31 Jan 2026 12:21:02 GMT VulnLab: Cross Site Scripting (XSS) Çözümü cross-site-scripting
Mon, 21 Nov 2022 22:42:17 GMT Explorando XSS no lugar do meu nome. web-pentest
Fri, 06 Feb 2026 06:33:08 GMT 5 Ways to Bypass Email Verification Without Using Any Tool bug-bounty-hunter, bug-bounty-program
Sat, 03 Jan 2026 17:51:10 GMT Espelho, espelho meu : Existe alguém mais exposto do que Eu? shodan
Thu, 21 Aug 2025 19:05:59 GMT Cracking GeneQuest: Two Critical Bugs and My 19th Place Finish at... bug-bounty-hunting
Fri, 13 Feb 2026 12:31:00 GMT ChatGPT Plus File Upload Limit for Professionals file-upload
Tue, 25 Nov 2025 09:25:11 GMT Step-by-Step BOUNTY Rewards Guide — November 2025 bounties
Thu, 02 Oct 2025 06:59:46 GMT Endless Cashback Glitch:How I Unlocked Unlimited Free Orders with... bug-bounty-program
Sun, 22 Feb 2026 07:25:22 GMT Websites Are Leaking Their Own Secrets. information-disclosure
Tue, 04 Nov 2025 07:31:55 GMT Google Dorking dorks
Mon, 21 Jul 2025 14:07:41 GMT “403 Forbidden? vdp
Tue, 05 Aug 2025 00:19:11 GMT Breaking Recon with AMASS subdomain-enumeration
Fri, 28 Jun 2024 14:51:14 GMT X-Forwarded HTTP header-ləri : Qısa izah log-poisoning
Thu, 26 Feb 2026 18:33:21 GMT Encryption and Secure Data Management in iOS application-security
Tue, 24 Feb 2026 13:55:28 GMT Which AI Model to Use in Pentesting / Security Research? security-research
Wed, 07 Jan 2026 00:58:19 GMT Why Your Cache Rules are Leaking User Data (Web Cache Deception) web-cache-poisoning
Thu, 12 Feb 2026 03:11:00 GMT XSS & SVG: PentesterLab Feb2026 xss-bypass
Tue, 24 Feb 2026 06:43:30 GMT DOM XSS: When JavaScript Becomes the Vulnerability xss-attack
Tue, 21 Oct 2025 03:46:36 GMT The Postal Heist of the Web: An Introduction to HTTP Request Smug... bug-bounty-hunting
Mon, 16 Feb 2026 14:31:00 GMT BOUNTY | HTB | Windows |Walkthrough | Write up bounties
Sun, 22 Feb 2026 22:04:07 GMT Beyond The Black Box: A Multi-Stage Approach For Evaluating Auton... pentest
Sat, 07 Feb 2026 15:22:07 GMT Flu — OffSec Proving Grounds Practice Lab Walkthrough vulnerability-scanning
Thu, 26 Feb 2026 16:31:55 GMT What is SSRF (server-side request forgery)? ssrf
Wed, 18 Feb 2026 02:41:22 GMT What Really Happens When Your PHP App Gets XSS — And You Don’... xss-vulnerability
Fri, 11 Jul 2025 16:20:24 GMT PC WORX: The Hidden Risk in Your Industrial Network censys
Sun, 17 Aug 2025 19:26:05 GMT ï·½ bug-bounty-program
Tue, 24 Feb 2026 10:55:08 GMT loly Walkthrough (Educational & Defensive Analysis) cve
Wed, 05 Nov 2025 12:42:46 GMT How I Hacked Bank’s Admin Portal vdp
Fri, 30 Jan 2026 17:31:26 GMT 10-Year-Old Code Commit Just Gave Attackers Root on Thousands of ... rce
Sat, 31 Jan 2026 06:27:03 GMT Web App Security Assessment with Wapiti: Hands-On Vulnerability S... vulnerability-scanning
Sun, 21 Sep 2025 07:02:30 GMT Affordable but Vulnerable? The Dark Side of CMORE HMI censys
Thu, 14 Aug 2025 10:54:38 GMT Unlocking the Hidden Power of Search Engines censys
Thu, 26 Feb 2026 17:46:23 GMT The Ghost Bugs Playbook: How Elite Testers Expose Intermittent De... bugs
Thu, 26 Feb 2026 10:19:25 GMT Understanding Static vs Dynamic Analysis in Mobile Application Pe... application-security
Mon, 01 Sep 2025 06:53:22 GMT HTB-LAB Local File Inclusion (LFI) file-inclusion
Sat, 06 Dec 2025 17:05:14 GMT GitHub Pages Subdomain Takeover on aiaa-dpw.larc.nasa.gov (NASA V... subdomain-takeover
Thu, 29 Jan 2026 21:21:39 GMT Turning Fuzzing Into $2,550: How a Simple Bug Gave Me Access to E... bounties
Wed, 28 Jan 2026 12:54:04 GMT $500 for a UUID Swap: I Almost Gave Up on This IDOR information-disclosure
Sat, 07 Feb 2026 11:21:37 GMT From Directory Listing to Root Shell rce
Wed, 22 Oct 2025 14:11:32 GMT Mastering Subdomain Enumeration: A Beginner’s Guide to Expandin... subdomain-enumeration
Wed, 04 Feb 2026 15:04:10 GMT How to Hack Swagger UI Complete Guide. bug-bounty-hunter
Thu, 18 Dec 2025 20:10:01 GMT Google Dorking Nedir? google-dork
Sun, 08 Feb 2026 10:52:29 GMT Website Exploitation: Information Gathering & Vulnerability Scann... vulnerability-scanning
Mon, 09 Feb 2026 07:51:34 GMT STORED XSS Vulnerability Analysis in DVWA (Low to Impossible) xss-vulnerability
Sat, 17 Jan 2026 07:44:23 GMT Google Dorks to Find SQL Injection Vulnerable Websites google-dork
Thu, 20 Nov 2025 17:16:47 GMT The Health Factor: How DorkFi Keeps Your Position Safe dorks
Sun, 20 Jul 2025 18:02:47 GMT New in Town and Need a Makeup Artist? Here’s the Easiest Way to... directory-listing
Tue, 18 Nov 2025 21:32:05 GMT How I Received an Appreciation Letter from NASA for Identifying a... bounties
Sat, 20 Dec 2025 18:21:40 GMT N0aziXss SubSpectre: Advanced Subdomain Discovery with Intelligen... subdomain-enumeration
Wed, 25 Feb 2026 09:15:33 GMT Print File Upload Checklist: 10 Things to Validate Before Sending... file-upload
Tue, 11 Nov 2025 16:43:14 GMT Beyond Google: Navigating the Hidden Internet with Shodan and Cen... shodan, censys
Mon, 15 Dec 2025 12:59:16 GMT Modat Magnify Cyber Dorking dorking
Mon, 23 Feb 2026 06:09:03 GMT What are the advantages of DVR? security-research
Sat, 07 Feb 2026 18:11:16 GMT The Biggest Mistake Bug Bounty Hunters Make security-research
Fri, 06 Feb 2026 16:41:14 GMT Getting to know BOLT, a tool from the APIsec. pentest
Thu, 26 Feb 2026 14:17:09 GMT Why 70% of AppSec Time Is Spent Validating Findings — And What ... application-security
Mon, 16 Feb 2026 01:01:36 GMT Valenfind — TryHackMe Writeup | by P4NTHR local-file-inclusion, lfi
Tue, 06 Jan 2026 06:05:21 GMT AlphaArena AI Model Battle: A Hands-On Guide to Replicating DeepS... api-key
Sun, 11 Jan 2026 12:43:40 GMT Local File Inclusion(LFI) Vulnerability lfi
Tue, 05 Dec 2023 07:54:40 GMT LFI via SMTP log poisoning log-poisoning
Wed, 25 Feb 2026 18:24:29 GMT APK Vulnerability Scanner Online: Your Android App Is Shipping Vu... cve
Mon, 09 Feb 2026 02:48:52 GMT TryHackMe — Vulnerability Scanner Overview (Walkthrough) vulnerability-scanning
Mon, 26 Jan 2026 02:10:21 GMT The Truth About Internet Capital Markets bounty-program
Tue, 24 Feb 2026 02:26:01 GMT XSS Challenge Walkthrough — Time Out! cross-site-scripting
Tue, 24 Feb 2026 07:38:15 GMT Glassdoor’s IDOR vulnerability to retrieve email addresses of a... bug-bounty-writeup, bounty-program
Mon, 03 Nov 2025 19:42:12 GMT Announcing DorkFi Go-Live Date: Liquidity is Coming dorks
Tue, 27 Jan 2026 11:29:48 GMT The “Botnet� Exchange: Why ZSZRUN is spamming the Internet cyber-sec
Wed, 25 Feb 2026 23:51:18 GMT Intigriti Challenge 2026 — Stored XSS to Admin Flag xss-attack, xss-vulnerability
Wed, 25 Feb 2026 15:31:49 GMT Walkthrough: Information Disclosure Labs from PortSwigger information-disclosure
Wed, 11 Feb 2026 09:08:29 GMT N8n’s “quiet� RCE problem rce
Thu, 29 Jan 2026 20:14:29 GMT Local File Inclusion (LFI) lfi
Fri, 18 Jul 2025 01:35:17 GMT Lo-Fi TryHackMe Walkthrough/Write-up file-inclusion
Fri, 25 Jul 2025 15:34:20 GMT Discover Top Local Businesses Effortlessly with List & Post directory-listing
Tue, 27 Jan 2026 19:18:55 GMT Vulnerabilidad XSS xss-bypass
Thu, 29 Jan 2026 19:34:17 GMT TryHackMe (THM) Active Reconnaissance Walkthrough + Answers recon
Thu, 09 Oct 2025 18:33:05 GMT 0-click Account Takeover via Punycode bug-bounty-program
Sun, 22 Feb 2026 10:51:47 GMT Thinking Like an Attacker: How API Pen-Testers Identify IDOR idor
Fri, 13 Feb 2026 08:46:05 GMT From Deep Recon to Account Takeover: How Burp Suite Uncovered a H... recon
Mon, 02 Feb 2026 11:59:59 GMT El cashback está en el aire bounty-program
Thu, 26 Feb 2026 10:56:53 GMT WAF Bypass and JavaScript Incomplete Handling of Unicode Characte... bug-bounty-writeup
Wed, 25 Feb 2026 14:23:06 GMT Lo-Fi TryHackMe Writeup lfi, file-inclusion
Tue, 24 Feb 2026 04:11:51 GMT OneDrive File Upload Using .NET Core file-upload
Mon, 16 Feb 2026 03:12:56 GMT Getting Started with AI for Free: A Step-by-Step Guide to Your Op... api-key
Fri, 30 Jan 2026 09:50:21 GMT Building an LLM Security Lab: What I Actually Learnt security-research
Tue, 24 Feb 2026 12:52:32 GMT Tryhackme | Vulnerability Capstone Challenge rce
Fri, 06 Jun 2025 15:47:21 GMT ��♂� GitHub Dorking for Bug Bounty: Hackers' Hidden Playg... github-dorking
Wed, 25 Feb 2026 05:40:02 GMT Bug Bounty Hunting Routine: Why It Matters and Why You Need One bug-bounty-hunting
Sat, 14 Feb 2026 05:50:39 GMT Prevent cross-site scripting (XSS) by validating/escaping user in... cross-site-scripting
Thu, 12 Feb 2026 23:56:06 GMT AWS S3 Bucket Recon Bugbounty bug-bounty-hunter
Mon, 29 Dec 2025 19:09:04 GMT How i found Sensitive Data Exposure in NASA Vulnerable Disclosure... google-dorking
Sat, 25 Oct 2025 12:23:25 GMT How to find leaks on GitHub as a beginner. Logic is main key github-dorking
Thu, 22 Jan 2026 06:57:21 GMT Top 20 Tools Inside Parrot OS Explained (With Real-World Use Case... cybersecurity-tools
Thu, 26 Feb 2026 12:56:50 GMT Mumbai, Sydney, London: Meet Thales at 3 Flagship Gartner Summits application-security
Mon, 23 Feb 2026 10:31:22 GMT The Website Didn’t Need to Be Hacked. It Exposed Itself. Twice. information-disclosure
Sat, 14 Feb 2026 07:11:23 GMT My First Triaged Report Ever xss-vulnerability
Fri, 29 Aug 2025 04:43:21 GMT 9. The Secret Power of Google Dorking dorking
Thu, 26 Feb 2026 16:32:24 GMT What Hackers Talk About at 2 AM: Using Dark Web Forums for Recon ... bug-bounty-tips
Wed, 11 Feb 2026 01:31:29 GMT CrossCurve, FutureSwapX, and JFIN Lose Over $1.9M to Preventable ... exploit
Fri, 30 Jan 2026 13:03:07 GMT 1. What Is Escaping? xss-bypass
Sat, 06 Dec 2025 06:43:54 GMT The Midnight Pwn: How a News Alert Led to a Critical Bounty vulnerability-disclosure
Fri, 10 Nov 2023 03:38:01 GMT Apache error.log advanced Log poisoning RCE log-poisoning
Sat, 07 Feb 2026 01:59:42 GMT Bug Bounty Recon for Everyone recon
Thu, 26 Feb 2026 20:21:05 GMT The Era of Agentic Warfare application-security
Thu, 05 Feb 2026 07:08:00 GMT Y Type Pneumatic Valve Exporters in the World Industry recon
Mon, 19 Jan 2026 10:09:10 GMT GitHub Search Syntax for Finding Leaked API Keys, Secrets, and To... api-key
Wed, 11 Feb 2026 10:04:20 GMT Why I Haven’t Found A Valid Bug Yet — And Why I’m Not Quitt... bug-bounty-hunting
Sun, 22 Feb 2026 10:35:36 GMT Love Letter Locker idor
Wed, 11 Feb 2026 10:42:05 GMT Some notes about CVE-2026–21531 in Azure SDK ( CVSS: 9.8) security-research
Thu, 19 Feb 2026 05:19:08 GMT How i got my First Bug Bounty Reflected XSS xss-vulnerability
Tue, 06 Jan 2026 06:42:57 GMT WHAT IS A SHODAN? shodan
Tue, 24 Feb 2026 00:01:16 GMT I spent $11. In Ai Agent to recon and exploit bugbounty-writeup
Mon, 16 Feb 2026 01:06:12 GMT Hidden Deep Into my Heart — TryHackMe Writeup | by P4NTHR information-disclosure
Sun, 15 Feb 2026 16:04:42 GMT Discovering Security Weaknesses: A Practical Guide to Vulnerabili... vulnerability-scanning
Fri, 07 Feb 2025 05:12:28 GMT Do You Struggle Finding Internal/Hidden Subdomains? Recon part 5 subdomain-enumeration
Tue, 06 Jan 2026 20:31:25 GMT How to Create a Cybersecurity Home Lab: A Beginner Tutorial for S... cybersecurity-tools
Wed, 25 Feb 2026 21:49:59 GMT Don’t Switch Targets, Here’s How Sticking to One Company Make... hackerone
Thu, 22 Jan 2026 17:15:54 GMT FULL ACCOUNT WILL DIE bugcrowd
Tue, 17 Feb 2026 09:51:24 GMT Breaking the Trust Boundary: SSRF via a Misconfigured Sentry Tunn... ssrf
Mon, 23 Feb 2026 02:28:28 GMT After Feb 2026 Patches: Securing Async Django Apps Against New SQ... cve
Wed, 21 Jan 2026 12:56:03 GMT How I Discovered the RXSS and Bypassed the WAF xss-bypass
Tue, 23 Sep 2025 06:36:22 GMT Mengamankan File Sensitif & Directory Listing website dengan .ht... directory-listing
Tue, 24 Feb 2026 14:50:15 GMT Reliable WordPress QA Testing Service for Bug-Free, Secure & High... bugs
Wed, 25 Feb 2026 17:42:22 GMT Cross-Site Request Forgery Leading to Account Takeover bug-bounty-writeup
Wed, 25 Feb 2026 06:14:09 GMT Top 10 Cyber Security Companies in Jaipur (Service-Focused Overvi... vapt
Tue, 23 Dec 2025 06:58:24 GMT How I Found Vulnerabilities in NASA and Got into the Hall of Fame vulnerability-disclosure
Sat, 14 Feb 2026 22:03:31 GMT 6 Hours, 6 Real-world Critical Bugs: A Case Study in Efficient Bu... cyber-sec
Fri, 09 Jan 2026 11:49:46 GMT Make Contract Collaboration Effortless Across Teams with BoldSign... api-key
Fri, 20 Feb 2026 18:37:57 GMT Stored Cross-Site Scripting (XSS) in Accounts Manager App Using P... cross-site-scripting
Sat, 21 Feb 2026 15:06:35 GMT Breaking into Cyber: The Student’s Survival Kit cybersecurity-tools
Thu, 28 Sep 2023 23:05:39 GMT Archangel — TryHackMe log-poisoning
Tue, 24 Feb 2026 23:01:09 GMT A Step-by-Step Guide to Uncovering Vulnerabilities in a Mobile Ap... lfi
Sun, 01 Feb 2026 10:59:02 GMT TryHackMe Challenge — Lo-Fi — LFI(Local File Inclusio... lfi
Sun, 22 Feb 2026 11:06:45 GMT Thinking Like an Attacker: How API Pen-Testers Identify IDOR (Ins... idor
Sat, 14 Feb 2026 19:02:25 GMT XSS WAF Bypass: 3 Tricks to Beat Alert Blockers xss-bypass
Mon, 26 Jan 2026 07:25:06 GMT How Forgotten DNS Records Lead to Subdomain Takeovers subdomain-takeover
Mon, 26 Jan 2026 23:45:48 GMT Beyond Takeover AWS Bucket bugcrowd
Tue, 06 Jan 2026 15:29:55 GMT Lab: Web cache poisoning via a fat GET request | Portswigger web-cache-poisoning
Wed, 23 Jul 2025 15:15:01 GMT TryHackMe Include walkthrough: SSRF, log poisoning & LFI2RCE, wit... log-poisoning
Sun, 08 Feb 2026 02:36:38 GMT Entry Point Enumeration: The Critical Step Most Beginner Penteste... recon
Tue, 23 Dec 2025 18:32:40 GMT The Night I Found a Backup ZIP File Sitting in Plain Sight —... bounties
Sat, 21 Feb 2026 15:56:17 GMT My Personal Favorite Recon Method to Find URL Endpoints bugbounty-writeup, recon
Sun, 23 Nov 2025 13:28:34 GMT When IP Whitelisting Isn’t What It Seems: A Real-World Case Stu... vulnerability-disclosure
Thu, 20 Nov 2025 09:45:04 GMT Timber Doors in Surrey: Style, Durability, and Value Explained dorking
Tue, 15 Jul 2025 12:15:58 GMT “Secure� OPC UA Setups Are Being Hacked — Here’s Why censys
Wed, 25 Feb 2026 08:22:05 GMT Day 5 — The Image That Executes Code (Attribute Injection XSS) xss-attack
Mon, 23 Feb 2026 20:32:13 GMT FahemSec HackStart CTF hackerone
Fri, 02 Jan 2026 09:59:04 GMT 2 Years of Silence, 1 Critical Exploit: My Return to the Leaderbo... bugcrowd
Mon, 16 Feb 2026 11:08:23 GMT HTB Academy File Inclusion Skills Assessment Walkthrough — Upda... local-file-inclusion
Tue, 17 Feb 2026 19:33:49 GMT IPv6-Based SSRF: Techniques and Practical Payloads ssrf
Fri, 24 Jan 2025 09:34:52 GMT A new Holistic temple opening InLeeds web-pentest
Sat, 14 Feb 2026 02:43:54 GMT Invicti: The Enterprise Web Application Security Scanner for Accu... vulnerability-scanning
Fri, 30 Jan 2026 10:34:47 GMT ColdFusion Google Maps API Key Not Working: A Complete Fix Guide api-key
Sat, 21 Feb 2026 02:44:52 GMT The Unsafe Send: How an HTTP Client Library Led to Remote Code Ex... hackerone
Wed, 25 Feb 2026 02:43:19 GMT Responsible Disclosure: SQL Injection in Rutgers ROMS Platform security-research
Mon, 23 Feb 2026 17:03:06 GMT One Invite Feature, One Race Condition — 4 Bugs Later bugs
Thu, 18 Dec 2025 10:06:53 GMT Learn Google Dorking: Arama Motorlarıyla Bilgi Keşfi google-dork
Mon, 23 Feb 2026 03:48:12 GMT Full Organization Account Takeover (ATO) by Changing One Paramete... hackerone
Thu, 18 Dec 2025 21:21:21 GMT Google Dorking: Arama Motorunu Bir Güvenlik Aracına Dönüştü... google-dorking
Thu, 26 Feb 2026 12:05:57 GMT Why an Application Security Audit Is Critical for Protecting Your... application-security
Tue, 24 Feb 2026 21:37:07 GMT I Find IDOR Bug in Hacking Hub Challenge - VulnBegin idor
Thu, 26 Feb 2026 20:07:42 GMT Deprecating Yield DTF Batch Auctions: EasyAuction.sol Division-by... bugs
Thu, 12 Feb 2026 13:16:00 GMT Chapter 07: Cross-­Site Scripting (XSS) cross-site-scripting
Sun, 17 Aug 2025 17:58:45 GMT $$$ How I Exploited a Business Logic Flaw to Slash Product Prices... bug-bounty-program
Wed, 11 Feb 2026 11:05:20 GMT TuesdayTool 39: Darkweb Tools cybersecurity-tools
Thu, 19 Feb 2026 12:53:45 GMT Lab: Web cache poisoning via HTTP/2 request tunnelling | Portswi... web-cache-poisoning
Thu, 05 Feb 2026 20:13:20 GMT CloudSEK CTF_FINAL 2025 — Multi-step exploitation (JWT → ... rce
Thu, 12 Feb 2026 13:28:37 GMT CVE-2025–56459 remote-code-execution
Wed, 16 Jul 2025 12:07:42 GMT Hackers Love This 1979 Protocol (Because It Can’t Defend Itself... censys
Fri, 19 Sep 2025 07:40:16 GMT How I Tracked Our Clients’ Device Versions Without Direct Repor... zoomeye
Thu, 26 Feb 2026 22:37:55 GMT 10 Python Testing Practices That Prevent Production Bugs bugs
Sun, 26 Jan 2025 19:08:11 GMT Matrix strike’s back against honesty from a power stance web-pentest
Wed, 18 Feb 2026 16:18:14 GMT How I Bypassed Giant Swarm’s Nginx Regex to Score a Critical SS... ssrf
Thu, 12 Feb 2026 04:00:31 GMT Tryhackme - Intro to Cross-site Scripting walkthrough cross-site-scripting
Sat, 06 Dec 2025 23:06:15 GMT Big News from DorkFi — PreFi Rewards Drop + Contest Live! dorks
Tue, 18 Nov 2025 13:26:47 GMT GitHub Dorking: The Hunter’s Guide to Finding Secrets in Public... github-dorking
Sun, 23 Feb 2025 11:17:25 GMT $1000-$10k worth Leaks via Github Secret Dorks github-dorking
Sun, 22 Feb 2026 13:02:39 GMT OtterCTF - Hopity Hop Reverse Engineering Walkthrough cyber-sec
Sat, 23 Aug 2025 09:23:31 GMT URLScan Dorking to find WordPress Registration Endpoint dorking
Wed, 14 Jan 2026 09:06:30 GMT Lab: Web cache poisoning via an unkeyed query string | Portswige... web-cache-poisoning
Wed, 25 Feb 2026 19:32:14 GMT THM: Vulnerability Capstone exploit
Sun, 25 Jan 2026 18:20:12 GMT Getting Started with Penetration Testing (Pentest) — A Begi... pentest
Thu, 25 Dec 2025 00:47:15 GMT Subdomain Takeover Explained: Complete Step-by-Step Guide (Recon ... subdomain-takeover
Thu, 12 Feb 2026 22:05:59 GMT Recon Like a Hunter: Practical Tips from Real Findings Part 3 information-disclosure, recon
Wed, 11 Feb 2026 21:37:40 GMT From Course Notes to CVE: How a GXPN Study Session Uncovered a 40... vulnerability-disclosure
Sat, 07 Feb 2026 16:33:38 GMT PHP mail() Command Injection to Remote Code Execution (RCE) remote-code-execution
Thu, 11 Sep 2025 22:20:14 GMT It’s Coming: DorkFi Delivers PreFi Rewards Surge dorking
Sun, 22 Feb 2026 17:29:51 GMT PortSwigger Labs: User ID Controlled by Request Parameter (Lab 7 ... idor
Fri, 08 Aug 2025 17:59:47 GMT TryHackMe File Inclusion Challenge walkthrough. file-inclusion
Wed, 18 Feb 2026 21:56:48 GMT Chapter 14: Subdomain Takeover subdomain-takeover
Fri, 20 Feb 2026 18:55:00 GMT 12+ MUST Know Google Dorking Commands in 2026 google-dorking
Fri, 13 Feb 2026 05:36:29 GMT Linux Privilege enumeration exploit
Tue, 10 Feb 2026 09:34:05 GMT CVE-2026–1281 & CVE-2026–1340 remote-code-execution
Thu, 26 Feb 2026 06:29:18 GMT Understanding VAPT: A Comprehensive Guide to Vulnerability Assess... vapt
Sat, 01 Feb 2025 06:10:16 GMT How to Create Advanced Custom Wordlist? Dive into Recon Part 4 subdomain-enumeration
Fri, 20 Feb 2026 08:10:54 GMT Session Fixation Leading to Full Account Takeover bug-bounty-hunter
Wed, 18 Feb 2026 23:10:35 GMT Moonwell cbETH Oracle Incident (MIP‑X43): the “vibe‑codedâ€... exploit
Mon, 12 Jan 2026 15:11:17 GMT How Have I Been Pwned works and What it does cybersecurity-tools
Thu, 12 Feb 2026 19:42:42 GMT Most WordPress site owners overcomplicate file sharing. file-upload
Wed, 18 Feb 2026 01:09:03 GMT cURL’s Bug Bounty Is Dead. AI Killed It. bounty-program
Wed, 19 Nov 2025 19:44:02 GMT The Pulse of Liquidity: How DorkFi’s Interest Rates Adapt in Re... dorks
Wed, 25 Feb 2026 02:51:18 GMT Impact Scenario Hackviser local-file-inclusion
Fri, 25 Jul 2025 16:41:01 GMT � SubDNS-UI: Build Your Own Subdomain + DNS Enumerator with a C... subdomain-enumeration
Thu, 26 Feb 2026 14:20:13 GMT dc-1 Walkthrough (Educational & Defensive Analysis) cve
Tue, 17 Feb 2026 10:44:13 GMT Top 15 Website Security Mistakes That Get Sites Hacked recon
Thu, 26 Feb 2026 13:01:19 GMT Top 7 Features Every Successful Mobile App Must Have application-security
Thu, 27 Mar 2025 23:46:11 GMT Make Break and Betrayal web-pentest
Wed, 28 Jan 2026 22:51:01 GMT Day 3 : Vulnerability Research remote-code-execution
Wed, 25 Feb 2026 12:41:57 GMT stapler walkthrough (Educational & Defensive Analysis) cve
Sat, 07 Feb 2026 20:17:57 GMT Endpoint Security (Uç Nokta Güvenliği) exploit
Tue, 10 Feb 2026 19:32:15 GMT Original Sin of Agents: Morris II, EchoLeak and Prompt Pond remote-code-execution
Tue, 19 Aug 2025 10:37:07 GMT Dari Teori ke Praktik: SSRF, File Inclusion, dan Command Injectio... file-inclusion
Fri, 21 Nov 2025 20:24:09 GMT Bypassing University Email Verification: A Logical Flaw in a Saud... vulnerability-disclosure
Tue, 14 Oct 2025 01:36:00 GMT Hackviser  —  File Inclusion Labs file-inclusion
Thu, 26 Feb 2026 13:54:44 GMT Poison — HTB lfi
Thu, 26 Feb 2026 06:52:00 GMT What is VAPT? Guide to the Introductory Vulnerability Assessment ... vapt
Sat, 14 Feb 2026 19:47:58 GMT Pentest+ in 90 Days or Less (Hopefully) pentest
Sat, 14 Feb 2026 11:50:52 GMT SHODAN — SEOH shodan
Fri, 28 Nov 2025 12:11:42 GMT How I Pwned Telemetry on Amsterdam.nl bounty-program
Fri, 24 Oct 2025 12:05:27 GMT Hackers are hijacking domains via forgotten DNS records subdomain-takeover
Tue, 12 Aug 2025 17:24:22 GMT How I Removed Other User`s Uploaded Images in a Few Clicks bug-bounty-program
Wed, 18 Feb 2026 06:00:02 GMT Google Dorking google-dorking
Fri, 09 Jan 2026 05:50:02 GMT Caches, Edge, and Exploits web-cache-poisoning
Fri, 30 Jan 2026 02:02:40 GMT Missing authentication in API Endpoints lead to update orders and... bugcrowd
Thu, 19 Feb 2026 04:57:17 GMT Introducing “Information Gathering� as the First Phase of Web... google-dorking
Wed, 11 Feb 2026 19:07:33 GMT Google Search Operators You Can Use google-dork
Mon, 02 Feb 2026 17:05:37 GMT Lab: Web cache poisoning to exploit a DOM vulnerability via a cac... web-cache-poisoning
Tue, 24 Feb 2026 18:07:24 GMT The Flag Was Just One Number Away — CTF Writeup idor
Sun, 06 Jul 2025 07:51:30 GMT ZoomEye Dorking for API Keys zoomeye
Sat, 07 Feb 2026 05:34:28 GMT How to Turn Recon Notes Into Real Bug Bounty Findings bug-bounty-hunter
Wed, 18 Feb 2026 10:05:21 GMT Gods Eye: The Reconnaissance Tool I Wish I Had 5 Years Ago recon
Tue, 10 Feb 2026 08:55:00 GMT XSS Exfiltration: How Attackers Steal Data Using JavaScript cross-site-scripting
Thu, 22 Jan 2026 10:35:38 GMT How I Earned a $500 Bug Bounty for a P5 Informational Vulnerabili... bugcrowd
Sat, 14 Feb 2026 18:31:14 GMT TryHackMe Writeup (Love at First Breach 2026): Corp Website rce
Sat, 21 Feb 2026 14:47:36 GMT AI Innovation or Market Disruption? vulnerability-scanning
Wed, 10 Dec 2025 12:06:41 GMT Strengthening Web3 Security: Recent Vulnerability Findings from Y... vulnerability-disclosure
Sat, 24 Jan 2026 19:34:56 GMT Smart Home (BUET CTF 2026 Preliminary) — Pre-Auth RCE via e... rce
Thu, 26 Feb 2026 09:06:23 GMT Day 8 — The Image That Wasn’t an Image (Stored XSS via File ... vapt
Thu, 11 Dec 2025 17:36:39 GMT � Digital Archaeology: How to Unearth Hidden Technical Manuals ... google-dork
Tue, 30 Dec 2025 07:53:12 GMT One Mantle DevCard, Three Reward Pools for Mantle Global Hackatho... bounty-program
Sun, 21 Dec 2025 21:12:19 GMT I Found My First Bugs in 48 Hours: A Beginner’s Real-World Guid... bugcrowd
Fri, 20 Feb 2026 14:44:02 GMT XSS Attack Methodology: How Attackers Actually Exploit Your Brows... xss-bypass
Thu, 04 Dec 2025 00:58:22 GMT Zero In on Targets: Automating the Modern Attack Surface with Ze... bug-bounty-hunting
Tue, 22 Apr 2025 10:38:20 GMT Trump’s Tariffs Cut Out Censys — ZoomEye Steps In Strong! zoomeye
Mon, 23 Feb 2026 13:21:55 GMT The Importance of Fast and Secure File Hosting in a Digital World file-upload
Sun, 22 Oct 2023 19:57:30 GMT Performing a Log Poisoning Attack log-poisoning
Tue, 13 Jan 2026 14:20:03 GMT Burp Suite: The Basics — THM Walkthrough xss-bypass
Fri, 13 Feb 2026 17:55:14 GMT Valenfind Walkthrough (TryHackMe): Love at First Breach CTF local-file-inclusion
Thu, 26 Feb 2026 09:58:12 GMT Lab: Stored XSS into anchor href attribute with double quotes HTM... xss-attack
Thu, 26 Feb 2026 11:13:09 GMT Best 15 Paid and Free VAPT Tools vapt
Fri, 12 Dec 2025 06:49:56 GMT How Variable Data Technology is Transforming Postcard & Brochure ... vdp
Mon, 23 Feb 2026 14:36:25 GMT Thinking Like an Attacker: How API Pen-Testers Identify IDOR Vuln... idor
Sun, 22 Feb 2026 10:18:28 GMT Why I Built NoFileUpload.com — A Simple Privacy Tool for Everyo... file-upload
Sun, 13 Jul 2025 16:32:21 GMT ProConOS Exposed: What ICS Security Teams Need to Know censys
Sat, 31 Jan 2026 19:35:51 GMT How a Simple Note Feature Turned Into a Stored XSS (₹7,500 Boun... cross-site-scripting
Thu, 26 Feb 2026 20:56:53 GMT Pen-testing a Prod H3C Private Environment in 2026: Complete Reda... bug-bounty-writeup
Wed, 18 Feb 2026 04:39:59 GMT ​"Beyond the Alert Box: Demonstrating Real-World XSS Impact" xss-bypass
Fri, 13 Feb 2026 16:22:19 GMT How I Approach XSS Hunting as a Security Beginner cross-site-scripting, xss-bypass
Thu, 19 Feb 2026 15:10:04 GMT Where the wild exploits are exploit
Wed, 25 Feb 2026 11:25:59 GMT Understanding Modern Cybersecurity Practices for Scalable SaaS Pr... vulnerability-scanning
Tue, 17 Feb 2026 07:42:30 GMT HTB: Outbound rce
Tue, 23 Dec 2025 07:43:20 GMT Integrating Shodan with HexStrike-AI Using Gemini-CLI shodan
Mon, 19 Jan 2026 05:42:56 GMT Securing the Foundation: API Key Management for AI Development api-key
Sun, 21 Dec 2025 10:09:54 GMT From “Valid Bug� to “No Bounty�: VRP, VRT, P4, and P5 on ... bugcrowd
Thu, 26 Feb 2026 15:59:25 GMT What is the difference between IDOR and Privilege Escalation? application-security
Tue, 09 Sep 2025 10:14:01 GMT The Psychology of Listings: Why Users Trust Some Directories More... directory-listing
Sun, 08 Feb 2026 12:21:01 GMT How AI Became My Reporting Partner in Security Research bugcrowd
Fri, 19 Dec 2025 20:23:57 GMT How I Found an Unauthenticated XXE That Allowed Arbitrary File Re... vulnerability-disclosure
Sun, 14 Dec 2025 06:37:06 GMT My Bug Bounty Diary subdomain-enumeration
Thu, 26 Dec 2024 15:23:03 GMT GitHub Dorking List: The Ultimate Guide to Exploring and Securing... github-dorking
Tue, 24 Feb 2026 11:08:35 GMT Bug Bounties Are the New Gold Rush (But Most Hunters Will Go Brok... hackerone
Sat, 21 Feb 2026 09:05:53 GMT Fast RC Cars for Beginners — Speed, Features & Tips rce
Fri, 20 Feb 2026 22:16:05 GMT How a Broken Access Control + 2 IDOR Chain Allowed Deleting Other... idor
Wed, 03 Dec 2025 22:42:41 GMT Critical Vulnerabilities in React and Next.js: Security Advisory shodan
Sun, 08 Feb 2026 23:49:08 GMT Secure MCP Development with Rust and Gemini CLI api-key
Wed, 25 Feb 2026 20:16:24 GMT Lab: Reflected XSS into Attribute with Angle Brackets HTML-Encode... xss-attack
Tue, 17 Feb 2026 04:59:32 GMT Why curl Quit HackerOne hackerone
Thu, 04 Dec 2025 04:45:36 GMT What is Google Dorking? dorking, google-dork
Sun, 21 Sep 2025 03:55:56 GMT Is it easy to discover a critical vulnerability [P1] ? directory-listing
Fri, 31 May 2024 13:29:16 GMT Map of the worlds best URLs 2025 log-poisoning
Wed, 28 Jan 2026 07:31:37 GMT Lab: Targeted web cache poisoning using an unknown header | Port... web-cache-poisoning
Sun, 22 Feb 2026 20:52:28 GMT How I Became a PAPA (Practical AI Pentest Associate) by TCM pentest
Sun, 22 Feb 2026 07:11:57 GMT Deep-C: A scanner to catch & Exploit the misconfigured Android de... bugbounty-writeup
Sun, 22 Feb 2026 10:23:23 GMT Forging zkSNARK Proofs via Misconfigured Verification Keys: The V... exploit
Thu, 13 Feb 2025 03:29:37 GMT ZoomEye Meets DeepSeek: AI-Powered Cyberspace Intelligence zoomeye
Tue, 26 Aug 2025 04:38:54 GMT Why Most Directory Websites Fail (and How to Make Yours Succeed) directory-listing
Sat, 20 Apr 2024 17:20:58 GMT TryHackMe — Brute Walkthrough | TheHiker log-poisoning
Thu, 26 Feb 2026 18:29:23 GMT Anatomy of a Cloud Native Attack: How We Pwned Kubernetes for $1... bug-bounty-tips, bug-bounty-writeup
Tue, 06 Jan 2026 16:02:54 GMT Spider-Man, Google Dorks e OSINT: quando cercare diventa un super... google-dorking
Tue, 13 Jan 2026 13:27:13 GMT Hacking “Time�: When Critical Infrastructure Forgets to Set a... vulnerability-disclosure
Tue, 24 Feb 2026 03:43:20 GMT Heap Based Buffer Over-Read Vulnerability in Rldns-1.3 exploit
Wed, 26 Nov 2025 13:15:53 GMT How i earned $100 in one minute bounty-program
Thu, 26 Feb 2026 16:03:03 GMT The 5 Low-Hanging Bugs You Should Never Skip bug-bounty-tips
Mon, 23 Feb 2026 11:01:00 GMT From a Simple Client-Side Mistake to Full Read/Write Access of an... bugbounty-writeup
Sun, 14 Jul 2024 11:56:11 GMT How I Can Get P1 Nasa easily — Dorking web-pentest
Thu, 19 Feb 2026 07:55:49 GMT Upload. Execute. Compromise. The Hidden Danger of Unrestricted Fi... remote-code-execution
Mon, 02 Feb 2026 10:02:08 GMT Understanding Path Traversal, Local File Inclusion, and Remote Fi... lfi
Sun, 18 Jan 2026 19:37:52 GMT An Introduction to EDR: cybersecurity-tools
Sun, 15 Feb 2026 20:57:36 GMT The Two Bugs That Kill Startups: A Deep Dive into XSS and CSRF xss-vulnerability
Thu, 29 Jan 2026 05:03:15 GMT Subdomain Takeover: Understanding, Detecting, and Recovering from... subdomain-takeover
Mon, 16 Feb 2026 16:59:47 GMT Unauthenticated Image Access and EXIF Location Leak, Easy P4, you... bug-bounty-hunter
Fri, 26 Dec 2025 00:33:19 GMT Google Dork and OSINT: Discovering Exposed Systems Through Search... google-dorking
Tue, 17 Feb 2026 17:12:12 GMT Cross-Site Scripting (XSS) — Part 2: Stored, DOM-Based, and Bli... xss-vulnerability
Thu, 04 Dec 2025 10:22:05 GMT The Billion-Naira Blueprint: How SuperteamNG Turned Nigerian Tale... bounties
Tue, 24 Feb 2026 02:34:29 GMT Intigriti Challenge 0226 : Stored XSS & CSP Bypass xss-attack, bugbounty-writeup
Wed, 21 Jan 2026 15:09:15 GMT Lab: Weak isolation on dual-use endpoint | Portswigger web-cache-poisoning
Thu, 26 Feb 2026 21:33:21 GMT External Vulnerability Scanning FAQ vulnerability-scanning
Wed, 28 Jan 2026 06:41:25 GMT Quantitative Practice of DEX Exchanges (4) — Strategy Acces... api-key
Sat, 16 Aug 2025 17:33:22 GMT PDF.JS Viewer Endpoint Dorking dorking, zoomeye
Mon, 23 Feb 2026 10:15:13 GMT icmp walkthrough (Educational & Defensive Analysis) cve
Sun, 15 Feb 2026 20:21:32 GMT Cross-Site Scripting (XSS) — Part 1: Reflected XSS Explained wi... xss-vulnerability
Tue, 24 Feb 2026 18:26:27 GMT Lab: DOM XSS in jQuery Selector Sink Using a Hashchange Event xss-attack
Tue, 17 Feb 2026 13:01:32 GMT Blind SSRF via XST — How a Simple Misconfiguration Can Lead to ... ssrf
Sat, 02 Aug 2025 14:15:23 GMT The Silent Risk in Your ICS: Why S7 Protocol Needs Security Atten... censys
Fri, 20 Feb 2026 17:56:31 GMT TryHackMe — Include — Walkthrough local-file-inclusion, ssrf
Wed, 18 Feb 2026 07:41:16 GMT TryHackMe Valenfind Writeup: Hardcoded Keys & Broken Hearts local-file-inclusion
Tue, 18 Nov 2025 18:12:40 GMT Dork Labs Awarded AWS Activate Startup Grant dorks
Thu, 26 Feb 2026 15:26:12 GMT Neighbour TryHackMe Writeup idor
Mon, 18 Aug 2025 18:06:38 GMT The Importance of Legal Directory Listings for Your Practice directory-listing
Tue, 24 Feb 2026 20:19:39 GMT Batman’s Kitchen CTF (BKCTF) 2026: web/My First Blog information-disclosure
Tue, 06 Jan 2026 18:31:45 GMT Ghost in the Machine: Bypassing Authentication to Access Live Shi... vulnerability-disclosure
Mon, 07 Jul 2025 05:15:45 GMT ZoomEye Dorking | Advanced OSINT zoomeye
Thu, 22 Jan 2026 16:50:23 GMT API Keys vs. Tokens: Navigating Modern API Authentication api-key
Tue, 10 Feb 2026 23:04:46 GMT Effective Dorking Tools dorking
Sat, 29 Nov 2025 10:42:26 GMT Bahaya Google Dorking: Data Sensitif Mahasiswa Bocor! google-dork
Fri, 26 Dec 2025 07:43:53 GMT Beginner's Guide to Claiming BOUNTY Airdrop — Claim Up To $50,0... bounties