| Sun, 19 Apr 2026 22:49:14 GMT |
HTB Academy — Web Fuzzing Skills Assessment Writeup |
cybersecurity, information-technology |
Yes |
Yes |
| Sun, 19 Apr 2026 22:51:56 GMT |
Debug Disaster |
cybersecurity, web-security |
Yes |
Yes |
| Sun, 19 Apr 2026 22:46:07 GMT |
Relay as the Defense Layer for AI Agent Traps |
cybersecurity |
Yes |
Yes |
| Sun, 19 Apr 2026 23:01:01 GMT |
StumbleSOC Stories: The Teams Call Compromise |
cybersecurity |
Yes |
Yes |
| Sun, 19 Apr 2026 23:02:42 GMT |
From Second-Order SQLi to Full RCE: Breaking Through Filters in a... |
cybersecurity, penetration-testing |
Yes |
Yes |
| Sun, 19 Apr 2026 23:08:14 GMT |
Easy Security agents workflow to review PRs on Azure , Github and... |
penetration-testing |
Yes |
Yes |
| Sun, 19 Apr 2026 23:07:08 GMT |
Apple Background Security Improvements: A Smarter Way to Patch Yo... |
security |
Yes |
Yes |
| Sun, 19 Apr 2026 17:11:21 GMT |
How DFIR Timeline Analysis Actually Works |
cyber-security-awareness |
|
Yes |
| Sun, 19 Apr 2026 19:14:22 GMT |
Caldera OT for ICS Red Teaming — Part 2.2 |
information-security |
|
Yes |
| Sun, 19 Apr 2026 17:28:00 GMT |
Your Rate Limit Didn’t Fail — You Just Met a Race Condition |
bugs |
|
Yes |
| Sun, 19 Apr 2026 19:31:49 GMT |
AI Ended Enterprise IT’s Peacetime: You Cannot Build an Army th... |
information-technology |
|
Yes |
| Sun, 19 Apr 2026 19:07:53 GMT |
No Macros Required: Harvesting AD Credentials with a Simple Word ... |
penetration-testing |
|
Yes |
| Sun, 19 Apr 2026 20:21:59 GMT |
Filsafat dan Cinta: Memahami Rasa dengan Akal, Menjalani Akal den... |
information-security |
|
Yes |
| Sun, 19 Apr 2026 19:09:26 GMT |
HTB: Explosion Box Walkthrough |
hacking |
|
Yes |
| Sun, 19 Apr 2026 13:39:48 GMT |
Workforce Salary Dynamics Analysis |
information-technology |
|
Yes |
| Sun, 19 Apr 2026 02:34:13 GMT |
Mr Robot TryHackMe Español |
pentesting |
|
Yes |
| Sun, 19 Apr 2026 11:27:08 GMT |
Hidden Entry Points: robots.txt + .well-known URIs in Web Recon |
web-security |
|
Yes |
| Sun, 19 Apr 2026 14:57:02 GMT |
The Intimacy of “Parallel Play�: Why the Quietest Moments Are... |
vulnerability |
|
Yes |
| Sun, 19 Apr 2026 21:14:53 GMT |
Building a Risk Register from Scratch: A Practical Exercise |
information-security |
|
Yes |
| Sun, 19 Apr 2026 14:00:46 GMT |
Kioptrix: Level 1 — VulnHub Walkthrough OpenFuck Apache Exploit... |
pentesting |
|
Yes |
| Sun, 19 Apr 2026 11:00:28 GMT |
A New Red Team Technique: Telemetry Visibility Gaps in Runtime Me... |
pentesting |
|
Yes |
| Sun, 19 Apr 2026 20:00:04 GMT |
Part 2: Provisioning the “Brain� — EKS Control Plane & Mana... |
security |
|
Yes |
| Sun, 19 Apr 2026 14:31:55 GMT |
Web Security Series #15 — Exploiting Command Injection for Reve... |
bug-bounty, ethical-hacking |
|
Yes |
| Sun, 19 Apr 2026 14:23:40 GMT |
Claude Mythos and the Dawn of Agentic Cyber-Offense |
cyber-security-awareness |
|
Yes |
| Sun, 19 Apr 2026 19:11:48 GMT |
Firewall Suicide: Don’t Lock Yourself Out of Your Own AMI |
information-security |
|
Yes |
| Sun, 19 Apr 2026 12:26:01 GMT |
⚙� 03. — Forced OAuth profile linking |
bug-bounty, web-security |
|
Yes |
| Sun, 19 Apr 2026 07:42:50 GMT |
the divine geometry of a billion faces |
vulnerability |
|
Yes |
| Sun, 19 Apr 2026 21:05:23 GMT |
Behind the Scenes of a Romance Scam Operation |
security |
|
Yes |
| Sun, 19 Apr 2026 18:09:36 GMT |
Tools Don’t Make You a Hacker-Thinking Does |
hacking, ethical-hacking |
|
Yes |
| Sun, 19 Apr 2026 15:25:58 GMT |
If I die, would someone cry? |
vulnerability |
|
Yes |
| Sun, 19 Apr 2026 17:27:16 GMT |
An Ode to Vulnerability |
vulnerability |
|
Yes |
| Sun, 19 Apr 2026 11:45:48 GMT |
Why I Built The Hidden Finds — A Real-World Approach to SaaS Se... |
cyber-security-awareness |
|
Yes |
| Sun, 19 Apr 2026 22:41:00 GMT |
A Massive Problem |
cybersecurity, web-security |
|
Yes |
| Sun, 19 Apr 2026 07:23:27 GMT |
How I Crashed a Blockchain Node with a Single Vote (CVE-2026–40... |
cve |
|
Yes |
| Sun, 19 Apr 2026 17:24:05 GMT |
Learning Fortinet Firewall — LESSON XX: High Availability |
security |
|
Yes |
| Sun, 19 Apr 2026 10:26:35 GMT |
Reflected XSS Context |
xss-attack, xss-vulnerability |
|
Yes |
| Sun, 19 Apr 2026 11:51:09 GMT |
Why Security Scanners Miss Real Risk — And What Web Attack Simu... |
cyber-security-awareness |
|
Yes |
| Sun, 19 Apr 2026 21:48:00 GMT |
Securing the Backbone — Issue #21: Software Supply Chain Failur... |
cybersecurity |
|
Yes |
| Sun, 19 Apr 2026 08:31:42 GMT |
Cybersecurity Careers: Pick Your Side (Blue Team vs Red Team for ... |
ethical-hacking |
|
Yes |
| Sun, 19 Apr 2026 11:31:54 GMT |
Search Engine Discovery & Google Dorking: Turning Google into a R... |
penetration-testing, web-security, google-dorking |
|
Yes |
| Sun, 19 Apr 2026 09:03:32 GMT |
Why CVE Matching Is Not Enough: Reachability, Runtime, and Exploi... |
cve |
|
Yes |
| Sun, 19 Apr 2026 20:31:18 GMT |
Why Your HashMap Is Creating Duplicate Entries (And How equals() ... |
bugs |
|
Yes |
| Sun, 19 Apr 2026 19:44:47 GMT |
Why Did Vercel Get Breached? What We Know About the April 2026 At... |
hacking |
|
Yes |
| Sun, 19 Apr 2026 12:45:56 GMT |
Become a Certified DevOps Engineer & Boost Your Career — Limite... |
information-technology |
|
Yes |
| Sun, 19 Apr 2026 19:07:42 GMT |
How Two Git Commands Tricked the World’s Most Advanced AI into ... |
vulnerability |
|
Yes |
| Sun, 19 Apr 2026 22:04:07 GMT |
I Built a Tool That Simulates and Detects Linux Rootkits |
cybersecurity, information-security |
|
Yes |
| Sun, 19 Apr 2026 17:08:23 GMT |
Your WiFi Signal Is Watching You Sleep |
cyber-security-awareness |
|
Yes |
| Sun, 19 Apr 2026 19:41:47 GMT |
PortSwigger “JWT authentication bypass via algorithm confusionâ... |
hacking |
|
Yes |
| Sun, 19 Apr 2026 10:51:29 GMT |
Why I Thought I Found a Zero-Day: The False Positive Trap in Bug ... |
infosec |
|
Yes |
| Sun, 19 Apr 2026 16:20:35 GMT |
500$ IDOR on a Public Program |
bug-bounty, infosec, bug-bounty-writeup, idor |
|
Yes |
| Sun, 19 Apr 2026 13:31:06 GMT |
Professional Kali Linux (2026.1+) Post-Installation Setup with Ba... |
infosec, ethical-hacking |
|
Yes |
| Sun, 19 Apr 2026 11:56:01 GMT |
⚙� 01. — Authentication bypass via OAuth implicit flow |
web-security |
|
Yes |
| Sun, 19 Apr 2026 10:24:34 GMT |
OSINT & OutSystems: Estratégia para Pentests, Security Researchs... |
pentesting |
|
Yes |
| Sun, 19 Apr 2026 09:54:27 GMT |
Wireshark Packet Analysis: Investigating Network Traffic Like a S... |
infosec |
|
Yes |
| Sun, 19 Apr 2026 16:01:09 GMT |
Quiet Sunday, Loud Edge Cases: Fixing the Vidiprinter and Retirin... |
bugs |
|
Yes |
| Sun, 19 Apr 2026 19:26:01 GMT |
How to Get Started with Cybersecurity and Ethical Hacking |
bug-bounty, infosec, information-security, ethical-hacking |
|
Yes |
| Sun, 19 Apr 2026 08:34:55 GMT |
Cracking Open the Black Box: A Practical Guide to IoT Firmware An... |
infosec |
|
Yes |
| Sun, 19 Apr 2026 18:21:11 GMT |
Beyond Good Faith: How AI exploits the “Authorization Gap� by... |
security |
|
Yes |
| Sun, 19 Apr 2026 11:38:03 GMT |
Level Up Your IT Career — Don’t Miss This Limited-Time Deal! |
information-technology |
|
Yes |
| Sun, 19 Apr 2026 16:30:33 GMT |
Python Libraries That Actually Matter for Data, ML, AI & Trending... |
information-technology |
|
Yes |
| Sun, 19 Apr 2026 11:46:01 GMT |
OAuth 2.0 Authetication Vulnerabilities |
web-security |
|
Yes |
| Sun, 19 Apr 2026 19:36:01 GMT |
Why Smart Women Over 30 Stay Single: The Brutal Truth No One Tell... |
security |
|
Yes |
| Sun, 19 Apr 2026 18:07:54 GMT |
Introduction to SIEM | TryHackMe |
infosec |
|
Yes |
| Sun, 19 Apr 2026 03:17:06 GMT |
Security Questions Bypassed to Change User’s Password |
hackerone |
|
Yes |
| Sun, 19 Apr 2026 12:00:29 GMT |
Security doesn’t have weekends. |
cyber-security-awareness |
|
Yes |
| Sun, 19 Apr 2026 21:48:21 GMT |
Securing the Backbone — Issue #22: When a $500 Radio Can Stop a... |
cybersecurity |
|
Yes |
| Sun, 19 Apr 2026 14:50:43 GMT |
How We Fixed Missing CSP Headers on Keycloak APIs (Without Breaki... |
web-security |
|
Yes |
| Sun, 19 Apr 2026 18:26:24 GMT |
Isolating and Exporting HTTP Traffic in Wireshark |
cyber-security-awareness |
|
Yes |
| Sun, 19 Apr 2026 11:43:25 GMT |
Level Up Your Cybersecurity Career in 2026 — Limited Time Offer... |
ethical-hacking |
|
Yes |
| Sun, 19 Apr 2026 18:50:35 GMT |
Securing CI/CD pipeline project part-3 |
information-security |
|
Yes |
| Sun, 19 Apr 2026 12:11:01 GMT |
⚙� 02. — SSRF via OpenID dynamic client registration |
bug-bounty, web-security |
|
Yes |
| Sun, 19 Apr 2026 04:31:01 GMT |
SSRF Server-Side Request Forgery: Server Ko Apna Agent Banao, Int... |
ssrf |
|
Yes |
| Sun, 19 Apr 2026 13:56:54 GMT |
Unlock Your Cloud Security Career in 2026 — Save 25% Today (Lim... |
cyber-security-awareness |
|
Yes |
| Sun, 19 Apr 2026 19:28:23 GMT |
HTB: Preignition Box Walkthrough |
hacking |
|
Yes |
| Sun, 19 Apr 2026 22:10:19 GMT |
Distributed Systems Security |
cybersecurity |
|
Yes |
| Sun, 19 Apr 2026 17:38:32 GMT |
Authentication & Authorization — Path to Laravel (Article 13)ï¸... |
web-security |
|
Yes |
| Sun, 19 Apr 2026 07:46:55 GMT |
Helium Challenge Batch 2 Write-Up : Menemukan 3 Kerentanan Kritis... |
pentesting |
|
Yes |
| Sun, 19 Apr 2026 19:43:47 GMT |
Weekly Cyber Threat Bulletin: 19 April 2026 |
vulnerability, information-security |
|
Yes |
| Sun, 19 Apr 2026 15:06:03 GMT |
Penetration Testing for SOC 2: Why Most SaaS Apps Still Fail Secu... |
penetration-testing |
|
Yes |
| Sun, 19 Apr 2026 19:26:01 GMT |
These Strategies Can Save Your Job from Disaster: A Practical, Te... |
security |
|
Yes |
| Sun, 19 Apr 2026 10:00:44 GMT |
The Forbidden AI: Why Anthropic is Terrified to Release Claude My... |
information-technology |
|
Yes |
| Sun, 19 Apr 2026 11:49:29 GMT |
To be Your Hero |
vulnerability |
|
Yes |
| Sun, 19 Apr 2026 12:26:27 GMT |
Shared Preferences Exposure — Mobile Apps Security Static Analy... |
cyber-security-awareness |
|
Yes |
| Sun, 19 Apr 2026 08:06:46 GMT |
The "Informative" Trap: A Bug Bounty Autopsy |
pentesting |
|
Yes |
| Sun, 19 Apr 2026 13:52:14 GMT |
How I Found an Unauthenticated POST Endpoint in a Production API... |
bug-bounty, hacking, ethical-hacking |
|
Yes |
| Sun, 19 Apr 2026 09:59:09 GMT |
Why We Choose to Hide |
vulnerability |
|
Yes |
| Sun, 19 Apr 2026 14:39:14 GMT |
डिजिटल यà¥�गातील सà¥�रकà¥�षा à¤... |
cyber-security-awareness |
|
Yes |
| Sun, 19 Apr 2026 18:39:13 GMT |
Try Hack Me- Dave’s Blog Walkthrough |
penetration-testing |
|
Yes |
| Sun, 19 Apr 2026 13:39:54 GMT |
Sourcing Hack with Cursor: ATS Reverse-Engineering for Scalable C... |
hacking |
|
Yes |
| Sun, 19 Apr 2026 10:59:47 GMT |
LLMGoat: Offensive LLM Security Environment |
infosec |
|
Yes |
| Sun, 19 Apr 2026 18:57:38 GMT |
IDE [Try Hack Me] machine Walkthrough : |
bug-bounty, penetration-testing, hacking, infosec |
|
Yes |
| Sun, 19 Apr 2026 12:13:13 GMT |
How Attackers Use Legit Tools Like PowerShell & RDP to Stay Invis... |
bug-bounty |
|
Yes |
| Sun, 19 Apr 2026 19:02:03 GMT |
Stored XSS via Custom Template Injection — How I Bypassed Cloud... |
bug-bounty, vulnerability |
|
Yes |
| Sun, 19 Apr 2026 18:33:23 GMT |
Turning a Breach into a Blueprint: Cybersecurity Lessons for Gove... |
information-security |
|
Yes |
| Sun, 19 Apr 2026 18:06:01 GMT |
Why Security is the Core of System Design |
security |
|
Yes |
| Sun, 19 Apr 2026 18:08:19 GMT |
At 16, I Chose to Fight Cybercrime |
hacking |
|
Yes |
| Sun, 19 Apr 2026 15:21:23 GMT |
Quarter Shift (GraphQL + SSRF) WebVerse |
hacking |
|
Yes |
| Sun, 19 Apr 2026 18:01:32 GMT |
Reducing token burn, Anthropic Mythos, How I use AI for pentestin... |
penetration-testing |
|
Yes |
| Sun, 19 Apr 2026 13:51:13 GMT |
Oracle VirtualBox: Lokal Ortamınızda Sanal Makineler Kurun |
information-technology |
|
Yes |
| Sun, 19 Apr 2026 19:04:39 GMT |
CTF@CIT 26 | OSINT Challenges Write-up |
information-security |
|
Yes |
| Sun, 19 Apr 2026 20:42:19 GMT |
Intermediate Practical Malware Analysis Course |
infosec, pentesting |
|
Yes |
| Sun, 19 Apr 2026 13:10:42 GMT |
Master Cybersecurity & Ethical Hacking — Start Your Career in t... |
ethical-hacking |
|
Yes |
| Sun, 19 Apr 2026 13:39:09 GMT |
Bilgisayarınızın Sanallaştırma Teknolojisini VirtualBox’ı... |
information-technology |
|
Yes |
| Sun, 19 Apr 2026 13:21:17 GMT |
Break Into Cybersecurity in 2026 — Start Your GSEC Prep the Sma... |
ethical-hacking |
|
Yes |
| Sun, 19 Apr 2026 22:01:27 GMT |
Do Lagosians Know the Emergency Number? Why Seconds Matter in an ... |
security |
|
Yes |
| Sun, 19 Apr 2026 07:10:14 GMT |
The Emotional Lifecycle of a Bug |
bugs |
|
Yes |
| Sun, 19 Apr 2026 12:07:36 GMT |
Poster — TryHackMe WalkThrough |
penetration-testing |
|
Yes |
| Sun, 19 Apr 2026 17:13:12 GMT |
Hardware Hacking Survival: Bypassing PC Limitations to Flash a Bo... |
bug-bounty, bug-bounty-tips |
|
Yes |
| Sun, 19 Apr 2026 02:06:36 GMT |
CTF Overpass2 | TryHackMe |
pentesting |
|
Yes |
| Sun, 19 Apr 2026 01:41:37 GMT |
Dari Web ke Data: Mengambil dan Mengolah Data Secara Efektif |
information-technology |
|
Yes |
| Sun, 19 Apr 2026 10:08:14 GMT |
From Nothing to Full Admin Access: Chaining Broken Access Control... |
vulnerability |
|
Yes |
| Sun, 19 Apr 2026 19:11:05 GMT |
TryHackMe — VulnNet: Active: Writeup |
penetration-testing, ethical-hacking |
|
Yes |
| Sun, 12 Apr 2026 10:48:18 GMT |
Ubah Keterampilan Anda Menjadi ALPH: Panduan Hadiah Alphland |
bounty-program |
|
|
| Sun, 14 Dec 2025 06:37:06 GMT |
My Bug Bounty Diary |
subdomain-enumeration |
|
|
| Mon, 26 Jan 2026 02:10:21 GMT |
The Truth About Internet Capital Markets |
bounty-program |
|
|
| Mon, 02 Mar 2026 00:00:27 GMT |
TakeOver | TryHackMe Write-up | Farros |
subdomain-takeover |
|
|
| Tue, 14 Apr 2026 18:22:58 GMT |
File Upload Vulnerabilities |
remote-code-execution |
|
|
| Thu, 28 Sep 2023 23:05:39 GMT |
Archangel — TryHackMe |
log-poisoning |
|
|
| Sun, 21 Sep 2025 07:02:30 GMT |
Affordable but Vulnerable? The Dark Side of CMORE HMI |
censys |
|
|
| Sat, 04 Jan 2025 17:20:23 GMT |
GitHub dork |
github-dorking |
|
|
| Wed, 15 Apr 2026 21:24:04 GMT |
TryHackMe SAST Walkthrough |
application-security |
|
|
| Mon, 23 Mar 2026 06:32:32 GMT |
What Is Remote Code Execution (RCE)? How It Works, Risks & Preven... |
remote-code-execution |
|
|
| Sun, 01 Mar 2026 14:20:56 GMT |
Valenfind— CTF Writeup |
local-file-inclusion |
|
|
| Fri, 17 Apr 2026 08:58:13 GMT |
You Can’t Hack What You Don’t See: Reconnaissance and Nmap Ex... |
vapt |
|
|
| Thu, 02 Apr 2026 07:24:26 GMT |
Cross Site Scripting (XSS): |
xss-vulnerability |
|
|
| Sat, 07 Mar 2026 01:11:15 GMT |
The Silent Observer: A Deep Dive into Shodan Dorks for Security R... |
shodan |
|
|
| Fri, 01 Aug 2025 06:17:06 GMT |
15,000 Critical Systems Are Exposed — Thanks to This Outdat... |
censys |
|
|
| Fri, 13 Mar 2026 07:57:18 GMT |
Information disclosure in error messages | Lab -01 |
information-disclosure |
|
|
| Sun, 08 Mar 2026 06:50:53 GMT |
XSS Inbound Attack: I Didn’t Steal Your Cookie. I Stole Your So... |
xss-bypass |
|
|
| Wed, 01 Apr 2026 09:33:58 GMT |
How to earn VDS in Vadeus Network [Rewards Center] |
bounty-program |
|
|
| Thu, 14 Aug 2025 10:08:18 GMT |
Predictive Analytics and Voice Technology: A Winning Combination ... |
vdp |
|
|
| Thu, 16 Apr 2026 06:57:18 GMT |
Microsoft Fixed 160+ Vulnerabilities This Week. That’s Not the ... |
bugs |
|
|
| Mon, 23 Mar 2026 15:20:20 GMT |
How I Found a Critical Account Takeover Vulnerability in a Passwo... |
bug-bounty-hunter |
|
|
| Wed, 11 Feb 2026 21:37:40 GMT |
From Course Notes to CVE: How a GXPN Study Session Uncovered a 40... |
vulnerability-disclosure |
|
|
| Fri, 10 Apr 2026 11:19:48 GMT |
Stored XSS via Image Upload and MIME-Type Confusion |
security-research |
|
|
| Sat, 28 Feb 2026 21:11:37 GMT |
I Shouldn’t Be Sharing This: The 2026 Google Dork Bible That St... |
google-dork |
|
|
| Thu, 09 Apr 2026 07:47:17 GMT |
Love Letter Locker — TryHackMe Writeup |
idor |
|
|
| Fri, 24 Jan 2025 09:34:52 GMT |
A new Holistic temple opening InLeeds |
web-pentest |
|
|
| Sun, 05 Apr 2026 04:31:15 GMT |
IDOR: Unauthorized Invoice Access on a Major Job Portal |
idor |
|
|
| Tue, 03 Mar 2026 19:29:30 GMT |
Wie angreifbar ist Ihr Unternehmen wirklich? |
pentest |
|
|
| Wed, 25 Feb 2026 02:51:18 GMT |
Impact Scenario Hackviser |
local-file-inclusion |
|
|
| Fri, 10 Apr 2026 14:04:29 GMT |
CVE-2023–6553 WordPress Backup Migration ≤1.3.7 Case Study |
exploit, rce |
|
|
| Mon, 13 Apr 2026 09:28:55 GMT |
EspoCRM v9.3.4: From Extension Upload to Remote Code Execution (R... |
rce |
|
|
| Fri, 17 Apr 2026 15:49:50 GMT |
The Double User Bug: How a Facebook OAuth Flow Created Unnecessar... |
bugs |
|
|
| Tue, 14 Apr 2026 21:27:21 GMT |
Language-Specific File Upload Exploits and EXIF-Based Attacks |
rce |
|
|
| Fri, 10 Nov 2023 03:38:01 GMT |
Apache error.log advanced Log poisoning RCE |
log-poisoning |
|
|
| Sun, 15 Mar 2026 17:49:52 GMT |
TryHackMe — Takeover Writeup |
subdomain-takeover |
|
|
| Wed, 25 Mar 2026 10:55:24 GMT |
METASPLOIT EXPLOIT |TRYHACKME PREMIUM |
cyber-sec |
|
|
| Wed, 15 Apr 2026 12:44:48 GMT |
My First Accepted HackerOne Report: Finding Exposed Weglot API Ke... |
hackerone |
|
|
| Wed, 25 Mar 2026 17:00:00 GMT |
CVE-2026–33139 How I Found My First CVE: Bypassing PySpector’... |
security-research |
|
|
| Thu, 21 Aug 2025 10:04:08 GMT |
Dork Like a Demon: FOFA Edition for Hackers & Bug Bounty Hunters |
dorking |
|
|
| Fri, 03 Apr 2026 12:07:45 GMT |
Understanding OTP Verification Bypass via Client-Side Response Ma... |
security-research |
|
|
| Thu, 29 Jan 2026 21:21:39 GMT |
Turning Fuzzing Into $2,550: How a Simple Bug Gave Me Access to E... |
bounties |
|
|
| Fri, 17 Apr 2026 15:51:57 GMT |
The 2026 Shodan Dork Bible: Finding Exposed Jenkins, Grafana, and... |
google-dork, shodan |
|
|
| Mon, 02 Feb 2026 17:05:37 GMT |
Lab: Web cache poisoning to exploit a DOM vulnerability via a cac... |
web-cache-poisoning |
|
|
| Sun, 12 Apr 2026 11:20:34 GMT |
SSRF Attack — When the Server Becomes the Attacker | CAISD |
ssrf |
|
|
| Tue, 31 Mar 2026 09:02:27 GMT |
Securing the Edges: A Practical Way to Handle XSS in Modern Apps |
cross-site-scripting, xss-vulnerability |
|
|
| Tue, 14 Apr 2026 09:37:31 GMT |
How I Bypassed LG’s Account Verification with a Simple URL Edit |
hackerone |
|
|
| Fri, 17 Apr 2026 07:16:15 GMT |
The AI Agent Attack Surface in 2026: From MCP Tools to Webhook-Ex... |
application-security |
|
|
| Fri, 10 Apr 2026 14:53:24 GMT |
The Ultimate Guide to Proxying and Pentesting MCP Servers!! |
pentest |
|
|
| Wed, 08 Apr 2026 13:36:15 GMT |
WP FILE UPLOAD PLUGIN |
file-upload |
|
|
| Thu, 08 Jan 2026 09:02:50 GMT |
osint-Forgotten Ruins bounty $$ |
bounties |
|
|
| Sun, 05 Apr 2026 18:11:17 GMT |
Information Disclosure Through Unrestricted API Endpoints |
information-disclosure |
|
|
| Thu, 09 Apr 2026 21:55:43 GMT |
Drift Protocol, Solv Protocol, and LAXO Token Exploits: $287M Los... |
exploit |
|
|
| Sat, 20 Apr 2024 17:20:58 GMT |
TryHackMe — Brute Walkthrough | TheHiker |
log-poisoning |
|
|
| Thu, 26 Mar 2026 14:29:57 GMT |
Your SSH Keys, API Credentials, and AI Secrets Are at Risk — Th... |
api-key |
|
|
| Fri, 17 Apr 2026 19:01:54 GMT |
The Ultimate Guide to Wayback Machine Dorking for Deleted Leaks |
google-dorking, dorking |
|
|
| Sun, 05 Apr 2026 20:11:41 GMT |
I Tried Logging In… and Accidentally Did Responsible Disclosure... |
vdp |
|
|
| Tue, 14 Apr 2026 13:07:05 GMT |
My “Gemini� Is Named Mike |
dorks |
|
|
| Thu, 20 Nov 2025 17:16:47 GMT |
The Health Factor: How DorkFi Keeps Your Position Safe |
dorks |
|
|
| Tue, 09 Sep 2025 10:14:01 GMT |
The Psychology of Listings: Why Users Trust Some Directories More... |
directory-listing |
|
|
| Thu, 09 Apr 2026 18:40:35 GMT |
Reflected XSS via HTML Attribute Manipulation — Hackviser Labs |
xss-vulnerability |
|
|
| Sat, 28 Mar 2026 08:13:46 GMT |
How Exposed n8n Webhooks Become an Attack Surface |
shodan |
|
|
| Sat, 14 Feb 2026 05:46:19 GMT |
CVE-2025–4406 Writeup: Stored XSS on wpForo Forum |
xss-bypass |
|
|
| Sun, 08 Mar 2026 11:01:01 GMT |
I Paid $500 for AI Directory Listings. Here Is My Honest ROI Brea... |
directory-listing |
|
|
| Thu, 09 Apr 2026 06:47:52 GMT |
Jailbreak-Type Characteristics in iOS: Behavior, Risks, and Secur... |
vapt |
|
|
| Fri, 19 Sep 2025 07:40:16 GMT |
How I Tracked Our Clients’ Device Versions Without Direct Repor... |
zoomeye |
|
|
| Thu, 02 Apr 2026 16:25:47 GMT |
Why Most Recon Pipelines Break After a Week |
recon |
|
|
| Mon, 30 Mar 2026 13:22:15 GMT |
Web Security Series #12 — Cookie Theft via Stored XSS |
cross-site-scripting |
|
|
| Mon, 13 Apr 2026 15:06:48 GMT |
DOT Hacked: The Hyperbridge Exploit |
exploit |
|
|
| Thu, 09 Apr 2026 17:40:41 GMT |
I Got Tired of Running 15 Different Nmap Commands. So I Built My ... |
vulnerability-scanning |
|
|
| Sat, 04 Apr 2026 08:13:07 GMT |
DVWA: File Upload Vulnerability (Low Security) |
file-upload |
|
|
| Sat, 11 Apr 2026 05:12:45 GMT |
Pentester Labs Recon 02 Writeup |
recon |
|
|
| Sat, 28 Mar 2026 10:41:03 GMT |
Subfinder Subdomains Dhundho Like an Elite Hacker! (Hinglish Mein... |
recon |
|
|
| Thu, 02 Apr 2026 17:35:36 GMT |
How I Found a Subdomain Takeover via BetterUptime |
subdomain-takeover |
|
|
| Wed, 28 Jan 2026 07:31:37 GMT |
Lab: Targeted web cache poisoning using an unknown header | Port... |
web-cache-poisoning |
|
|
| Sun, 07 Dec 2025 06:18:32 GMT |
Breaking the Perimeter: How My Custom Python Tool Bypassed a Fede... |
vdp |
|
|
| Fri, 27 Mar 2026 11:58:55 GMT |
Why Beginners Fail in Bug Bounty (And How to Fix It in 2026) |
bug-bounty-hunter |
|
|
| Thu, 16 Apr 2026 08:30:30 GMT |
Çanlar Kimin İçin Çalıyor — Claude Mythos |
xss-attack |
|
|
| Wed, 15 Apr 2026 19:03:58 GMT |
7 Prompt Injection Attacks Researchers Proved Are Real in 2026 |
application-security |
|
|
| Mon, 06 Apr 2026 21:37:15 GMT |
Walkthrough: Executing Local File Inclusion and Remote Code Execu... |
remote-code-execution, local-file-inclusion |
|
|
| Fri, 13 Mar 2026 14:55:26 GMT |
Web Security Series #2 — Bypassing Authentication via MFA Tampe... |
bug-bounty-hunting |
|
|
| Fri, 31 May 2024 13:29:16 GMT |
Map of the worlds best URLs 2025 |
log-poisoning |
|
|
| Sat, 18 Apr 2026 09:39:43 GMT |
MythX: An Endgame Protocol |
application-security |
|
|
| Sun, 15 Mar 2026 11:14:38 GMT |
Local File Inclusion (LFI) in Leave Application System (PHP & SQL... |
lfi |
|
|
| Wed, 25 Feb 2026 14:23:06 GMT |
Lo-Fi TryHackMe Writeup |
lfi, file-inclusion |
|
|
| Thu, 02 Apr 2026 07:44:22 GMT |
SeedLab: Cross-Site Scripting(XXS) Attack Writeup |
cross-site-scripting |
|
|
| Mon, 30 Mar 2026 13:14:30 GMT |
Gaining Cybersecurity Knowledge as a Cybersecurity Student: My Fi... |
cybersecurity-tools |
|
|
| Sat, 06 Dec 2025 17:05:14 GMT |
GitHub Pages Subdomain Takeover on aiaa-dpw.larc.nasa.gov (NASA V... |
subdomain-takeover |
|
|
| Tue, 07 Apr 2026 12:18:46 GMT |
I Changed One Number. Then I Found Everything. |
idor |
|
|
| Mon, 06 Apr 2026 10:39:59 GMT |
Bug Bounty / Web Application Security Hunting Checklist - 2026 XS... |
bug-bounty-hunter |
|
|
| Sat, 28 Mar 2026 05:15:09 GMT |
LLM Vulnerability to Internet Source Manipulation |
security-research |
|
|
| Sun, 08 Feb 2026 12:21:01 GMT |
How AI Became My Reporting Partner in Security Research |
bugcrowd |
|
|
| Thu, 12 Mar 2026 22:51:26 GMT |
Payment Bypass That Let Me Get a Premium Course for $0 [Business... |
bugcrowd |
|
|
| Mon, 17 Nov 2025 09:27:29 GMT |
200 reports, 11 valid bugs, 0 critical issues. Here’s everythin... |
vdp |
|
|
| Thu, 12 Mar 2026 05:18:51 GMT |
How I Found Information Disclosure on a Non-Standard Port: The St... |
information-disclosure |
|
|
| Tue, 07 Apr 2026 17:39:45 GMT |
TuesdayTool 43: OSINT.club — A Hub for Modern Open-Source Intel... |
cybersecurity-tools |
|
|
| Fri, 20 Feb 2026 18:55:00 GMT |
12+ MUST Know Google Dorking Commands in 2026 |
google-dorking |
|
|
| Mon, 06 Apr 2026 21:45:53 GMT |
Cookie(Çerez) Türleri ve Pentest Açısından Önemi |
web-pentest |
|
|
| Fri, 20 Feb 2026 14:44:02 GMT |
XSS Attack Methodology: How Attackers Actually Exploit Your Brows... |
xss-bypass |
|
|
| Wed, 15 Apr 2026 21:50:32 GMT |
The Session That Never Dies: Session Fixation & Hijacking on a Re... |
bug-bounty-tips, bugs, bugbounty-writeup |
|
|
| Fri, 17 Apr 2026 01:05:26 GMT |
Article 1: Points Are Money: The Case for LARS ( Loyalty Applicat... |
bugbounty-writeup |
|
|
| Tue, 14 Apr 2026 17:57:17 GMT |
Day-3 Bypassing XSS with Hash Parameter |
bug-bounty-writeup |
|
|
| Wed, 10 Dec 2025 12:06:41 GMT |
Strengthening Web3 Security: Recent Vulnerability Findings from Y... |
vulnerability-disclosure |
|
|
| Tue, 24 Feb 2026 23:01:09 GMT |
A Step-by-Step Guide to Uncovering Vulnerabilities in a Mobile Ap... |
lfi |
|
|
| Mon, 13 Apr 2026 05:39:47 GMT |
Yukthi CTF 2.0 Deep Dive: From JS Deobfuscation to Protocol-Level... |
idor |
|
|
| Tue, 31 Mar 2026 13:05:08 GMT |
Robots CTF | TryHackMe Walkthrough |
xss-vulnerability |
|
|
| Mon, 13 Apr 2026 13:50:21 GMT |
From BOLA to Account Takeover via javascript: URI Injection |
xss-attack |
|
|
| Thu, 16 Apr 2026 10:24:30 GMT |
Why Every Business Needs a Penetration Test in 2026 |
pentest |
|
|
| Thu, 05 Mar 2026 21:41:26 GMT |
Finding a P1 in NASA: The Power of Google Dorking |
google-dork |
|
|
| Wed, 11 Feb 2026 19:07:33 GMT |
Google Search Operators You Can Use |
google-dork |
|
|
| Wed, 12 Feb 2025 22:46:35 GMT |
https://www.express.co.uk/life-style/property/2012927/cleaning-ch... |
web-pentest |
|
|
| Thu, 19 Mar 2026 22:19:50 GMT |
Vulnerability Scanning 101: How to Manage Your Vulnerabilities |
vulnerability-scanning |
|
|
| Fri, 17 Apr 2026 04:53:23 GMT |
How I Found an Exposed Google Maps API Key on a Global Brand’s ... |
hackerone, vdp |
|
|
| Tue, 07 Apr 2026 11:05:52 GMT |
OT/ICS Cybersecurity Tools: A Professional Field Guide |
cybersecurity-tools |
|
|
| Tue, 05 Dec 2023 07:54:40 GMT |
LFI via SMTP log poisoning |
log-poisoning |
|
|
| Fri, 03 Apr 2026 08:19:32 GMT |
Why API Key Security Should Be Your Startup’s First Priority |
api-key |
|
|
| Mon, 16 Mar 2026 18:05:08 GMT |
xss0r V6 is Finally Released! |
xss-bypass |
|
|
| Sat, 18 Apr 2026 11:47:30 GMT |
WolfSSL Hunting Experience: A Gen Z Bug Hunter’s Story |
bug-bounty-tips |
|
|
| Thu, 12 Mar 2026 15:02:24 GMT |
Using Claude Opus 4.6 for Codebase Vulnerability Discovery |
bugcrowd |
|
|
| Fri, 20 Mar 2026 23:01:01 GMT |
How I Automated Google Dorking with a Simple Bookmarklet |
google-dorking |
|
|
| Wed, 18 Feb 2026 21:56:48 GMT |
Chapter 14: Subdomain Takeover |
subdomain-takeover |
|
|
| Fri, 03 Apr 2026 07:21:16 GMT |
Why API Key Security Should Be Your Startup’s First Priority |
api-key |
|
|
| Sat, 25 Oct 2025 12:23:25 GMT |
How to find leaks on GitHub as a beginner. Logic is main key |
github-dorking |
|
|
| Mon, 09 Mar 2026 06:56:21 GMT |
File Inclusion Vulnerability: Easy concept explanation |
file-inclusion |
|
|
| Sun, 12 Apr 2026 02:19:51 GMT |
WHEN "NOT A VULNERABILITY" GETS PATCHED IN 72 HOURS By Ahmed Bata... |
security-research |
|
|
| Thu, 02 Apr 2026 12:05:48 GMT |
IoT Cihazlar: Evinizde ki Yabancı |
shodan |
|
|
| Thu, 12 Feb 2026 03:11:00 GMT |
XSS & SVG: PentesterLab Feb2026 |
xss-bypass |
|
|
| Thu, 12 Mar 2026 15:22:45 GMT |
TryHackMe | Lo-Fi |
local-file-inclusion |
|
|
| Wed, 15 Apr 2026 11:37:09 GMT |
From Vulnerability to Victory: How VAPT Tools Shield Your IT Infr... |
vapt |
|
|
| Thu, 16 Apr 2026 06:41:10 GMT |
The Hacker Left Comments in the Malware… So I Reverse Engineere... |
bugbounty-writeup |
|
|
| Thu, 14 Aug 2025 10:54:38 GMT |
Unlocking the Hidden Power of Search Engines |
censys |
|
|
| Thu, 09 Oct 2025 18:33:05 GMT |
0-click Account Takeover via Punycode |
bug-bounty-program |
|
|
| Sat, 18 Apr 2026 16:14:19 GMT |
Reflected XSS |
xss-attack, xss-vulnerability |
|
|
| Thu, 19 Feb 2026 04:57:17 GMT |
Introducing “Information Gathering� as the First Phase of Web... |
google-dorking |
|
|
| Sat, 21 Mar 2026 17:45:32 GMT |
CVE-2025–66034 POC |
remote-code-execution |
|
|
| Thu, 09 Apr 2026 17:15:12 GMT |
Understanding HTTP Request Smuggling: A Critical Web Security Vul... |
vapt |
|
|
| Tue, 31 Mar 2026 13:11:54 GMT |
TryHackMe — Intro to SSRF (Walkthrough) |
ssrf |
|
|
| Fri, 17 Apr 2026 06:30:17 GMT |
Resumable File Uploads in the Browser Using the File System Acces... |
file-upload |
|
|
| Mon, 13 Apr 2026 06:20:22 GMT |
Veeam Plaintext Credential Exposure PoC: From Local Access to Pri... |
security-research |
|
|
| Mon, 26 Jan 2026 07:25:06 GMT |
How Forgotten DNS Records Lead to Subdomain Takeovers |
subdomain-takeover |
|
|
| Sat, 11 Apr 2026 13:25:57 GMT |
Attacker Can Edit Other Users Profile in a Real World Platform |
exploit |
|
|
| Sat, 18 Apr 2026 23:15:09 GMT |
Day-6: Let’s do some labs on CSRF |
bug-bounty-tips, bug-bounty-writeup |
|
|
| Sat, 18 Apr 2026 20:40:10 GMT |
The Compound Bug: When Two Quiet Flaws Conspire |
bugs |
|
|
| Mon, 06 Apr 2026 18:35:09 GMT |
Manual vs Automated Security Testing in the Age of AI: A Security... |
vulnerability-scanning |
|
|
| Fri, 17 Apr 2026 11:55:52 GMT |
How to Upload Files in Spring Boot (Single & Multiple File Upload... |
file-upload |
|
|
| Thu, 13 Feb 2025 03:29:37 GMT |
ZoomEye Meets DeepSeek: AI-Powered Cyberspace Intelligence |
zoomeye |
|
|
| Fri, 06 Mar 2026 12:01:01 GMT |
Salà de compras y terminé en Roma |
bounty-program |
|
|
| Sat, 18 Apr 2026 08:57:59 GMT |
Breaking Into a Major Email Platform With Two Vulnerabilities |
hackerone |
|
|
| Tue, 14 Apr 2026 09:57:40 GMT |
Pentester Lab 06 Writeup |
recon |
|
|
| Tue, 14 Apr 2026 18:41:03 GMT |
CVE-2026–39980 Analysis and POC |
exploit |
|
|
| Sat, 11 Apr 2026 05:51:46 GMT |
[CMesS] — Gila CMS 1.10.9 |
rce |
|
|
| Wed, 22 Oct 2025 14:11:32 GMT |
Mastering Subdomain Enumeration: A Beginner’s Guide to Expandin... |
subdomain-enumeration |
|
|
| Thu, 27 Mar 2025 23:46:11 GMT |
Make Break and Betrayal |
web-pentest |
|
|
| Wed, 11 Mar 2026 08:12:14 GMT |
The Bug Bounty Hunter Roadmap (2026): From Curious Beginner to Re... |
bug-bounty-hunting |
|
|
| Wed, 15 Apr 2026 23:45:11 GMT |
CVE-2026–35031: Critical Path Traversal to RCE in Jellyfin Medi... |
cve |
|
|
| Tue, 10 Mar 2026 09:59:23 GMT |
I Thought I Found 259 Exposed Systems in Bengaluru… I Was Wrong |
shodan |
|
|
| Sun, 22 Mar 2026 14:53:56 GMT |
Source code disclosure via backup files | Lab-03 |
information-disclosure |
|
|
| Tue, 24 Mar 2026 07:41:00 GMT |
How I Built a Directory Listing Site (ToolIndex.net) and What I L... |
directory-listing |
|
|
| Tue, 23 Sep 2025 13:01:51 GMT |
Why Email Marketing Is the Secret Growth Tool for Directory Websi... |
directory-listing |
|
|
| Sun, 13 Jul 2025 16:32:21 GMT |
ProConOS Exposed: What ICS Security Teams Need to Know |
censys |
|
|
| Sat, 14 Feb 2026 22:03:31 GMT |
6 Hours, 6 Real-world Critical Bugs: A Case Study in Efficient Bu... |
cyber-sec |
|
|
| Thu, 16 Apr 2026 15:27:28 GMT |
How I Bypassed File Upload Restrictions Using a phar Polyglot |
bugbounty-writeup |
|
|
| Sun, 24 Aug 2025 20:18:55 GMT |
How I found an Account Lockout Vulnerability Without Any Tools |
bug-bounty-program |
|
|
| Mon, 13 Apr 2026 01:50:35 GMT |
Cool Open Redirect With Bypass |
hackerone |
|
|
| Sat, 25 Jan 2025 23:20:10 GMT |
Full GitHub Dorking guide: for OSINT and BugBounty (Reconnaissanc... |
github-dorking |
|
|
| Mon, 09 Mar 2026 18:49:55 GMT |
Walkthrough: Vulnerability Scanning w/ OpenVAS |
vulnerability-scanning |
|
|
| Sun, 05 Apr 2026 12:44:05 GMT |
�� From SSRF to Full AWS Takeover: A Hands-On Cloud Security ... |
ssrf |
|
|
| Thu, 18 Sep 2025 05:45:26 GMT |
Data Accuracy in Directory Websites: Why Clean Listings = Loyal U... |
directory-listing |
|
|
| Sat, 18 Apr 2026 15:47:30 GMT |
Your AI Coding Assistant Is Shipping Secrets to Production — Ho... |
cve |
|
|
| Sat, 28 Mar 2026 06:56:48 GMT |
The Definitive Guide to Secret Management in Python AI Projects |
api-key |
|
|
| Fri, 03 Apr 2026 23:30:20 GMT |
Security Advisory: QuickLaunch SSO Platform — Unauthenticated C... |
information-disclosure |
|
|
| Tue, 14 Apr 2026 17:24:57 GMT |
PAM Cleanup in Practice: Discovery, Risk Triage and Lifecycle Gov... |
cyber-sec |
|
|
| Sat, 18 Apr 2026 04:31:01 GMT |
IDOR Insecure Direct Object Reference: ID Badlo, Data Dekho, Boun... |
idor |
|
|
| Sun, 22 Mar 2026 10:40:15 GMT |
DVWA: File Inclusion Vulnerability (Low Security) |
local-file-inclusion, file-inclusion |
|
|
| Thu, 16 Apr 2026 06:31:55 GMT |
File Upload on DVWA |
file-upload |
|
|
| Sun, 12 Apr 2026 17:35:59 GMT |
Logical Issue Allowed Me to Create Support Cases Instead of Organ... |
bugbounty-writeup |
|
|
| Sat, 18 Apr 2026 14:01:01 GMT |
Cybersecurity in Laravel: The Most Common Attacks and How to Stop... |
xss-attack |
|
|
| Thu, 02 Oct 2025 06:59:46 GMT |
Endless Cashback Glitch:How I Unlocked Unlimited Free Orders with... |
bug-bounty-program |
|
|
| Thu, 19 Feb 2026 12:53:45 GMT |
Lab: Web cache poisoning via HTTP/2 request tunnelling | Portswi... |
web-cache-poisoning |
|
|
| Mon, 16 Mar 2026 14:32:42 GMT |
Web Security Series #5 — Exploiting Broken Access Control via T... |
bug-bounty-hunting |
|
|
| Sun, 12 Apr 2026 11:29:50 GMT |
How a Simple IDOR Earned Me a $10000+ Bounty |
idor |
|
|
| Thu, 26 Feb 2026 00:47:58 GMT |
From Shodan Recon to Multiple Security Flaws in the Same Program |
shodan |
|
|
| Fri, 17 Apr 2026 15:39:41 GMT |
Bug Bounty 2026: Why the “End of the World� is Actually a $50... |
bounties |
|
|
| Tue, 18 Nov 2025 08:33:41 GMT |
A Chain of Vulnerabilities Leading to Critical Information Disclo... |
bug-bounty-program |
|
|
| Sat, 28 Feb 2026 09:31:10 GMT |
Google Dork’un Pentest Yaşam Döngüsündeki Yeri |
google-dork |
|
|
| Wed, 05 Nov 2025 12:42:46 GMT |
How I Hacked Bank’s Admin Portal |
vdp |
|
|
| Thu, 05 Mar 2026 21:45:19 GMT |
Berlin im Visier der Hacker: Warum jedes Unternehmen heute einen ... |
pentest |
|
|
| Sat, 18 Apr 2026 11:35:13 GMT |
WolfSSL Hunting Experience: Cerita Dari Seorang Bug Hunter Pengan... |
bug-bounty-tips |
|
|
| Wed, 08 Apr 2026 20:24:00 GMT |
Stop Guessing XSS Payloads |
cross-site-scripting |
|
|
| Thu, 11 Sep 2025 22:20:14 GMT |
It’s Coming: DorkFi Delivers PreFi Rewards Surge |
dorking |
|
|
| Sat, 18 Apr 2026 20:01:01 GMT |
Natural Capital, Deep Time, and What Refuses to Be Measured |
information-disclosure |
|
|
| Sat, 21 Feb 2026 14:47:36 GMT |
AI Innovation or Market Disruption? |
vulnerability-scanning |
|
|
| Mon, 06 Apr 2026 06:22:38 GMT |
Bug Bounty: JSONP Callback Vulnerability Explained |
xss-vulnerability |
|
|
| Tue, 14 Apr 2026 10:19:13 GMT |
Pentester Lab Recon 07 Writeup |
recon |
|
|
| Fri, 06 Feb 2026 06:33:08 GMT |
5 Ways to Bypass Email Verification Without Using Any Tool |
bug-bounty-program |
|
|
| Thu, 02 Apr 2026 18:59:50 GMT |
File Inclusion (LFI/RFI) — Extracting Sensitive Data from confi... |
local-file-inclusion, file-inclusion |
|
|
| Mon, 17 Nov 2025 23:45:18 GMT |
DorkFi: The Triumph of a Team You Can Trust |
dorks |
|
|
| Fri, 10 Apr 2026 03:52:51 GMT |
PortSwigger Lab: Insecure Direct Object References (IDOR) — Cha... |
idor |
|
|
| Wed, 08 Apr 2026 19:31:38 GMT |
Pentester Labs Recon 00 write up |
recon |
|
|
| Thu, 29 Jan 2026 05:03:15 GMT |
Subdomain Takeover: Understanding, Detecting, and Recovering from... |
subdomain-takeover |
|
|
| Sun, 12 Apr 2026 02:23:24 GMT |
WHEN "NOT A VULNERABILITY" GETS PATCHED IN 72 HOURS By Ahmed Bata... |
security-research |
|
|
| Tue, 15 Jul 2025 12:15:58 GMT |
“Secure� OPC UA Setups Are Being Hacked — Here’s Why |
censys |
|
|
| Fri, 17 Apr 2026 18:12:18 GMT |
Exploiting HTTP request smuggling to capture other users’ reque... |
hackerone |
|
|
| Thu, 16 Apr 2026 03:29:59 GMT |
day -4 Cross-site request forgery (CSRF) |
bug-bounty-tips, bug-bounty-writeup |
|
|
| Fri, 17 Apr 2026 14:36:23 GMT |
Race Condition Exploitation in Poll Systems: How I Manipulated Vo... |
hackerone, bug-bounty-writeup |
|
|
| Tue, 12 Aug 2025 17:24:22 GMT |
How I Removed Other User`s Uploaded Images in a Few Clicks |
bug-bounty-program |
|
|
| Tue, 23 Dec 2025 06:58:24 GMT |
How I Found Vulnerabilities in NASA and Got into the Hall of Fame |
vulnerability-disclosure |
|
|
| Sun, 15 Feb 2026 09:26:13 GMT |
TryHackMe Walkthrough -Subdomain Enumeration |
subdomain-enumeration |
|
|
| Fri, 10 Apr 2026 17:58:12 GMT |
Mastering Server-Side Request Forgery (SSRF) — From Basic Explo... |
ssrf |
|
|
| Sat, 18 Apr 2026 23:59:09 GMT |
Cybersecurity & AI-powered threats |
pentesting |
|
|
| Sat, 11 Apr 2026 18:05:11 GMT |
Ha0ker is the online identity of Gagandeep Singh, a professional ... |
bugcrowd |
|
|
| Wed, 19 Nov 2025 19:44:02 GMT |
The Pulse of Liquidity: How DorkFi’s Interest Rates Adapt in Re... |
dorks |
|
|
| Tue, 24 Mar 2026 16:47:04 GMT |
TuesdayTool 42: Domain Digger, One-Stop Interface For Domain Inve... |
cybersecurity-tools |
|
|
| Sun, 15 Mar 2026 16:45:35 GMT |
Web Security Series #4 — Discovering Unauthorized Resources via... |
bug-bounty-hunting |
|
|
| Thu, 16 Apr 2026 14:16:38 GMT |
From Debug Warnings to XSS: Exploiting a Drupal CMS Endpoint |
xss-attack, xss-vulnerability |
|
|
| Sun, 05 Apr 2026 13:27:30 GMT |
The Vault Sentry — A Startup’s Strategic Edge in Cybersecurit... |
api-key |
|
|
| Thu, 26 Mar 2026 03:31:59 GMT |
IDOR on Tesla Disclosing Users’ Emails |
bug-bounty-hunter |
|
|
| Thu, 16 Apr 2026 01:26:05 GMT |
How We Slashed Critical Vulnerabilities by 70% in Enterprise APIs |
application-security |
|
|
| Thu, 02 Apr 2026 16:16:16 GMT |
The Media Layer Most Teams Never Plan For (Until It Hurts): Why W... |
file-upload |
|
|
| Thu, 02 Apr 2026 20:20:02 GMT |
What a Real Autonomous Recon Pipeline Looks Like |
recon |
|
|
| Tue, 14 Apr 2026 15:39:15 GMT |
Two Auth Modes, One Bypass: Discovering a Hidden Attack Path in A... |
application-security |
|
|
| Wed, 08 Apr 2026 11:51:49 GMT |
Goodbye S3 SDK! AWS Just Turned Every Bucket Into a High-Speed Ha... |
file-upload |
|
|
| Wed, 16 Jul 2025 12:07:42 GMT |
Hackers Love This 1979 Protocol (Because It Can’t Defend Itself... |
censys |
|
|
| Wed, 08 Apr 2026 22:09:58 GMT |
How I Discovered a Blind SQL Injection in a Private program |
bugcrowd |
|
|
| Mon, 30 Mar 2026 19:18:38 GMT |
Juice Shop Write-up: DOM XSS Challenge |
cross-site-scripting |
|
|
| Sat, 04 Apr 2026 17:32:35 GMT |
How I Earned $200 in 5 Minutes Using a Simple Broken Link Hijack... |
bug-bounty-hunter |
|
|
| Mon, 13 Apr 2026 03:31:01 GMT |
Google Dorks Google Ko Bana Do Apna Hacking Tool: Free Mein Bugs ... |
google-dork |
|
|
| Sun, 21 Sep 2025 03:55:56 GMT |
Is it easy to discover a critical vulnerability [P1]Â ? |
directory-listing |
|
|
| Wed, 11 Mar 2026 18:53:25 GMT |
From Recon to Jackpot: IDOR That Exposed Billing Data and CHAINED... |
bug-bounty-hunter |
|
|
| Sat, 18 Apr 2026 01:52:21 GMT |
The Many Quirks of Linux libc — A Trail of Bits C/C++ Testing H... |
bug-bounty-writeup |
|
|
| Wed, 01 Apr 2026 07:55:42 GMT |
CVE-2026–24018: A Logic flaw to Local Privilege Escalation 0day... |
security-research |
|
|
| Sat, 02 Aug 2025 14:15:23 GMT |
The Silent Risk in Your ICS: Why S7 Protocol Needs Security Atten... |
censys |
|
|
| Tue, 24 Feb 2026 07:38:15 GMT |
Glassdoor’s IDOR vulnerability to retrieve email addresses of a... |
bounty-program |
|
|
| Sun, 05 Apr 2026 12:44:38 GMT |
Comment une faille XSS peut vider un compte bancaire |
cross-site-scripting |
|
|
| Wed, 25 Mar 2026 18:14:32 GMT |
Keterbukaan Informasi atau Terlalu Terbuka? |
information-disclosure |
|
|
| Thu, 09 Apr 2026 19:37:25 GMT |
Pentest Aşamaları Nelerdir? |
pentest |
|
|
| Mon, 13 Apr 2026 22:19:19 GMT |
Day-2 Bypassing No Brackets XSS Filter |
xss-attack |
|
|
| Tue, 14 Apr 2026 14:53:01 GMT |
Manipulating the Price Tag | PortSwigger — Excessive Trust in ... |
bugbounty-writeup |
|
|
| Sat, 07 Mar 2026 04:09:52 GMT |
Threat Intelligence Investigation — Dropbox Phishing Domain Ana... |
google-dorking |
|
|
| Sat, 11 Apr 2026 20:59:47 GMT |
Why Indian Startups Get Hacked Without Knowing It |
vapt |
|
|
| Mon, 13 Apr 2026 03:47:37 GMT |
Skip the Server: Direct S3 Uploads with Presigned URLs |
file-upload |
|
|
| Mon, 13 Apr 2026 14:14:34 GMT |
Zero‑Touch RCE (Remote Code Execution) Attack |
remote-code-execution |
|
|
| Tue, 18 Nov 2025 18:12:40 GMT |
Dork Labs Awarded AWS Activate Startup Grant |
dorks |
|
|
| Tue, 24 Mar 2026 13:18:44 GMT |
Information disclosure in version control history | Lab-05 |
information-disclosure |
|
|
| Sat, 18 Apr 2026 08:37:40 GMT |
12 Kerentanan pada Aplikasi AndroGoat: Proof of Concept (PoC) dan... |
application-security |
|
|
| Fri, 27 Feb 2026 00:44:16 GMT |
Walkthrough: Web Application Attacks - XSS, SQL Injections, Direc... |
local-file-inclusion |
|
|
| Wed, 08 Apr 2026 03:36:21 GMT |
The Importance of Security: How VAPT by TrustLayerLabs Protects M... |
vapt |
|
|
| Mon, 06 Apr 2026 13:55:29 GMT |
The 7 Golden Rules of Vulnerability Scanning |
vulnerability-scanning |
|
|
| Wed, 25 Feb 2026 11:25:59 GMT |
Understanding Modern Cybersecurity Practices for Scalable SaaS Pr... |
vulnerability-scanning |
|
|
| Sat, 14 Feb 2026 11:50:52 GMT |
SHODAN — SEOH |
shodan |
|
|
| Thu, 25 Dec 2025 00:47:15 GMT |
Subdomain Takeover Explained: Complete Step-by-Step Guide (Recon ... |
subdomain-takeover |
|
|
| Wed, 18 Feb 2026 04:39:59 GMT |
​"Beyond the Alert Box: Demonstrating Real-World XSS Impact" |
xss-bypass |
|
|
| Sat, 28 Feb 2026 14:32:47 GMT |
TryHackMe CTF Walkthrough- Love at First Breach 2026: Valenfind |
lfi |
|
|
| Mon, 02 Mar 2026 10:51:58 GMT |
How I Found Yet Another Misconfiguration on This College Site |
bug-bounty-hunting |
|
|
| Sat, 10 Jan 2026 05:03:45 GMT |
Lab:Web cache poisoning via an unkeyed query parameter | Portswi... |
web-cache-poisoning |
|
|
| Wed, 18 Feb 2026 06:00:02 GMT |
Google Dorking |
google-dorking |
|
|
| Wed, 08 Apr 2026 13:31:24 GMT |
Hunting on Flipkart: When Product Specs Become Payloads |
google-dork |
|
|
| Sun, 05 Apr 2026 05:02:34 GMT |
Exploiting an IPv6 Remote Code Execution Vulnerability: A Practic... |
remote-code-execution |
|
|
| Fri, 10 Apr 2026 13:00:28 GMT |
TryHackMe | Plant Photographer | Challenge | Writeup |
ssrf |
|
|
| Wed, 03 Dec 2025 23:26:26 GMT |
TryHackMe-TakeOver-WriteUp |
subdomain-takeover |
|
|
| Sun, 05 Apr 2026 08:08:21 GMT |
How I Built an Automated Recon Pipeline for Bug Bounty Hunting |
recon |
|
|
| Sun, 28 Dec 2025 08:13:44 GMT |
Subzy Tool |
subdomain-takeover |
|
|
| Sat, 04 Apr 2026 09:10:35 GMT |
We’ve messed up, a lot. Here’s Why Scribble Still Exists to c... |
bounties |
|
|
| Fri, 03 Apr 2026 08:30:09 GMT |
Inside The Vault Sentry — How We Detect and Stop API Key Leaks |
api-key |
|
|
| Sat, 11 Apr 2026 19:07:06 GMT |
Linux Kernel Use After Free Exploitation Technique in Linux Kerne... |
exploit |
|
|
| Tue, 13 Jan 2026 13:27:13 GMT |
Hacking “Time�: When Critical Infrastructure Forgets to Set a... |
vulnerability-disclosure |
|
|
| Mon, 16 Feb 2026 04:16:35 GMT |
Gratuité des transports au Mans : une promesse audacieuse de LFI |
lfi |
|
|
| Fri, 13 Mar 2026 00:00:04 GMT |
File Inclusion | TryHackMe Write-up | Farros |
file-inclusion |
|
|
| Mon, 13 Apr 2026 22:31:01 GMT |
The Cost of Trusting My Own Fingers |
bounties |
|
|
| Mon, 13 Apr 2026 22:53:20 GMT |
CVE-2023–6972 Wordpress Backup Migration ≤1.3.9 Arbitrary Fil... |
exploit, rce, security-research |
|
|
| Wed, 01 Apr 2026 18:43:56 GMT |
Lab: SQL injection attack, listing the database contents on Oracl... |
web-pentest |
|
|
| Tue, 14 Apr 2026 04:51:21 GMT |
Top Cybersecurity Tools Experts Use |
cybersecurity-tools |
|
|
| Wed, 15 Apr 2026 07:58:41 GMT |
The Rise of Dark Patterns in Apps and Their Impact on Users |
application-security |
|
|
| Fri, 17 Apr 2026 22:20:59 GMT |
Day 5 — CSRF Token Bypass using GET Request |
bug-bounty-tips, bug-bounty-writeup |
|
|
| Tue, 03 Feb 2026 17:12:47 GMT |
My First Week: 3 Business Logic Bugs in Major E-Commerce |
bug-bounty-program |
|
|
| Fri, 24 Jan 2025 00:08:47 GMT |
A majestic temple opportunity of wellbeing and wellness |
web-pentest |
|
|
| Thu, 09 Apr 2026 17:39:27 GMT |
From 401 to BAC: How a Refresh Broke Workspace Authorization |
vulnerability-disclosure |
|
|
| Fri, 25 Jul 2025 16:41:01 GMT |
� SubDNS-UI: Build Your Own Subdomain + DNS Enumerator with a C... |
subdomain-enumeration |
|
|
| Fri, 11 Jul 2025 16:20:24 GMT |
PC WORX: The Hidden Risk in Your Industrial Network |
censys |
|
|
| Tue, 14 Apr 2026 08:01:48 GMT |
GraphQL RCE: The Kill Chain to Cloud Identity…! |
rce |
|
|
| Fri, 20 Mar 2026 10:25:48 GMT |
Secure Spring Boot logs: Automatic masking of passwords, API keys... |
api-key |
|
|
| Sun, 17 Aug 2025 19:26:05 GMT |
ï·½ |
bug-bounty-program |
|
|
| Fri, 17 Apr 2026 18:21:00 GMT |
The 12-Character Backdoor: How One Static Key in All-in-One WP Mi... |
remote-code-execution |
|
|
| Thu, 26 Feb 2026 13:54:44 GMT |
Poison — HTB |
lfi |
|
|
| Wed, 08 Apr 2026 08:46:11 GMT |
Practical JavaScript Recon for Bug Bounty: A Real-World Passive-F... |
recon |
|
|
| Fri, 13 Feb 2026 16:22:19 GMT |
How I Approach XSS Hunting as a Security Beginner |
xss-bypass |
|
|
| Sun, 17 Aug 2025 17:58:45 GMT |
$$$ How I Exploited a Business Logic Flaw to Slash Product Prices... |
bug-bounty-program |
|
|
| Sat, 24 Jan 2026 06:47:12 GMT |
Google Dorkware Pro |
google-dork |
|
|
| Mon, 27 Jan 2025 16:51:28 GMT |
The man who suffered 11 years in hell for freedom has now been fr... |
web-pentest |
|
|
| Thu, 09 Apr 2026 15:25:42 GMT |
The Real AI Concern Is Not Art or Jobs, It Is Cybersecurity |
cyber-sec |
|
|
| Sat, 18 Apr 2026 16:02:30 GMT |
When the Protector Becomes the Vector: Exploiting Microsoft Defen... |
exploit |
|
|
| Sat, 04 Apr 2026 04:41:46 GMT |
OpenTofu Security Scanner: How to Catch Misconfigurations Before ... |
vulnerability-scanning |
|
|
| Mon, 02 Mar 2026 04:32:17 GMT |
Cybersicherheits-Check für KMU: Die unterschätzte Alternative z... |
pentest |
|
|
| Sat, 06 Dec 2025 06:43:54 GMT |
The Midnight Pwn: How a News Alert Led to a Critical Bounty |
vulnerability-disclosure |
|
|
| Sun, 23 Feb 2025 11:17:25 GMT |
$1000-$10k worth Leaks via Github Secret Dorks |
github-dorking |
|
|
| Mon, 02 Mar 2026 01:51:25 GMT |
What is penetration testing? | What is pen testing? |
pentest |
|
|
| Tue, 31 Mar 2026 13:09:06 GMT |
An Open Door for Attackers. Lock It with CSP. |
xss-vulnerability |
|
|
| Sat, 04 Apr 2026 05:31:01 GMT |
Shodan + Censys Internet Ka X-Ray: Bina Scan Kiye Sab Kuch Dekho!... |
shodan |
|
|
| Wed, 23 Jul 2025 15:15:01 GMT |
TryHackMe Include walkthrough: SSRF, log poisoning & LFI2RCE, wit... |
log-poisoning |
|
|
| Mon, 23 Mar 2026 21:03:28 GMT |
SOC129 — Successful Local File Inclusion (EventID: 63) |
local-file-inclusion |
|
|
| Thu, 19 Mar 2026 22:46:44 GMT |
How I Earned $76,000 From a Single Program on Bugcrowd |
bugcrowd |
|
|
| Wed, 15 Apr 2026 19:18:42 GMT |
How Mythos outsmarted the Cyber world? |
cve |
|
|
| Tue, 11 Nov 2025 16:43:14 GMT |
Beyond Google: Navigating the Hidden Internet with Shodan and Cen... |
censys |
|
|
| Tue, 22 Apr 2025 10:38:20 GMT |
Trump’s Tariffs Cut Out Censys — ZoomEye Steps In Strong! |
zoomeye |
|
|
| Tue, 14 Apr 2026 04:36:01 GMT |
XSS Cross-Site Scripting Zero Se Hero: Browser Ko Apna Weapon Ban... |
xss-attack, cross-site-scripting |
|
|
| Wed, 15 Apr 2026 18:11:40 GMT |
A Real SSRF Story from HackerOne (Featuring IPv6 + Redirects) |
ssrf |
|
|
| Wed, 04 Mar 2026 03:20:45 GMT |
Why PHP Errors Only Appear in Production — And How to Fix Them |
file-inclusion |
|
|
| Fri, 12 Dec 2025 06:49:56 GMT |
How Variable Data Technology is Transforming Postcard & Brochure ... |
vdp |
|
|
| Fri, 09 Jan 2026 05:50:02 GMT |
Caches, Edge, and Exploits |
web-cache-poisoning |
|
|
| Fri, 13 Mar 2026 10:38:07 GMT |
Insecure Deserialization in Java |
remote-code-execution |
|
|
| Mon, 13 Apr 2026 06:37:51 GMT |
File Inclusion on DVWA |
local-file-inclusion, file-inclusion |
|
|
| Mon, 03 Nov 2025 19:42:12 GMT |
Announcing DorkFi Go-Live Date: Liquidity is Coming |
dorks |
|
|
| Sat, 20 Dec 2025 18:21:40 GMT |
N0aziXss SubSpectre: Advanced Subdomain Discovery with Intelligen... |
subdomain-enumeration |
|
|
| Wed, 15 Apr 2026 12:33:58 GMT |
My First Bug Bounty: Finding Memory DoS Vulnerabilities in Circle... |
hackerone |
|
|
| Tue, 06 Jan 2026 15:29:55 GMT |
Lab: Web cache poisoning via a fat GET request | Portswigger |
web-cache-poisoning |
|
|
| Wed, 18 Mar 2026 14:34:33 GMT |
File Inclusion Zafiyetleri: LFI ve RFI Nedir, Nasıl Çalışır ... |
file-inclusion |
|
|
| Thu, 16 Apr 2026 11:14:18 GMT |
Finance in Nigeria Just Moved to WhatsApp |
bounty-program |
|
|
| Sat, 18 Apr 2026 00:08:14 GMT |
How I Turned an AI Search Endpoint into an Internal Org Intel Lea... |
bugbounty-writeup |
|
|
| Tue, 14 Apr 2026 16:41:14 GMT |
Is Bug Bounty a Good Long-Term Career? The Reality in 2026 |
bug-bounty-hunter |
|
|
| Fri, 17 Apr 2026 16:11:01 GMT |
Mirage (LFI) WebVerse |
lfi |
|
|
| Sat, 18 Apr 2026 18:12:23 GMT |
Practical Exploitation of CVE-2024-42009 using Docker and Swaks |
cve |
|
|
| Fri, 10 Apr 2026 12:32:22 GMT |
How Soroban’s CAP-0066 Killed My LayerZero Finding |
bounty-program |
|
|
| Sun, 15 Mar 2026 13:49:03 GMT |
Как подключить Java приложение к кла�... |
api-key |
|
|
| Fri, 20 Feb 2026 17:56:31 GMT |
TryHackMe — Include — Walkthrough |
local-file-inclusion |
|
|
| Sat, 14 Mar 2026 01:59:36 GMT |
LFI/RFI |
lfi |
|
|
| Wed, 30 Apr 2025 17:08:29 GMT |
Exploring Subdomains: What They Are and How to Find Them |
subdomain-enumeration |
|
|
| Fri, 20 Mar 2026 05:45:47 GMT |
Cloudflare WAF Bypass Leading to Reflected XSS via SVG Injection |
xss-bypass |
|
|
| Fri, 17 Apr 2026 08:34:03 GMT |
İlk ‘Bug’ Gerçekten Bir Böcek Miydi? |
bugs |
|
|
| Wed, 15 Apr 2026 06:58:25 GMT |
Software Supply Chain Attacks in 2026: Why CVE Scanning Is No Lon... |
cve |
|
|
| Sat, 11 Apr 2026 04:30:12 GMT |
Introduction to Cross-Site Scripting (XSS) — TryHackMe Walkthro... |
cross-site-scripting |
|
|
| Sun, 12 Apr 2026 22:57:55 GMT |
Google’s Hackers Investigated 500,000 Hours of Breaches. Hereâ€... |
exploit |
|
|
| Thu, 26 Dec 2024 15:23:03 GMT |
GitHub Dorking List: The Ultimate Guide to Exploring and Securing... |
github-dorking |
|
|
| Tue, 24 Mar 2026 17:48:00 GMT |
The Ultimate Bug Bounty Course: From Zero to Advanced Hacker 1 |
bug-bounty-hunting |
|
|
| Fri, 17 Apr 2026 19:33:26 GMT |
Email Verification Bypass & AI Credits Manipulation via simple Ma... |
bug-bounty-tips, bug-bounty-writeup |
|
|
| Wed, 15 Apr 2026 10:36:07 GMT |
Claude AI Discovers Zero-Day RCE in Vim and Emacs: The Dawn of AI... |
rce |
|
|
| Sat, 18 Apr 2026 19:29:56 GMT |
Rapport d’audit de sécurité (Test d’intrusion Mercury) |
pentesting |
|
|
| Tue, 07 Apr 2026 03:34:00 GMT |
TryHackMe — Intro to Cross-site Scripting (Walkthrough) |
cross-site-scripting |
|
|
| Thu, 16 Apr 2026 14:58:15 GMT |
April 2026 Microsoft Security Update Cycle |
rce |
|
|
| Sat, 18 Apr 2026 06:01:33 GMT |
Everyone Is Doing Recon Wrong — And They Don’t Even Know It |
vapt |
|
|
| Thu, 12 Mar 2026 18:11:47 GMT |
A Simple P4 Bug That Ended as Duplicate |
bug-bounty-hunting |
|
|
| Mon, 13 Apr 2026 21:35:05 GMT |
Fixture - WebVerse (Medium) |
ssrf |
|
|
| Sat, 18 Apr 2026 18:50:24 GMT |
From Zero Auth to Admin Access |
bugbounty-writeup |
|
|
| Thu, 26 Mar 2026 00:32:02 GMT |
Révolution Lumière |
lfi |
|
|
| Sat, 18 Apr 2026 01:21:46 GMT |
How I Found My First CVE — SQL Injection Authentication Bypass ... |
cve |
|
|
| Mon, 16 Mar 2026 07:31:29 GMT |
How I hacked AI Agent and worth bounty of $$$$ |
bugcrowd |
|
|
| Sat, 14 Mar 2026 04:04:52 GMT |
Information disclosure on debug page APPRENTICE | Lab -02 |
information-disclosure |
|
|
| Fri, 28 Jun 2024 14:51:14 GMT |
X-Forwarded HTTP header-ləri : Qısa izah |
log-poisoning |
|
|
| Wed, 18 Feb 2026 01:09:03 GMT |
cURL’s Bug Bounty Is Dead. AI Killed It. |
bounty-program |
|
|
| Tue, 10 Feb 2026 23:04:46 GMT |
Effective Dorking Tools |
dorking |
|
|
| Wed, 17 Dec 2025 09:57:30 GMT |
The Mother Lode: Hacking with GitHub Dorking |
github-dorking |
|
|
| Mon, 23 Mar 2026 14:17:48 GMT |
Authentication bypass via information disclosure | Lab-04 |
information-disclosure |
|
|
| Sun, 12 Apr 2026 12:29:45 GMT |
პირ�ვნების ძიების სრული... |
google-dork |
|
|
| Fri, 19 Dec 2025 20:23:57 GMT |
How I Found an Unauthenticated XXE That Allowed Arbitrary File Re... |
vulnerability-disclosure |
|
|
| Wed, 21 Jan 2026 15:09:15 GMT |
Lab: Weak isolation on dual-use endpoint | Portswigger |
web-cache-poisoning |
|
|
| Wed, 14 Jan 2026 09:06:30 GMT |
Lab: Web cache poisoning via an unkeyed query string | Portswige... |
web-cache-poisoning |
|
|
| Thu, 16 Apr 2026 21:14:10 GMT |
Laravel, Inertia.js & Vue 3: The Ultimate Guide to Forms and File... |
file-upload |
|
|
| Tue, 23 Sep 2025 06:36:22 GMT |
Mengamankan File Sensitif & Directory Listing website dengan .ht... |
directory-listing |
|
|
| Thu, 16 Apr 2026 04:59:21 GMT |
Behind Every Smooth App: The Power of Software Testing |
bugs |
|
|
| Tue, 18 Nov 2025 13:26:47 GMT |
GitHub Dorking: The Hunter’s Guide to Finding Secrets in Public... |
github-dorking |
|
|
| Sat, 21 Mar 2026 20:37:31 GMT |
Using Nmap Scanner |
vulnerability-scanning |
|
|
| Tue, 04 Nov 2025 07:31:55 GMT |
Google Dorking |
dorks |
|
|
| Wed, 15 Apr 2026 22:10:26 GMT |
All It Took Was a Negative Number: A Price Manipulation Story | ... |
bug-bounty-hunter |
|
|
| Wed, 01 Apr 2026 12:35:29 GMT |
Portal | CyCTF Luxor Finals 2026 |
ssrf |
|
|
| Tue, 07 Apr 2026 15:23:33 GMT |
Idor in “track your order� page |
idor |
|
|
| Sat, 14 Feb 2026 19:02:25 GMT |
XSS WAF Bypass: 3 Tricks to Beat Alert Blockers |
xss-bypass |
|
|
| Wed, 07 Jan 2026 00:58:19 GMT |
Why Your Cache Rules are Leaking User Data (Web Cache Deception) |
web-cache-poisoning |
|
|
| Sun, 22 Feb 2026 13:02:39 GMT |
OtterCTF - Hopity Hop Reverse Engineering Walkthrough |
cyber-sec |
|
|
| Fri, 10 Apr 2026 12:50:10 GMT |
Bug Bounty Journey — Valid Report Part 12 |
xss-vulnerability |
|
|
| Sat, 14 Mar 2026 18:06:12 GMT |
Web Security Series #3 — Discovering Credentials Using Cluster ... |
bug-bounty-hunting |
|
|
| Wed, 25 Mar 2026 08:34:09 GMT |
Improper Input Handling Leading to Client Side Code Execution and... |
bug-bounty-hunter, vulnerability-disclosure |
|
|
| Fri, 13 Mar 2026 02:31:00 GMT |
How I Use Google Dorking to Find Hidden Vulnerabilities |
google-dorking, google-dork |
|
|
| Wed, 08 Apr 2026 08:00:36 GMT |
Building a SOC Tool From Scratch as a Cybersecurity Student |
cybersecurity-tools |
|
|
| Fri, 23 May 2025 06:02:53 GMT |
Search Skills |
censys |
|
|
| Mon, 30 Mar 2026 12:28:22 GMT |
API Access Explained: Everything You Need to Know to Get Started |
api-key |
|
|
| Wed, 08 Apr 2026 05:52:04 GMT |
Getting Started with Cybersecurity: A Beginner’s Guide by Ranje... |
vapt |
|
|
| Tue, 31 Mar 2026 13:47:32 GMT |
Cybersecurity Trends in 2026: Protecting the Digital Future |
cybersecurity-tools |
|
|
| Sun, 22 Oct 2023 19:57:30 GMT |
Performing a Log Poisoning Attack |
log-poisoning |
|
|
| Wed, 25 Feb 2026 00:40:05 GMT |
Icy “Doodle� Site | ATC CTF 2.0 | Google Dorking| CTFs |
google-dorking |
|
|
| Sun, 26 Jan 2025 19:08:11 GMT |
Matrix strike’s back against honesty from a power stance |
web-pentest |
|
|
| Fri, 27 Mar 2026 17:43:18 GMT |
Introducing GhostIntel: Your Open-Source OSINT & Reconnaissance T... |
security-research |
|
|
| Mon, 02 Feb 2026 11:59:59 GMT |
El cashback está en el aire |
bounty-program |
|
|
| Tue, 23 Dec 2025 18:32:40 GMT |
The Night I Found a Backup ZIP File Sitting in Plain Sight —... |
bounties |
|
|
| Sat, 18 Apr 2026 15:19:04 GMT |
AI vs. Hackers: How Artificial Intelligence Is Redefining Applica... |
application-security |
|
|
| Sat, 06 Dec 2025 08:29:35 GMT |
The Midnight Epiphany: How a News Notification Cracked My Stubbor... |
vulnerability-disclosure |
|
|
| Thu, 20 Nov 2025 09:45:04 GMT |
Timber Doors in Surrey: Style, Durability, and Value Explained |
dorking |
|
|
| Fri, 06 Jun 2025 15:47:21 GMT |
��♂� GitHub Dorking for Bug Bounty: Hackers' Hidden Playg... |
github-dorking |
|
|
| Tue, 14 Oct 2025 01:36:00 GMT |
Hackviser  —  File Inclusion Labs |
file-inclusion |
|
|
| Sat, 11 Apr 2026 09:59:14 GMT |
The Symmetry of Recon: Active vs. Passive Discovery in Bug Bounty |
shodan |
|
|
| Fri, 17 Apr 2026 13:50:40 GMT |
From Image Upload to Admin Panel: How a Simple SSRF Led to Massiv... |
ssrf |
|
|
| Sat, 11 Apr 2026 14:24:38 GMT |
â� SOC287 — Arbitrary File Read on Checkpoint Security Gateway... |
lfi |
|
|
| Fri, 17 Apr 2026 09:55:31 GMT |
Never thought I’d hack it. How I found two XSS on a daily used ... |
bug-bounty-tips, xss-attack |
|
|
| Sat, 18 Apr 2026 08:18:21 GMT |
Helium Challenge Batch 2 — WriteUp : IDOR & Stored XSS leads to... |
idor |
|
|
| Mon, 11 Dec 2023 18:17:01 GMT |
Exploiting a Log Poisoning. |
log-poisoning |
|
|
| Mon, 16 Feb 2026 14:31:00 GMT |
BOUNTY | HTB | Windows |Walkthrough | Write up |
bounties |
|
|
| Mon, 13 Apr 2026 20:04:52 GMT |
TryHackMe Basic Pentesting CTF Solution |
cyber-sec |
|
|
| Sat, 18 Apr 2026 20:19:59 GMT |
Zero-Day Reality Check: 6 Actively Exploited CVEs Targeting Forti... |
cve |
|
|
| Tue, 03 Mar 2026 05:34:39 GMT |
Documenting my journey. |
cyber-sec |
|
|
| Thu, 16 Apr 2026 02:29:05 GMT |
How We Built a Scalable PII Field Inventory System for Enterprise... |
application-security |
|
|
| Thu, 16 Apr 2026 10:27:11 GMT |
Why Most Web Applications Are Still Insecure in 2026 (And How At... |
vapt |
|
|
| Fri, 10 Apr 2026 11:18:22 GMT |
What Happens If You Remove All Tools in Cybersecurity? |
cybersecurity-tools |
|
|
| Fri, 17 Apr 2026 18:52:58 GMT |
Train on XSS By Your Code |
xss-attack |
|
|
| Wed, 11 Mar 2026 09:56:42 GMT |
Hardening Keycloak: Implementing Security Pentest Requirements as... |
pentest |
|
|
| Tue, 31 Mar 2026 14:47:06 GMT |
Web Security Series #13 — Command Injection Exploitation (Rever... |
cross-site-scripting |
|
|
| Sat, 11 Apr 2026 13:56:44 GMT |
Top Cybersecurity Tools for Beginners: A Complete List (2026) |K... |
cybersecurity-tools |
|
|
| Wed, 18 Mar 2026 10:03:26 GMT |
Web Security Series #7 — Exploiting Blind SQL Injection via Ses... |
bug-bounty-hunting |
|
|
| Mon, 30 Mar 2026 06:03:13 GMT |
Why Business Directory Listings Are the Secret Weapon of Off-Page... |
directory-listing |
|
|
| Thu, 04 Dec 2025 10:22:05 GMT |
The Billion-Naira Blueprint: How SuperteamNG Turned Nigerian Tale... |
bounties |
|
|
| Thu, 12 Mar 2026 18:45:23 GMT |
Pulse-Zero: Atomic Memory Slicing and Sub-Layer Evasion via x64 A... |
cyber-sec |
|
|
| Thu, 16 Apr 2026 18:45:06 GMT |
PENTEST: A arte da invasão ética e o caminho para a Segurança ... |
pentest |
|
|
| Sat, 28 Mar 2026 17:58:43 GMT |
I Built a Remote Code Execution Engine. |
remote-code-execution |
|
|
| Fri, 20 Mar 2026 11:44:04 GMT |
#Searchlight OSINT Writeup |
google-dorking |
|
|
| Tue, 31 Mar 2026 07:57:14 GMT |
How I Test API Keys Using Only Burp Suite |
api-key |
|
|
| Thu, 26 Feb 2026 21:33:21 GMT |
External Vulnerability Scanning FAQ |
vulnerability-scanning |
|
|
| Mon, 23 Mar 2026 11:04:28 GMT |
P1 Vulnerability File Upload by RCE: Apache Tomcat Manager Exploi... |
remote-code-execution |
|
|
| Fri, 07 Feb 2025 05:12:28 GMT |
Do You Struggle Finding Internal/Hidden Subdomains? Recon part 5 |
subdomain-enumeration |
|
|
| Sun, 12 Apr 2026 15:42:12 GMT |
Secure File Sharing for Freelancers (Why It Still Fails You) |
file-upload |
|
|
| Sat, 18 Apr 2026 00:12:58 GMT |
Microsoft Defender Patched, but Still Hackable, BlueHammer and Re... |
cve |
|
|
| Wed, 25 Feb 2026 01:47:45 GMT |
How I Found a Path Traversal in the Rancher Dashboard via HAR Rep... |
web-pentest |
|
|
| Tue, 05 Aug 2025 00:19:11 GMT |
Breaking Recon with AMASS |
subdomain-enumeration |
|
|
| Thu, 04 Dec 2025 04:45:36 GMT |
What is Google Dorking? |
dorking |
|
|
| Tue, 14 Apr 2026 09:00:51 GMT |
Hayati Pro Ultra Plus 25000 Prefilled Pods Pack |
vapt |
|
|
| Fri, 27 Mar 2026 03:29:10 GMT |
TryHackMe — File Inclusion (Walkthrough) |
file-inclusion |
|
|
| Sat, 11 Apr 2026 05:28:40 GMT |
Pentester Recon 03 Write Up |
recon |
|
|
| Fri, 06 Mar 2026 22:34:06 GMT |
3 Logic Bugs in Zendesk : A Single API Request Gave Me an Adminis... |
bugcrowd |
|
|
| Wed, 15 Apr 2026 10:48:09 GMT |
Cross-Chain Bridge Exploits: Why They’re Still Web3’s Biggest... |
exploit |
|
|
| Mon, 16 Feb 2026 08:42:31 GMT |
Lab: Exploiting HTTP request smuggling to perform web cache poiso... |
web-cache-poisoning |
|
|
| Sat, 06 Dec 2025 23:06:15 GMT |
Big News from DorkFi — PreFi Rewards Drop + Contest Live! |
dorks |
|
|
| Thu, 13 Mar 2025 18:09:56 GMT |
How I Found Sensitive Information using Github Dorks in Bug Bount... |
github-dorking |
|
|
| Sat, 18 Apr 2026 15:03:27 GMT |
Unauthorized Account Deletion via HTTP Method Manipulation.A Busi... |
bug-bounty-tips, bug-bounty-writeup |
|
|
| Tue, 24 Mar 2026 08:56:25 GMT |
Detection_WorkBench: The Unified Security Detection & Intelligenc... |
cybersecurity-tools |
|
|
| Fri, 27 Mar 2026 11:01:08 GMT |
Finding XSS Through HTML Injection — Without Fuzzing Tools |
xss-bypass |
|
|
| Tue, 31 Mar 2026 08:17:14 GMT |
Exploiting OData Wildcards: How I Scraped Tesla’s Internal Empl... |
bugcrowd |
|
|
| Tue, 17 Mar 2026 09:18:53 GMT |
Web Security Series #6 — Exploiting SQL Injection to Extract Se... |
bug-bounty-hunting |
|
|
| Sat, 18 Apr 2026 05:07:38 GMT |
We’re About to Stop Trusting What We See Online — And AI Is t... |
cyber-sec |
|
|
| Fri, 29 Aug 2025 04:43:21 GMT |
9. The Secret Power of Google Dorking |
dorking |
|
|
| Thu, 02 Apr 2026 15:28:31 GMT |
O Primeiro passo é o mais importante! |
pentest |
|
|