Skip to content

rix4uni/medium-writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43,594 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Time Title Feed IsNew IsToday
Wed, 11 Feb 2026 17:46:00 GMT How I Managed to Achieve Full Account Takeover on a 50Million+ Us... penetration-testing, web-security, xss-attack Yes Yes
Wed, 11 Feb 2026 18:19:04 GMT How CVE-2026–24061 Grants Instant Root via Telnet bug-bounty, cybersecurity, information-security Yes Yes
Wed, 11 Feb 2026 18:21:43 GMT PaloAltoRCE — UTA0218 Lab cybersecurity Yes Yes
Wed, 11 Feb 2026 17:59:50 GMT Top 10 Common Cyber Security Attacks You Need to Be Aware Of cybersecurity Yes Yes
Wed, 11 Feb 2026 18:01:02 GMT Red Team vs Blue Team: The AI Arms Race in Online Technical Asses... cybersecurity Yes Yes
Wed, 11 Feb 2026 18:22:27 GMT The Majority of Threat Intelligence Feeds Are Expensive Noise Pip... cybersecurity, information-security, cyber-security-awareness Yes Yes
Wed, 11 Feb 2026 18:14:01 GMT The Quiet Compromise—Who Reviews the Code That Writes the Code? cybersecurity Yes Yes
Wed, 11 Feb 2026 18:12:16 GMT Microsoft just patched a zero-day that attackers were already usi... cybersecurity Yes Yes
Wed, 11 Feb 2026 18:25:49 GMT WHY UPLOADING PICTURES IN AI APPS IS SCARY?? cyber-security-awareness Yes Yes
Wed, 11 Feb 2026 17:31:05 GMT Cybersecurity 2026 WARNING: AI Makes Every System Riskier security Yes Yes
Wed, 11 Feb 2026 17:45:53 GMT How I Hacked My Motorcycle to Create a New Dashboard hacking Yes Yes
Wed, 11 Feb 2026 18:23:14 GMT I Put Claude Code in a Sandbox — And It Changed How I Think Abo... information-security Yes Yes
Wed, 11 Feb 2026 17:56:14 GMT How to Choose a Reliable Password Manager cyber-security-awareness Yes Yes
Wed, 11 Feb 2026 18:25:33 GMT HackerDNA — Secrets in Source 2 Write-Up | Client-Side Obfusca... pentesting Yes Yes
Wed, 11 Feb 2026 18:30:13 GMT Understanding Vulnerabilities, Threats, and OWASP Standard Testin... cyber-sec Yes Yes
Wed, 11 Feb 2026 18:29:01 GMT Trasformazione Digitale nell’Industria: Implementazione dellâ€... cybersecurity Yes Yes
Wed, 11 Feb 2026 18:20:02 GMT I Thought Nmap Was Just Port Scanning… Until I Learned How Atta... cybersecurity, penetration-testing, ethical-hacking Yes Yes
Wed, 11 Feb 2026 17:46:27 GMT Safari Surveillance: A Reflection on Seeing and Being Seen in Kru... security Yes Yes
Wed, 11 Feb 2026 18:19:49 GMT eJPT Day 3: Active Information Gathering Using Nmap cybersecurity, penetration-testing Yes Yes
Wed, 11 Feb 2026 12:31:26 GMT How Podcasts Help Off-Page SEO information-technology Yes
Wed, 11 Feb 2026 11:24:03 GMT Network Services THM Room WalkThrough pentesting, vapt Yes
Wed, 11 Feb 2026 14:10:09 GMT Bypassing Cloud Firewalls: Turning PostgreSQL into an Internal Po... bug-bounty, hacking, hackerone Yes
Wed, 11 Feb 2026 16:48:23 GMT JOB — HTB — WRITEUP penetration-testing, ethical-hacking Yes
Wed, 11 Feb 2026 11:21:08 GMT Critical Microsoft Security Update: 59 Vulnerabilities Patched, 6... vulnerability Yes
Wed, 11 Feb 2026 07:27:24 GMT Cloud Misconfigurations: Little Mistakes Can Get You Breached pentesting Yes
Wed, 11 Feb 2026 16:43:41 GMT Autenticação e persistência: análise e detecção em eventos ... information-security Yes
Wed, 11 Feb 2026 12:00:38 GMT Coding the Future: The Invaluable Benefits of Graduating in Infor... information-technology Yes
Wed, 11 Feb 2026 10:04:20 GMT Why I Haven’t Found A Valid Bug Yet — And Why I’m Not Quitt... bug-bounty-hunting Yes
Wed, 11 Feb 2026 16:24:09 GMT The Silence of the Scams — Worth $33,500 — A Different Kind o... bug-bounty, hackerone, ethical-hacking Yes
Wed, 11 Feb 2026 15:35:02 GMT EP 80: The Dangers of White Label Devices security Yes
Wed, 11 Feb 2026 16:44:57 GMT Instalasi Flutter SDK information-technology Yes
Wed, 11 Feb 2026 14:44:05 GMT Inside a Hacker’s Mind: The Engineering Behind Residential Prox... hacking Yes
Wed, 11 Feb 2026 15:39:13 GMT To the Safety Experts Resigning to Write Poetry: Good Riddance. security Yes
Wed, 11 Feb 2026 13:28:20 GMT Welcome to: Your Field Guide to Responsible AI information-technology Yes
Wed, 11 Feb 2026 14:00:19 GMT Types of Cyber Attacks Every Beginner Should Understand ethical-hacking, cyber-security-awareness Yes
Wed, 11 Feb 2026 16:31:01 GMT Homelab: Defining the personal journey. From baseline design to d... security Yes
Wed, 11 Feb 2026 15:11:45 GMT Proving Grounds PlanetExpress: Silent S penetration-testing, ethical-hacking Yes
Wed, 11 Feb 2026 15:33:00 GMT How to Build a Crypto Wallet App: A Clear, Step-by-Step Guide security Yes
Wed, 11 Feb 2026 15:40:24 GMT MERN Stack Security: 3 Critical Vulnerabilities That Will Bankrup... xss-attack Yes
Wed, 11 Feb 2026 14:35:54 GMT How a Hidden Form Field Became a Backdoor: Understanding Mass Ass... application-security Yes
Wed, 11 Feb 2026 12:00:05 GMT How I Hacked Payment Verification via Misconfiguration bug-bounty, penetration-testing Yes
Wed, 11 Feb 2026 15:29:16 GMT Multiple IPv4 Addresses on One VPS — Why and How security, information-security Yes
Wed, 11 Feb 2026 13:31:01 GMT BSCP: mi experiencia real con la certificación de Burp Suite hacking Yes
Wed, 11 Feb 2026 17:19:11 GMT Cybernetics Remix— Maxxing and Remixxing information-technology Yes
Wed, 11 Feb 2026 17:18:21 GMT THE EXECUTIVE CYBERSECURITY BRIEF cyber-security-awareness Yes
Wed, 11 Feb 2026 10:07:36 GMT What Happens Once You’re Known? vulnerability Yes
Wed, 11 Feb 2026 17:21:12 GMT See Finish Culture;The Bane of Modern Relationships. vulnerability Yes
Wed, 11 Feb 2026 02:52:13 GMT Logic Poisoning: How One Bad Review Broke Ratings bug-bounty-tips, bug-bounty-writeup Yes
Wed, 11 Feb 2026 10:05:01 GMT Best VAPT Testing Services in India | Identify Malicious Activit... vapt Yes
Wed, 11 Feb 2026 17:12:28 GMT 2FA bypass after fix via manually injecting “isVerifyAuth� co... bug-bounty-tips, bug-bounty-writeup Yes
Wed, 11 Feb 2026 14:30:16 GMT I Asked ChatGPT to Bypass an XSS Filter — Here’s What Happene... bug-bounty, web-security Yes
Wed, 11 Feb 2026 08:24:52 GMT ⚔� XSStrike: Powerful Tool, Weak Results (If You Don’t Thin... infosec Yes
Wed, 11 Feb 2026 02:11:00 GMT How To Hack Part 3 infosec Yes
Wed, 11 Feb 2026 15:02:01 GMT Password Spraying at Scale: Why Enterprises Still Fail to Detect ... information-security, ethical-hacking, cyber-security-awareness Yes
Wed, 11 Feb 2026 14:03:41 GMT How Does OWASP Test Website Security? Here’s the Basics ethical-hacking Yes
Wed, 11 Feb 2026 13:17:35 GMT Try Hack Me | Lo-Fi Write Up ethical-hacking Yes
Wed, 11 Feb 2026 11:05:20 GMT TuesdayTool 39: Darkweb Tools cybersecurity-tools Yes
Wed, 11 Feb 2026 16:59:57 GMT File Upload Vulnerabilities: A Practical Methodology for Security... bug-bounty, web-security, pentesting Yes
Wed, 11 Feb 2026 13:05:33 GMT Think Before You Hook: Mind Mapping an Android Security Challenge penetration-testing, hacking Yes
Wed, 11 Feb 2026 16:19:27 GMT 40,000+ AI Agents Exposed to the Internet with Full System Access infosec Yes
Wed, 11 Feb 2026 09:33:16 GMT Passive Reconnaissance Analysis of paulstamatiou.com: A Detailed ... vapt, vulnerability-scanning Yes
Wed, 11 Feb 2026 16:07:36 GMT Cybersecurity Warfare Among States and the Power of Diplomatic In... information-security Yes
Wed, 11 Feb 2026 11:25:37 GMT What Is True Kindness? vulnerability Yes
Wed, 11 Feb 2026 11:09:13 GMT ⚖�Vulnerabilidade, Consentimento e Resposta Penal vulnerability Yes
Wed, 11 Feb 2026 16:51:21 GMT TryHackMe | Windows Basics | WriteUp cyber-security-awareness Yes
Wed, 11 Feb 2026 14:31:01 GMT The Experience Trap: Why Your 10+ Years Career Might Be Failing Y... information-technology Yes
Wed, 11 Feb 2026 14:46:14 GMT Cloud-Native Security Architecture Best Practices cyber-security-awareness Yes
Wed, 11 Feb 2026 01:31:29 GMT CrossCurve, FutureSwapX, and JFIN Lose Over $1.9M to Preventable ... exploit Yes
Wed, 11 Feb 2026 10:42:05 GMT Some notes about CVE-2026–21531 in Azure SDK ( CVSS: 9.8) security-research Yes
Wed, 11 Feb 2026 07:41:33 GMT CVE 2024 — 24919 cve Yes
Wed, 11 Feb 2026 13:46:40 GMT CopyPasta writeup (Bugforge) hacking Yes
Wed, 11 Feb 2026 14:11:32 GMT i Learned to Hate Myself Because the World Was Watching vulnerability Yes
Wed, 11 Feb 2026 09:01:13 GMT I Turned One Leaked Password Into Full Admin Access: A Bug Bounty... bug-bounty, infosec, bug-bounty-tips Yes
Wed, 11 Feb 2026 15:48:14 GMT Fully Automated SOAR Setup: Wazuh+n8n+Jira+Email Integration security Yes
Wed, 11 Feb 2026 13:19:32 GMT Intro to Cross-site Scripting | EN hacking Yes
Wed, 11 Feb 2026 15:46:50 GMT The most common vulnerabilities in dApp frontends (and how to mit... pentesting Yes
Wed, 11 Feb 2026 04:31:02 GMT Refresh Tokens Explained: Secure Authentication Without Ruining U... web-security Yes
Wed, 11 Feb 2026 15:24:53 GMT GoHighLevel Chatbot Automation: Build 24/7 Lead Capture & Support... information-security Yes
Wed, 11 Feb 2026 09:08:29 GMT N8n’s “quiet� RCE problem vulnerability, rce Yes
Wed, 11 Feb 2026 15:16:15 GMT Web Security Basics Every Developer Should Understand web-security Yes
Wed, 11 Feb 2026 12:57:06 GMT How to Master Smart Tech Shopping in 2025: An Exclusive Guide by ... information-technology Yes
Wed, 11 Feb 2026 11:56:31 GMT Phool Makhana information-technology Yes
Wed, 11 Feb 2026 05:31:01 GMT Security Isn’t a Layer — It’s Architecture application-security Yes
Wed, 11 Feb 2026 10:19:28 GMT OWASP Top Ten #6: Vulnerable and Outdated Systems vulnerability Yes
Wed, 11 Feb 2026 15:01:03 GMT Defense in Depth: Building Secure AI Agents information-security Yes
Wed, 11 Feb 2026 11:45:29 GMT Hacking Google Drive Integrations: A Deep Dive into OAuth Securi... bug-bounty, bug-bounty-tips, bug-bounty-writeup Yes
Wed, 11 Feb 2026 06:02:59 GMT HTB Atlas Writeup infosec Yes
Wed, 11 Feb 2026 16:39:27 GMT TryHackMe | Operating Systems: Introduction | WriteUp cyber-security-awareness Yes
Wed, 11 Feb 2026 09:53:34 GMT The modern Gatsby, heartbreak in pixels, and longing we dress up ... vulnerability Yes
Wed, 11 Feb 2026 14:52:55 GMT Top Cyber Security Course In Kerala ethical-hacking Yes
Wed, 11 Feb 2026 08:26:17 GMT NMAP — Beginner To Advanced Guide infosec Yes
Wed, 11 Feb 2026 17:12:13 GMT How to build your cybersecurity home lab from scratch security, information-security Yes
Wed, 11 Feb 2026 15:16:18 GMT The Childhood Rejection That Shaped My Emotional Life vulnerability Yes
Wed, 11 Feb 2026 13:22:30 GMT Through The Walls — A Structured Web-to-Root Attack Chain Room web-security, ethical-hacking Yes
Wed, 11 Feb 2026 12:14:17 GMT CVE-2026–20841 分�:Notepad Markdown RCE 與防禦策略 infosec, cve Yes
Wed, 11 Feb 2026 06:10:35 GMT The DC-9 Breach: From SQL Injection to Root Authority pentesting Yes
Wed, 11 Feb 2026 16:38:47 GMT Common DoS Attacks cyber-security-awareness Yes
Wed, 11 Feb 2026 13:19:27 GMT Intro to Cross-site Scripting | TR hacking Yes
Wed, 11 Feb 2026 17:09:01 GMT Why Laptop Battery Health Is Good but Drains Fast information-technology Yes
Wed, 11 Feb 2026 15:57:07 GMT The Missing Layer in Security: AI‑Driven Reasoning, Correlation... security Yes
Wed, 11 Feb 2026 12:51:16 GMT Idooro — Easy Web Security Challenge Write-Up | CyberTalents web-security Yes
Wed, 11 Feb 2026 13:46:43 GMT Server-Side Request Forgery (SSRF) | Complete Guide bug-bounty, penetration-testing, hacking Yes
Wed, 11 Feb 2026 13:00:04 GMT Pentester Bytes: API Pentesting Methodology — Injection bug-bounty, hacking, pentesting Yes
Wed, 11 Feb 2026 17:00:07 GMT SkyTower: The Full Root-Chain Walkthrough penetration-testing Yes
Wed, 11 Feb 2026 14:53:24 GMT Container Escape to Full Kubernetes Takeover penetration-testing Yes
Wed, 11 Feb 2026 17:08:03 GMT DI Container是什麼?是一�出色的場務 information-technology Yes
Tue, 10 Feb 2026 18:25:02 GMT Business Logic Flaw Allows Delegated Users to Hide Messages Using... bug-bounty-tips, bug-bounty-writeup
Tue, 03 Feb 2026 21:29:58 GMT When Your AI Assistant Breaks: Real Debugging Stories bugs
Sat, 06 Dec 2025 08:29:35 GMT The Midnight Epiphany: How a News Notification Cracked My Stubbor... vulnerability-disclosure
Mon, 02 Feb 2026 17:05:37 GMT Lab: Web cache poisoning to exploit a DOM vulnerability via a cac... web-cache-poisoning
Thu, 26 Dec 2024 15:23:03 GMT GitHub Dorking List: The Ultimate Guide to Exploring and Securing... github-dorking
Mon, 26 May 2025 15:44:42 GMT File Upload Vulnerabilities file-inclusion
Tue, 10 Feb 2026 15:56:28 GMT Breaking the Paywall: How a Simple Access Control Flaw Exposed Pr... bug-bounty-tips, bug-bounty-writeup
Tue, 06 Jan 2026 06:42:57 GMT WHAT IS A SHODAN? shodan
Wed, 26 Nov 2025 12:34:58 GMT From Control to Confidence: How Information Security Became the L... cyber-sec
Sat, 07 Feb 2026 12:30:24 GMT When isn’t a template: Alpine.js meets the SVG names... bugs Mon, 26 Jan 2026 07:25:06 GMT How Forgotten DNS Records Lead to Subdomain Takeovers subdomain-takeover Mon, 21 Jul 2025 14:07:41 GMT “403 Forbidden? vdp Thu, 14 Aug 2025 10:54:38 GMT Unlocking the Hidden Power of Search Engines censys Wed, 04 Feb 2026 06:38:34 GMT Top 1% Hacker on try hack me | how i become a top 1% on THM bugs Thu, 02 Oct 2025 06:59:46 GMT Endless Cashback Glitch:How I Unlocked Unlimited Free Orders with... bug-bounty-program Sun, 18 Jan 2026 19:37:52 GMT An Introduction to EDR: cybersecurity-tools Fri, 08 Aug 2025 17:59:47 GMT TryHackMe File Inclusion Challenge walkthrough. file-inclusion Wed, 19 Nov 2025 21:40:04 GMT Cross Site Scripting (XSS) xss-bypass Wed, 24 Dec 2025 06:00:48 GMT PortSwigger Web Security Academy: All Information Disclosure Labs... information-disclosure Tue, 20 Jan 2026 19:15:22 GMT Introduction into SOAR cybersecurity-tools Thu, 21 Aug 2025 19:05:59 GMT Cracking GeneQuest: Two Critical Bugs and My 19th Place Finish at... bug-bounty-hunting Sat, 25 Oct 2025 17:53:34 GMT How I Found and Claimed a Subdomain Takeover (My First Article) subdomain-takeover Mon, 24 Nov 2025 13:28:01 GMT Building India’s Largest Bug Bounty Platform & Revolutionizing ... bug-bounty-hunting Wed, 16 Jul 2025 12:07:42 GMT Hackers Love This 1979 Protocol (Because It Can’t Defend Itself... censys Thu, 22 Jan 2026 16:50:23 GMT API Keys vs. Tokens: Navigating Modern API Authentication api-key Tue, 10 Feb 2026 06:10:51 GMT Behind the Link: A Guide to Mastering URL Analysis security-research Mon, 26 Jan 2026 02:10:21 GMT The Truth About Internet Capital Markets bounty-program Tue, 18 Nov 2025 18:12:40 GMT Dork Labs Awarded AWS Activate Startup Grant dorks Thu, 29 Jan 2026 12:57:19 GMT How SSRF Becomes Cloud Account Compromise (From a Red Team View) ssrf Fri, 02 Jan 2026 04:23:21 GMT WordPress Plugin LFI Vuln Lab 1 local-file-inclusion Mon, 12 Jan 2026 15:11:17 GMT How Have I Been Pwned works and What it does cybersecurity-tools Thu, 29 Jan 2026 19:34:17 GMT TryHackMe (THM) Active Reconnaissance Walkthrough + Answers recon Sun, 28 Dec 2025 10:15:40 GMT Cross-Site Scripting (XSS) | Vulnerability cross-site-scripting Mon, 29 Dec 2025 19:09:04 GMT How i found Sensitive Data Exposure in NASA Vulnerable Disclosure... google-dorking Wed, 26 Nov 2025 08:20:32 GMT $1,500 Recon Secrets: Dorks to Dollars google-dork Sun, 14 Dec 2025 21:35:07 GMT âš¡ï¸�Advanced XSS Bypass for Akamai WAF xss-bypass Fri, 24 Oct 2025 12:05:27 GMT Hackers are hijacking domains via forgotten DNS records subdomain-takeover Sun, 08 Feb 2026 08:14:06 GMT auth-aware deception with trappsec application-security Mon, 29 Dec 2025 20:17:33 GMT PortSwigger Academy Lab: Information disclosure in error messages information-disclosure Wed, 28 Jan 2026 07:31:37 GMT Lab: Targeted web cache poisoning using an unknown header | Port... web-cache-poisoning Sat, 31 Jan 2026 10:36:34 GMT Day 6: Introduction to SSRF ssrf Sat, 24 Jan 2026 17:03:28 GMT How I Found 3 Critical Reflected XSS Bugs Using Simple URL Encodi... security-research Tue, 09 Sep 2025 10:14:01 GMT The Psychology of Listings: Why Users Trust Some Directories More... directory-listing Mon, 05 Jan 2026 15:43:35 GMT End-to-End Reconciliation Solution for Finance Teams recon Wed, 28 Jan 2026 17:28:34 GMT SSRF via Content-Type in Apache — Auditor | FahemSec ssrf Sun, 01 Feb 2026 14:56:27 GMT Lab: Exploiting clickjacking vulnerability to trigger DOM-based X... xss-vulnerability Tue, 03 Feb 2026 10:03:23 GMT Cross‑Site Scripting in 2026: Why Your Frontend Is Still Vulner... xss-attack, cross-site-scripting Fri, 24 Jan 2025 09:34:52 GMT A new Holistic temple opening InLeeds web-pentest Wed, 14 Jan 2026 09:06:30 GMT Lab: Web cache poisoning via an unkeyed query string | Portswige... web-cache-poisoning Sat, 07 Feb 2026 15:22:07 GMT Flu — OffSec Proving Grounds Practice Lab Walkthrough vulnerability-scanning Sun, 01 Feb 2026 08:07:50 GMT From Unauthenticated Access to Full Root Compromise: A Linux Pene... remote-code-execution Tue, 25 Nov 2025 09:25:11 GMT Step-by-Step BOUNTY Rewards Guide — November 2025 bounties Mon, 26 Jan 2026 16:18:45 GMT Rebuilding — Day 4 cyber-sec Mon, 09 Feb 2026 07:51:34 GMT STORED XSS Vulnerability Analysis in DVWA (Low to Impossible) xss-attack, xss-vulnerability Tue, 10 Feb 2026 10:07:48 GMT How I Found SQL Injection on Honda hackerone Fri, 30 Jan 2026 17:31:26 GMT 10-Year-Old Code Commit Just Gave Attackers Root on Thousands of ... rce Tue, 10 Feb 2026 07:39:32 GMT SSRF Hunting 2025: 12 Tools Beyond Metadata for Next-Level Pentes... ssrf Sat, 07 Feb 2026 12:54:00 GMT Learning AppSec the Practical Way with DVWA pentest Mon, 02 Feb 2026 04:54:14 GMT Explainer: CVE, Zero-Day & Misconfiguration — What’s ... cve Tue, 07 Oct 2025 04:21:28 GMT Fastly Subdomain Takeover leading to $$$$ Bounty Reward subdomain-takeover Thu, 15 Jan 2026 14:45:10 GMT The Complete Guide to ASP.NET ViewState Exploitation rce Thu, 25 Dec 2025 20:15:32 GMT Investigation into MSP Data Breach google-dork Sat, 31 Jan 2026 13:52:11 GMT SSRF via Referer Header: How a Simple Header Led to a Serious Fin... bugcrowd, ssrf Sun, 01 Feb 2026 21:39:46 GMT Day 7 : XSS xss-vulnerability Tue, 22 Apr 2025 10:38:20 GMT Trump’s Tariffs Cut Out Censys — ZoomEye Steps In Strong! zoomeye Sat, 16 Aug 2025 17:33:22 GMT PDF.JS Viewer Endpoint Dorking dorking, zoomeye Wed, 03 Dec 2025 20:15:27 GMT “Potato Hacks a Machineâ€� — A Fun & Interactive Pentest... lfi Tue, 16 Dec 2025 07:55:39 GMT CEHv12: Foot Printing and Reconnaissance (Practised)(Module 2) recon Tue, 03 Feb 2026 11:35:56 GMT My bug bounty journey: Full account takeover caused by SSO token ... bug-bounty-hunter Fri, 07 Feb 2025 05:12:28 GMT Do You Struggle Finding Internal/Hidden Subdomains? Recon part 5 subdomain-enumeration Sat, 07 Feb 2026 21:43:59 GMT How We Found 15 Vulnerabilities in a Mass Notification System Use... cve Wed, 03 Dec 2025 22:42:41 GMT Critical Vulnerabilities in React and Next.js: Security Advisory shodan Fri, 01 Aug 2025 06:17:06 GMT 15,000 Critical Systems Are Exposed — Thanks to This Outdat... censys Sun, 17 Aug 2025 19:26:05 GMT ï·½ bug-bounty-program Wed, 22 Oct 2025 14:11:32 GMT Mastering Subdomain Enumeration: A Beginner’s Guide to Expandin... subdomain-enumeration Fri, 23 Jan 2026 20:58:19 GMT Portswigger : SSRF Exploitation ssrf Wed, 28 Jan 2026 06:27:57 GMT Password-Protected Video Metadata Disclosure via IDOR in Dailymot... idor Thu, 16 Oct 2025 19:01:16 GMT Internet Reconnaissance Tools(osint) shodan Thu, 18 Dec 2025 20:10:01 GMT Google Dorking Nedir? google-dork Thu, 20 Nov 2025 17:16:47 GMT The Health Factor: How DorkFi Keeps Your Position Safe dorks Wed, 05 Nov 2025 12:42:46 GMT How I Hacked Bank’s Admin Portal vdp Thu, 05 Feb 2026 20:13:20 GMT CloudSEK CTF_FINAL 2025 — Multi-step exploitation (JWT → ... rce Fri, 06 Jun 2025 15:47:21 GMT ï¸�â€�♂ï¸� GitHub Dorking for Bug Bounty: Hackers' Hidden Playg... github-dorking Mon, 02 Feb 2026 10:02:08 GMT Understanding Path Traversal, Local File Inclusion, and Remote Fi... lfi Thu, 05 Feb 2026 10:31:35 GMT Convert JPG to DST Format file-upload Tue, 10 Feb 2026 21:58:21 GMT From Theory to Exploitation: A Deep Dive into SQL Injection Attac... web-security Sat, 27 Dec 2025 11:18:11 GMT Reflected XSS using Google Dorking on webmail application powered... cross-site-scripting Thu, 22 Jan 2026 10:35:38 GMT How I Earned a $500 Bug Bounty for a P5 Informational Vulnerabili... bugcrowd, bug-bounty-hunter Tue, 03 Feb 2026 12:24:25 GMT Building a Virtual Ethical Hacking Home Lab — Part 6: Syste... exploit Tue, 04 Nov 2025 07:31:55 GMT Google Dorking dorks Fri, 25 Jul 2025 15:34:20 GMT Discover Top Local Businesses Effortlessly with List & Post directory-listing Fri, 02 Jan 2026 09:59:04 GMT 2 Years of Silence, 1 Critical Exploit: My Return to the Leaderbo... bugcrowd Thu, 05 Feb 2026 22:04:24 GMT Ribbon Finance & Rari Capital: $4.7M Lost to Oracle Hijacks and C... exploit Sat, 03 Jan 2026 18:16:27 GMT The two byte CPDoS web-cache-poisoning Sun, 04 Jan 2026 03:49:09 GMT Intercom Deep Recon Techniques google-dorking Tue, 27 Jan 2026 19:18:55 GMT Vulnerabilidad XSS xss-vulnerability, xss-bypass Wed, 07 Jan 2026 03:27:29 GMT Automating HackerOne Scope Parsing with qsv for Bug Bounty Recon recon Fri, 30 Jan 2026 10:34:47 GMT ColdFusion Google Maps API Key Not Working: A Complete Fix Guide api-key Sun, 01 Feb 2026 10:59:02 GMT TryHackMe Challenge — Lo-Fi — LFI(Local File Inclusio... lfi Sat, 31 Jan 2026 06:27:03 GMT Web App Security Assessment with Wapiti: Hands-On Vulnerability S... vulnerability-scanning Sun, 06 Jul 2025 06:33:18 GMT Path Traversal part-1 : File path traversal, simple case file-inclusion Wed, 10 Dec 2025 18:07:22 GMT #xss0r Community — December Gift! xss-bypass Tue, 10 Feb 2026 21:54:43 GMT Weaponizing PPL for Process Immortality pentesting Wed, 28 Jan 2026 22:51:01 GMT Day 3 : Vulnerability Research remote-code-execution Sun, 23 Nov 2025 15:58:33 GMT just memecoin Rewards Eligibility & Claim Guide — November 2025 dorks Sat, 02 Aug 2025 14:15:23 GMT The Silent Risk in Your ICS: Why S7 Protocol Needs Security Atten... censys Tue, 18 Nov 2025 21:32:05 GMT How I Received an Appreciation Letter from NASA for Identifying a... bounties Mon, 09 Feb 2026 08:52:29 GMT Application Security Testing (AST) Market Overview and Future Out... application-security Wed, 09 Jul 2025 01:02:19 GMT Start with VDPs Before Aiming for Private Bug Bounty Programs vdp Tue, 06 Jan 2026 15:29:55 GMT Lab: Web cache poisoning via a fat GET request | Portswigger web-cache-poisoning Fri, 30 Jan 2026 03:59:47 GMT Web Server Vulnerability Scanning Using Nikto vulnerability-scanning Fri, 30 Jan 2026 22:22:41 GMT Keeping up with Security News — with Beagle Watch cve Mon, 15 Dec 2025 07:46:53 GMT The Pivot: Hunting Hidden Doors with Fuzzing and Multi-Platform M... google-dorking Sat, 17 Jan 2026 11:59:27 GMT How JS Analysis Led to PII Disclosure information-disclosure Tue, 23 Dec 2025 06:58:24 GMT How I Found Vulnerabilities in NASA and Got into the Hall of Fame vulnerability-disclosure Fri, 06 Feb 2026 19:19:54 GMT File InclusionVulnerability Analysis in DVWA (Low to Impossible) local-file-inclusion Tue, 23 Dec 2025 07:43:20 GMT Integrating Shodan with HexStrike-AI Using Gemini-CLI shodan Tue, 11 Nov 2025 16:43:14 GMT Beyond Google: Navigating the Hidden Internet with Shodan and Cen... shodan, censys Sun, 08 Feb 2026 05:01:04 GMT How Strong Is Dropbox Password Security? Real Password Crack Time... application-security Sat, 24 Jan 2026 06:47:12 GMT Google Dorkware Pro google-dorking, google-dork Mon, 01 Sep 2025 06:53:22 GMT HTB-LAB Local File Inclusion (LFI) file-inclusion Mon, 02 Feb 2026 13:43:50 GMT Stop Storing Auth Tokens in localStorage xss-attack Mon, 02 Feb 2026 20:09:20 GMT Full-Chain Exploitation: From Recon to Blind SQLi bugbounty-writeup Tue, 27 Jan 2026 16:28:58 GMT Day 1 : Understanding the Local File Inclusion LFI local-file-inclusion Sun, 08 Feb 2026 02:43:05 GMT XSS leads to Infrastructure Compromise ssrf Wed, 26 Nov 2025 13:15:53 GMT How i earned $100 in one minute bounty-program Fri, 23 Jan 2026 03:31:20 GMT Unlocking the Power of Nessus: Advanced Techniques for Real-World... vulnerability-scanning Thu, 25 Dec 2025 00:47:15 GMT Subdomain Takeover Explained: Complete Step-by-Step Guide (Recon ... subdomain-takeover Tue, 10 Feb 2026 21:21:27 GMT Why Cybersecurity is the only ai-proof career in 2026 infosec Sun, 08 Feb 2026 12:21:01 GMT How AI Became My Reporting Partner in Security Research bugcrowd Mon, 03 Nov 2025 19:42:12 GMT Announcing DorkFi Go-Live Date: Liquidity is Coming dorks Thu, 04 Dec 2025 05:32:24 GMT ChainBounty Rewards & Bonus Guide — December 2025 bounties Thu, 04 Dec 2025 04:45:36 GMT What is Google Dorking? google-dorking, dorking, google-dork Tue, 05 Aug 2025 00:19:11 GMT Breaking Recon with AMASS subdomain-enumeration Wed, 09 Jul 2025 05:05:20 GMT ZoomEye Dorking with Nuclei zoomeye Thu, 11 Dec 2025 17:36:39 GMT ï¸� Digital Archaeology: How to Unearth Hidden Technical Manuals ... google-dork Thu, 27 Mar 2025 23:46:11 GMT Make Break and Betrayal web-pentest Tue, 13 Jan 2026 10:42:15 GMT Unmasking Critical RCE Flaws in the World’s Most Popular Orches... rce Wed, 19 Nov 2025 19:44:02 GMT The Pulse of Liquidity: How DorkFi’s Interest Rates Adapt in Re... dorks Sat, 25 Oct 2025 12:23:25 GMT How to find leaks on GitHub as a beginner. Logic is main key github-dorking Mon, 26 Jan 2026 21:02:14 GMT Write-Up máquina PingPong de DockerLabs [ES] cyber-sec Mon, 17 Nov 2025 09:27:29 GMT 200 reports, 11 valid bugs, 0 critical issues. Here’s everythin... vdp Thu, 09 Oct 2025 18:33:05 GMT 0-click Account Takeover via Punycode bug-bounty-program Wed, 30 Apr 2025 17:08:29 GMT Exploring Subdomains: What They Are and How to Find Them subdomain-enumeration Sun, 09 Nov 2025 22:10:20 GMT TryHackMe — File Inclusion — Walkthrough local-file-inclusion Tue, 06 Jan 2026 20:31:25 GMT How to Create a Cybersecurity Home Lab: A Beginner Tutorial for S... cybersecurity-tools Fri, 26 Dec 2025 07:43:53 GMT Beginner's Guide to Claiming BOUNTY Airdrop — Claim Up To $50,0... bounties Thu, 20 Nov 2025 09:45:04 GMT Timber Doors in Surrey: Style, Durability, and Value Explained dorking Thu, 14 Aug 2025 10:08:18 GMT Predictive Analytics and Voice Technology: A Winning Combination ... vdp Fri, 23 Jan 2026 03:30:42 GMT Getting Started with Nessus: Your Fast Lane to Vulnerability Scan... vulnerability-scanning Thu, 05 Feb 2026 04:31:08 GMT CSRF vs XSS — Explained with Real Examples xss-attack Thu, 01 Jan 2026 08:03:59 GMT AI Agent to Find XSS cross-site-scripting Tue, 13 Jan 2026 05:04:56 GMT Remote Code Execution (RCE) Zafiyeti rce Tue, 10 Feb 2026 01:32:00 GMT Client-Side Security in 2026: The Threat Model Apps Ignore application-security Tue, 10 Feb 2026 18:48:17 GMT Advanced Password Reset Abuse — Lab Report Write-Up web-security Sun, 23 Feb 2025 11:17:25 GMT $1000-$10k worth Leaks via Github Secret Dorks github-dorking Sat, 01 Feb 2025 06:10:16 GMT How to Create Advanced Custom Wordlist? Dive into Recon Part 4 subdomain-enumeration Mon, 26 Jan 2026 17:15:20 GMT Cross-Site Scripting (XSS): From Basics to Battle-Tested Defense xss-vulnerability Sat, 04 Jan 2025 17:20:23 GMT GitHub dork github-dorking Sun, 08 Feb 2026 11:17:52 GMT How I Approach Bug Bounties in 2026 ssrf Sun, 09 Nov 2025 14:49:19 GMT Beginner’s BOUNTY Rewards Guide — November 2025 bounties Wed, 07 Jan 2026 19:40:29 GMT n8n RCE 101: Analyzing CVE-2025–68613 remote-code-execution Thu, 22 Jan 2026 13:32:43 GMT VulnLab: File Inclusion Çözümü local-file-inclusion Mon, 02 Feb 2026 01:07:46 GMT STATIC ANALYSIS security-research Fri, 28 Jun 2024 14:51:14 GMT X-Forwarded HTTP header-lÉ™ri : Qısa izah log-poisoning Fri, 06 Feb 2026 07:16:57 GMT What Are the Key Benefits of VAPT Testing for Businesses vapt Thu, 28 Sep 2023 23:05:39 GMT Archangel — TryHackMe log-poisoning Wed, 21 Jan 2026 15:09:15 GMT Lab: Weak isolation on dual-use endpoint | Portswigger web-cache-poisoning Mon, 05 Jan 2026 13:52:09 GMT Top 15 Kali Linux GUI Tools Every Security Engineer Must Master (... cybersecurity-tools Tue, 05 Dec 2023 07:54:40 GMT LFI via SMTP log poisoning log-poisoning Sun, 08 Feb 2026 02:36:38 GMT Entry Point Enumeration: The Critical Step Most Beginner Penteste... recon Mon, 26 Jan 2026 23:45:48 GMT Beyond Takeover AWS Bucket bugcrowd Sun, 08 Feb 2026 03:52:54 GMT IDOR in Purchase Order Cancellation Allows Unauthorized Users to ... idor Sat, 24 Jan 2026 00:02:11 GMT What is a Penetration Test? And Other Penetration Testing FAQs pentest Sat, 10 Jan 2026 05:03:45 GMT Lab:Web cache poisoning via an unkeyed query parameter | Portswi... web-cache-poisoning Thu, 22 Jan 2026 06:57:21 GMT Top 20 Tools Inside Parrot OS Explained (With Real-World Use Case... cybersecurity-tools Wed, 21 Jan 2026 18:32:24 GMT WP File Upload Plugin — Front End Upload & Download Manage... file-upload Sun, 20 Jul 2025 18:02:47 GMT New in Town and Need a Makeup Artist? Here’s the Easiest Way to... directory-listing Sun, 08 Feb 2026 23:49:08 GMT Secure MCP Development with Rust and Gemini CLI api-key Mon, 24 Nov 2025 16:40:00 GMT Workflow: speed up visual web based external exposure recon. shodan Sun, 13 Jul 2025 16:32:21 GMT ProConOS Exposed: What ICS Security Teams Need to Know censys Wed, 07 Jan 2026 10:06:39 GMT OTP Bypass in Email Verification via Response Manipulation During... bug-bounty-hunter, bug-bounty-hunting Sat, 07 Feb 2026 20:17:57 GMT Endpoint Security (Uç Nokta GüvenliÄŸi) exploit Thu, 13 Mar 2025 18:09:56 GMT How I Found Sensitive Information using Github Dorks in Bug Bount... github-dorking Sat, 07 Feb 2026 05:34:28 GMT How to Turn Recon Notes Into Real Bug Bounty Findings bug-bounty-hunter Tue, 15 Jul 2025 18:57:57 GMT ZoomEye Dorking | JSON Endpoints zoomeye Sun, 04 Jan 2026 07:56:03 GMT Local File Inclusion lead to Admin Account Takeover local-file-inclusion Tue, 06 Jan 2026 17:26:38 GMT The Future of Cybersecurity: Emerging Technologies, Evolving Thre... cybersecurity-tools Tue, 19 Aug 2025 10:37:07 GMT Dari Teori ke Praktik: SSRF, File Inclusion, dan Command Injectio... file-inclusion Sun, 08 Feb 2026 09:34:50 GMT DVWA: XSS otaqları xss-attack Sun, 18 Jan 2026 21:51:31 GMT [Rabbit Store]  —  JWT Manipulation, SSRF, SSTI Leading t... rce Sat, 10 Jan 2026 04:56:57 GMT [TryHackMe Write-up] Airplane local-file-inclusion Tue, 20 Jan 2026 09:16:19 GMT [Writeup] Proving Grounds: Plum (Linux) vulnerability-scanning Tue, 27 Jan 2026 18:16:31 GMT The Smart Way to Handle File Uploads & Sharing in WordPress (With... file-upload Sun, 01 Feb 2026 15:53:01 GMT How I Found The Admin-Creation Backdoor In LA-Studio Element Kit ... cve Sat, 07 Feb 2026 06:34:46 GMT How I Approach Production Issues Without Panicking bugs Mon, 09 Feb 2026 08:10:53 GMT Classic Single Request Denial of Service (DoS) bugbounty-writeup Mon, 24 Nov 2025 02:22:21 GMT Padelify Writeup lfi Thu, 05 Feb 2026 03:41:00 GMT How I Exploited a Secondary Context Bug to Trigger SSRF & Path Tr... ssrf Mon, 19 Jan 2026 14:15:31 GMT Telegram Proxy Links: A Client-Side IP Exposure Risk Hiding Behin... security-research Thu, 05 Feb 2026 09:53:22 GMT How Using Schema for Data Almost Caused Breaking Changes for Mill... bugs Tue, 13 Jan 2026 09:45:31 GMT Daily PortSwigger Academy Lab Walkthrough: SQLi & CSS cross-site-scripting Sat, 27 Dec 2025 15:01:34 GMT Breaking the Team: A Deep Dive into Multi-Stage Linux Exploitatio... lfi Mon, 02 Feb 2026 11:59:59 GMT El cashback está en el aire bounty-program Tue, 06 Jan 2026 06:05:21 GMT AlphaArena AI Model Battle: A Hands-On Guide to Replicating DeepS... api-key Thu, 29 Jan 2026 19:17:02 GMT IDOR : Simple to Understand, easy to miss idor Tue, 20 Jan 2026 13:44:32 GMT From Job Hunting to Bug Hunting: Discovering an SQL Injection Vul... bugbounty-writeup Thu, 29 Jan 2026 08:22:13 GMT Arbitrary File Upload + Arbitrary File Download Custom POC exploit Tue, 03 Feb 2026 05:38:08 GMT GraphQL Security Masterclass vapt Sat, 06 Dec 2025 23:06:15 GMT Big News from DorkFi — PreFi Rewards Drop + Contest Live! dorks Fri, 25 Jul 2025 16:41:01 GMT ï¸� SubDNS-UI: Build Your Own Subdomain + DNS Enumerator with a C... subdomain-enumeration Tue, 21 Oct 2025 09:47:05 GMT Proactive Third-Party Risk Management with Shodan Intelligence shodan Fri, 28 Nov 2025 12:11:42 GMT How I Pwned Telemetry on Amsterdam.nl bounty-program Wed, 28 Jan 2026 01:59:11 GMT HEVD: Windows Kernel Exploitation — Stack Overflow exploit Thu, 04 Dec 2025 10:22:05 GMT The Billion-Naira Blueprint: How SuperteamNG Turned Nigerian Tale... bounties Sat, 29 Nov 2025 10:42:26 GMT Bahaya Google Dorking: Data Sensitif Mahasiswa Bocor! google-dork Sat, 07 Feb 2026 16:33:38 GMT PHP mail() Command Injection to Remote Code Execution (RCE) remote-code-execution Wed, 07 Jan 2026 17:02:47 GMT Twin CVSS 10.0 bugs turn n8n workflows into an attacker’s playg... remote-code-execution Tue, 27 Jan 2026 11:29:48 GMT The “Botnetâ€� Exchange: Why ZSZRUN is spamming the Internet cyber-sec Sun, 08 Feb 2026 14:20:34 GMT Mükemmel Kodun PeÅŸinde: Siber Güvenlikte ‘İnsani’ Yanılg... application-security Mon, 02 Feb 2026 13:33:07 GMT VAPT Isn’t Broken — The Way We Use It Is vapt Wed, 19 Nov 2025 13:57:21 GMT BurpSuite + Ffuf | Make Your Life Easier lfi Sun, 21 Sep 2025 07:02:30 GMT Affordable but Vulnerable? The Dark Side of CMORE HMI censys Tue, 10 Feb 2026 09:08:42 GMT Easy 1000$ Bounty | Exposed Internal Tool Found During Shodan Re... bug-bounty-tips Sun, 14 Jul 2024 11:56:11 GMT How I Can Get P1 Nasa easily — Dorking web-pentest Mon, 29 Dec 2025 04:06:10 GMT Information Disclosure Menggunakan Dirsearch information-disclosure Tue, 14 Oct 2025 01:36:00 GMT Hackviser  —  File Inclusion Labs file-inclusion Sun, 21 Sep 2025 03:55:56 GMT Is it easy to discover a critical vulnerability [P1] ? directory-listing Wed, 08 Oct 2025 13:36:28 GMT Shodan.io|THM - 100-Day Cyber Exploration Writeup..|Day-1 . shodan Fri, 23 May 2025 06:02:53 GMT Search Skills censys Sat, 07 Feb 2026 18:11:16 GMT The Biggest Mistake Bug Bounty Hunters Make security-research Fri, 09 Jan 2026 05:50:02 GMT Caches, Edge, and Exploits web-cache-poisoning Tue, 20 Jan 2026 23:10:21 GMT What Is Ethical Hacking? Complete Beginner’s Guide cybersecurity-tools Thu, 04 Dec 2025 00:58:22 GMT Zero In on Targets: Automating the Modern Attack Surface with Ze... bug-bounty-hunting Wed, 28 Jan 2026 14:53:07 GMT How Print-on-Demand Platforms Handle High-Resolution File Uploads... file-upload Tue, 03 Feb 2026 16:06:05 GMT x corp — Cybertalents Web Security Challenge Write‑Up xss-vulnerability Fri, 30 Jan 2026 09:50:21 GMT Building an LLM Security Lab: What I Actually Learnt security-research Tue, 10 Feb 2026 18:21:03 GMT From Recon to DNS Callbacks: Discovering an MSSQL Out-of-Band SQL... bug-bounty-writeup Mon, 09 Feb 2026 13:56:47 GMT SSL/TLS Made Simple: What That Lock Icon Really Means bug-bounty-writeup Mon, 12 Jan 2026 13:27:35 GMT From Failure to $32,000: My Bug Bounty Journey bug-bounty-hunter Sun, 26 Jan 2025 19:08:11 GMT Matrix strike’s back against honesty from a power stance web-pentest Fri, 16 Jan 2026 17:59:33 GMT BAC = $$$ information-disclosure Mon, 09 Feb 2026 16:07:10 GMT File Upload Validation: Size, Type, and Content Security file-upload Sun, 22 Oct 2023 19:57:30 GMT Performing a Log Poisoning Attack log-poisoning Sun, 16 Nov 2025 11:17:50 GMT Five Bounties, One Bug: Exploiting the Same SSRF via Five Unique ... bounty-program Thu, 29 Jan 2026 05:03:15 GMT Subdomain Takeover: Understanding, Detecting, and Recovering from... subdomain-takeover Sat, 31 Jan 2026 12:21:02 GMT VulnLab: Cross Site Scripting (XSS) Çözümü cross-site-scripting Fri, 18 Jul 2025 01:35:17 GMT Lo-Fi TryHackMe Walkthrough/Write-up file-inclusion Sun, 28 Dec 2025 18:59:18 GMT Google Appspot XSS CTF Walkthrough cross-site-scripting Thu, 29 Jan 2026 21:21:39 GMT Turning Fuzzing Into $2,550: How a Simple Bug Gave Me Access to E... hackerone, bounties Wed, 21 Jan 2026 04:48:08 GMT Bypass RootBeer Frida: Panduan Bypass RASP dan SSL Pinning pada A... pentest Fri, 31 Oct 2025 21:30:34 GMT Simple BOUNTY Bonus Guide — October 2025 bounties Sun, 24 Aug 2025 20:18:55 GMT How I found an Account Lockout Vulnerability Without Any Tools bug-bounty-program Wed, 23 Jul 2025 15:15:01 GMT TryHackMe Include walkthrough: SSRF, log poisoning & LFI2RCE, wit... log-poisoning Mon, 17 Nov 2025 23:45:18 GMT DorkFi: The Triumph of a Team You Can Trust dorks Thu, 05 Feb 2026 18:23:51 GMT Efficient Array Wrapping: The Modulo Trick Every Developer Should... bugs Sat, 31 Jan 2026 19:35:51 GMT How a Simple Note Feature Turned Into a Stored XSS (₹7,500 Boun... cross-site-scripting Sun, 01 Feb 2026 18:36:22 GMT IDOR Vulnerability in Campaign Workflows – Accessing Archived C... bugbounty-writeup Sun, 23 Nov 2025 13:28:34 GMT When IP Whitelisting Isn’t What It Seems: A Real-World Case Stu... vulnerability-disclosure Fri, 06 Feb 2026 16:39:20 GMT Conhecendo o BOLT, uma ferramenta da APIsec. pentest Fri, 11 Jul 2025 16:20:24 GMT PC WORX: The Hidden Risk in Your Industrial Network censys Sat, 20 Apr 2024 17:20:58 GMT TryHackMe — Brute Walkthrough | TheHiker log-poisoning Thu, 18 Dec 2025 21:21:21 GMT Google Dorking: Arama Motorunu Bir Güvenlik Aracına Dönüştü... google-dorking Thu, 05 Feb 2026 09:53:17 GMT Cross-Domain IDOR in Email Preferences Management via Reusable em... idor Mon, 02 Feb 2026 12:23:30 GMT What are streams, and how to use them to build reliable backend s... file-upload Sat, 24 Jan 2026 19:34:56 GMT Smart Home (BUET CTF 2026 Preliminary) — Pre-Auth RCE via e... rce Wed, 03 Dec 2025 23:26:26 GMT TryHackMe-TakeOver-WriteUp subdomain-takeover Fri, 06 Feb 2026 16:41:14 GMT Getting to know BOLT, a tool from the APIsec. pentest Mon, 09 Feb 2026 09:00:30 GMT Java isn’t wrong — you just don’t know the Integer Cach... bugs Thu, 22 Jan 2026 17:15:54 GMT FULL ACCOUNT WILL DIE bugcrowd Mon, 09 Feb 2026 23:10:40 GMT Web template , KOSTEN ,Bugs , software-perspektive. bugbounty-writeup Fri, 30 Jan 2026 08:30:04 GMT Lab: Remote code execution via server-side prototype pollution |... remote-code-execution Wed, 14 Jan 2026 12:29:05 GMT Exposing the Vulnerable: A Narrative of a Full System Takeover (T... local-file-inclusion Sat, 20 Dec 2025 18:21:40 GMT N0aziXss SubSpectre: Advanced Subdomain Discovery with Intelligen... subdomain-enumeration Mon, 15 Dec 2025 12:59:16 GMT Modat Magnify Cyber Dorking dorking Tue, 10 Feb 2026 09:34:05 GMT CVE-2026–1281 & CVE-2026–1340 remote-code-execution Sun, 18 Jan 2026 21:15:25 GMT Schneider’s Unlocked Keypad: Giving the Lua Shell a Warm Welcom... remote-code-execution Sat, 07 Feb 2026 21:12:11 GMT Building File Uploads That Handle 10 GB fin Seconds with Spring B... file-upload Tue, 27 Jan 2026 19:12:22 GMT Tracing the Boiler Control System: From Internet Search to CISA C... security-research Tue, 13 Jan 2026 13:27:13 GMT Hacking “Timeâ€�: When Critical Infrastructure Forgets to Set a... vulnerability-disclosure Mon, 12 Jan 2026 08:39:44 GMT ColdFusion RCE (Remote Code Execution) Vulnerabilities: A Proacti... remote-code-execution Mon, 11 Dec 2023 18:17:01 GMT Exploiting a Log Poisoning. log-poisoning Mon, 09 Feb 2026 16:15:10 GMT Stop Chasing CVEs: Container Security Has Become a Theater of Bus... cve Sun, 04 Jan 2026 12:43:39 GMT Patch Management in Cybersecurity: Tools, Strategies, and Benefit... cybersecurity-tools Wed, 03 Dec 2025 18:29:09 GMT How I Discovered a Flaw That Let Me Access Enterprise-Only Featur... bounty-program Tue, 03 Feb 2026 06:55:25 GMT Bug Bounty Masterclass: How a Forgotten API Exposed Thousands of ... hackerone Sat, 07 Feb 2026 10:41:23 GMT How Wordfence Paid Me $0 for a Critical Vulnerability Affecting 7... bugbounty-writeup Sun, 25 Jan 2026 23:01:22 GMT Detecting Malicious Activity in Highly Imbalanced System Logs security-research Sun, 08 Feb 2026 10:52:29 GMT Website Exploitation: Information Gathering & Vulnerability Scann... vulnerability-scanning Tue, 03 Feb 2026 17:49:02 GMT SSRF Challenge Write-up: Tanuki (BugForge) ssrf Fri, 06 Feb 2026 06:33:08 GMT 5 Ways to Bypass Email Verification Without Using Any Tool bug-bounty-hunter, bug-bounty-program Wed, 04 Feb 2026 15:04:10 GMT How to Hack Swagger UI Complete Guide. bug-bounty-hunter Tue, 18 Nov 2025 08:33:41 GMT A Chain of Vulnerabilities Leading to Critical Information Disclo... bug-bounty-program Mon, 29 Dec 2025 22:31:02 GMT PortSwigger Academy Lab: Information disclosure on debug page information-disclosure Sun, 12 Oct 2025 14:40:10 GMT Exploring Shodan: The Search Engine for Hackers and Security Rese... shodan Tue, 30 Dec 2025 07:53:12 GMT One Mantle DevCard, Three Reward Pools for Mantle Global Hackatho... bounty-program Mon, 05 Jan 2026 16:28:35 GMT Lab: Web cache poisoning with multiple headers | Portswigger web-cache-poisoning Fri, 06 Feb 2026 10:22:29 GMT SQL Injection (SQLi): Deep Dive into Attacks, Payloads, Impacts, ... vapt Tue, 08 Jul 2025 20:49:53 GMT UpDown-Linux-Medium file-inclusion Mon, 26 Jan 2026 03:11:46 GMT Why Walking Beats Driving for Wardriving Data recon Tue, 10 Feb 2026 17:32:05 GMT HackerDNA — Secrets in Source Write-Up | Client-Side Informati... pentesting Wed, 17 Dec 2025 09:57:30 GMT The Mother Lode: Hacking with GitHub Dorking github-dorking Mon, 09 Feb 2026 13:50:40 GMT Why Most Creators Fail to Scale (And How Zenith Academy Fixes It) file-upload Tue, 06 Jan 2026 09:02:35 GMT Bug Bounty Shortcut: Skip Recon and Start With Real Credentials recon Sun, 14 Dec 2025 06:37:06 GMT My Bug Bounty Diary subdomain-enumeration Tue, 05 Aug 2025 07:25:48 GMT CXF Service List Endpoint Recon zoomeye Thu, 13 Feb 2025 03:29:37 GMT ZoomEye Meets DeepSeek: AI-Powered Cyberspace Intelligence zoomeye Tue, 10 Feb 2026 05:55:18 GMT Security Controls That Quietly Stop Working After AI Integration application-security Fri, 31 May 2024 13:29:16 GMT Map of the worlds best URLs 2025 log-poisoning Tue, 13 Jan 2026 14:20:03 GMT Burp Suite: The Basics — THM Walkthrough xss-bypass Wed, 06 Aug 2025 18:09:04 GMT Making dorks from HTML Comment dorking Fri, 23 Jan 2026 10:08:11 GMT [Templates]  —  Exploiting PugJS Server-Side Template Inj... rce Wed, 28 Jan 2026 06:41:25 GMT Quantitative Practice of DEX Exchanges (4) — Strategy Acces... api-key Fri, 09 Jan 2026 11:49:46 GMT Make Contract Collaboration Effortless Across Teams with BoldSign... api-key Wed, 15 Oct 2025 05:12:26 GMT Subdomain Takeover: The Forgotten DNS Records Hijacking Your Bran... subdomain-takeover Tue, 06 Jan 2026 16:02:54 GMT Spider-Man, Google Dorks e OSINT: quando cercare diventa un super... google-dorking Thu, 18 Dec 2025 10:06:53 GMT Learn Google Dorking: Arama Motorlarıyla Bilgi KeÅŸfi google-dorking, google-dork Wed, 12 Feb 2025 22:46:35 GMT https://www.express.co.uk/life-style/property/2012927/cleaning-ch... web-pentest Mon, 27 Jan 2025 16:51:28 GMT The man who suffered 11 years in hell for freedom has now been fr... web-pentest Fri, 19 Dec 2025 20:23:57 GMT How I Found an Unauthenticated XXE That Allowed Arbitrary File Re... vulnerability-disclosure Thu, 05 Feb 2026 12:53:53 GMT Best Cyber Security Company in India for End-to-End Security vapt Sat, 31 Jan 2026 20:15:23 GMT Belajar Open Source dari Bug Nyata: Menambahkan Dukungan pacman d... pentest Sat, 06 Dec 2025 06:43:54 GMT The Midnight Pwn: How a News Alert Led to a Critical Bounty vulnerability-disclosure Wed, 19 Nov 2025 02:35:37 GMT CVE-2025-63872: SVG-Based XSS in DeepSeek Chat V3.2 vulnerability-disclosure Wed, 21 Jan 2026 16:38:04 GMT Reconnaissance: The Most Ignored Phase of an Attack security-research Tue, 03 Feb 2026 17:12:47 GMT My First Week: 3 Business Logic Bugs in Major E-Commerce bug-bounty-hunter, bug-bounty-program Mon, 07 Jul 2025 05:15:45 GMT ZoomEye Dorking | Advanced OSINT zoomeye Fri, 30 Jan 2026 02:02:40 GMT Missing authentication in API Endpoints lead to update orders and... bugcrowd Wed, 10 Dec 2025 12:06:41 GMT Strengthening Web3 Security: Recent Vulnerability Findings from Y... vulnerability-disclosure Sat, 07 Feb 2026 14:32:58 GMT Checksum: How It Works, Why Developers Use It, and What Protectio... vapt Tue, 18 Nov 2025 13:26:47 GMT GitHub Dorking: The Hunter’s Guide to Finding Secrets in Public... github-dorking Mon, 09 Feb 2026 14:21:42 GMT How I Discovered an Exposed S3 Bucket Containing Sensitive Log Da... bugbounty-writeup Mon, 09 Feb 2026 09:35:46 GMT New to Mobile Security? This Could Save Your App application-security Tue, 06 Jan 2026 12:27:01 GMT CVE-2025–55184: A pre-authenticated DOS Attack in React Server ... vdp Thu, 18 Sep 2025 05:45:26 GMT Data Accuracy in Directory Websites: Why Clean Listings = Loyal U... directory-listing Fri, 19 Sep 2025 07:40:16 GMT How I Tracked Our Clients’ Device Versions Without Direct Repor... zoomeye Sun, 06 Jul 2025 07:51:30 GMT ZoomEye Dorking for API Keys zoomeye Mon, 02 Feb 2026 07:50:38 GMT A Beginner’s Guide to Bird Hunting in Michigan bug-bounty-hunter Sun, 17 Aug 2025 17:58:45 GMT $$$ How I Exploited a Business Logic Flaw to Slash Product Prices... bug-bounty-program Sat, 07 Feb 2026 11:21:37 GMT From Directory Listing to Root Shell rce Sun, 11 Jan 2026 12:43:40 GMT Local File Inclusion(LFI) Vulnerability lfi Sun, 07 Dec 2025 06:30:47 GMT Advanced Search Techniques for Exposed Information — By Rej... google-dorking Thu, 01 Jan 2026 14:05:31 GMT Sıfırdan Otomasyona: Kapsamlı Recon Rehberi recon Tue, 10 Feb 2026 23:14:17 GMT Introducing ExecEvasion: Understanding Execution Evasion Beyond S... bug-bounty-tips, bug-bounty-writeup Fri, 06 Feb 2026 14:04:02 GMT Why Production Bugs Don’t Respect Architecture Diagrams bugs Wed, 21 Jan 2026 12:56:03 GMT How I Discovered the RXSS and Bypassed the WAF xss-bypass Tue, 30 Dec 2025 01:21:19 GMT API Keys, Tokens & Secrets: How They Leak and How Developers can ... api-key Thu, 05 Feb 2026 07:48:18 GMT H3C CVM auth bypass & information disclosure exploit Fri, 21 Nov 2025 20:24:09 GMT Bypassing University Email Verification: A Logical Flaw in a Saud... vulnerability-disclosure Tue, 10 Feb 2026 19:32:15 GMT Original Sin of Agents: Morris II, EchoLeak and Prompt Pond remote-code-execution Tue, 23 Sep 2025 13:01:51 GMT Why Email Marketing Is the Secret Growth Tool for Directory Websi... directory-listing Fri, 10 Nov 2023 03:38:01 GMT Apache error.log advanced Log poisoning RCE log-poisoning Tue, 15 Jul 2025 12:15:58 GMT “Secureâ€� OPC UA Setups Are Being Hacked — Here’s Why censys Thu, 21 Aug 2025 10:04:08 GMT Dork Like a Demon: FOFA Edition for Hackers & Bug Bounty Hunters dorking Tue, 10 Feb 2026 11:13:14 GMT 5. JWT logic confusion bypassing authentication bug-bounty-tips Tue, 12 Aug 2025 17:24:22 GMT How I Removed Other User`s Uploaded Images in a Few Clicks bug-bounty-program Sun, 21 Dec 2025 21:12:19 GMT I Found My First Bugs in 48 Hours: A Beginner’s Real-World Guid... bugcrowd Sat, 17 Jan 2026 07:44:23 GMT Google Dorks to Find SQL Injection Vulnerable Websites google-dork Tue, 16 Dec 2025 13:38:33 GMT SOC170 — Passwd Found in Requested URL — Possible LFI... local-file-inclusion Sat, 01 Nov 2025 20:09:17 GMT just memecoin — Best Platforms dorks Thu, 08 Jan 2026 09:02:50 GMT osint-Forgotten Ruins bounty $$ bounties Wed, 28 Jan 2026 14:46:10 GMT Python Cache Poisoning — Elevating Your Privileges with Mal... exploit Mon, 09 Feb 2026 23:02:40 GMT Information Disclosure di LocalStorage bug-bounty-writeup Mon, 19 Jan 2026 10:09:10 GMT GitHub Search Syntax for Finding Leaked API Keys, Secrets, and To... api-key Fri, 30 Jan 2026 13:03:07 GMT 1. What Is Escaping? xss-vulnerability, xss-bypass Sun, 07 Dec 2025 06:18:32 GMT Breaking the Perimeter: How My Custom Python Tool Bypassed a Fede... vdp Thu, 29 Jan 2026 20:14:29 GMT Local File Inclusion (LFI) lfi Fri, 04 Jul 2025 09:25:20 GMT Lo-Fi — TryHackMe Writeup file-inclusion Sun, 01 Feb 2026 09:55:02 GMT How ChaGu Helps CVE Scanners Actually Make Sense of Risk cve Mon, 24 Nov 2025 01:14:16 GMT How xxx.com Helped Me Land $10K Bounties in Just 1 Week bounty-program Sat, 07 Feb 2026 23:30:46 GMT Wiz x Cloud Security Championship — Needle in a Haystack Wa... application-security Fri, 26 Dec 2025 00:33:19 GMT Google Dork and OSINT: Discovering Exposed Systems Through Search... google-dorking Tue, 26 Aug 2025 04:38:54 GMT Why Most Directory Websites Fail (and How to Make Yours Succeed) directory-listing Tue, 27 Jan 2026 07:28:44 GMT Lab: URL normalisation |Portswigger xss-vulnerability Mon, 12 Jan 2026 06:05:58 GMT How I Got My First Bug Bounty (And What I’d Do Differently) bug-bounty-hunter Mon, 09 Feb 2026 02:48:52 GMT TryHackMe — Vulnerability Scanner Overview (Walkthrough) vulnerability-scanning Fri, 12 Dec 2025 08:27:15 GMT PwnTillDawn Morty Writeup lfi Wed, 21 Jan 2026 20:26:42 GMT Day-18 of Bug Bounty Journey : XSS Concept bugbounty-writeup Tue, 10 Feb 2026 23:04:46 GMT Effective Dorking Tools dorking Fri, 24 Jan 2025 00:08:47 GMT A majestic temple opportunity of wellbeing and wellness web-pentest Wed, 31 Dec 2025 16:50:13 GMT PortSwigger Academy Lab: Source code disclosure via backup files information-disclosure Sat, 07 Feb 2026 01:59:42 GMT Bug Bounty Recon for Everyone recon Tue, 18 Nov 2025 16:59:02 GMT TryHackMe:Farewell xss-bypass Sat, 06 Dec 2025 17:05:14 GMT GitHub Pages Subdomain Takeover on aiaa-dpw.larc.nasa.gov (NASA V... subdomain-takeover Sun, 21 Dec 2025 10:09:54 GMT From “Valid Bugâ€� to “No Bountyâ€�: VRP, VRT, P4, and P5 on ... bugcrowd Sat, 23 Aug 2025 09:23:31 GMT URLScan Dorking to find WordPress Registration Endpoint dorking Sat, 31 Jan 2026 01:02:18 GMT When “Draftâ€� Doesn’t Mean Private: Finding an IDOR in an Un... idor Thu, 29 Jan 2026 04:21:46 GMT New rate limit bypass , other won’t say idor Wed, 21 Jan 2026 13:33:44 GMT Write-up: RazorBlack lab (Medium) on THM pentest Mon, 19 Jan 2026 05:42:56 GMT Securing the Foundation: API Key Management for AI Development api-key Tue, 10 Feb 2026 16:55:18 GMT From Leak to Lead: How Dark Web Dumps Helped Me Find a Live Vulne... bug-bounty-tips Fri, 19 Dec 2025 18:16:46 GMT Information disclosure, but not in the way you might expect information-disclosure Mon, 24 Nov 2025 02:45:22 GMT The art of google dorking google-dork Wed, 31 Dec 2025 16:50:18 GMT TryHackMe: MD2PDF Walkthrough local-file-inclusion Sun, 08 Feb 2026 04:50:00 GMT DOM XSS Vulnerability Analysis in DVWA (Low to Impossible) xss-vulnerability Wed, 28 Jan 2026 12:54:04 GMT $500 for a UUID Swap: I Almost Gave Up on This IDOR bugbounty-writeup, information-disclosure, idor Fri, 12 Dec 2025 06:49:56 GMT How Variable Data Technology is Transforming Postcard & Brochure ... vdp Fri, 30 Jan 2026 18:21:21 GMT The 1inch Fusion v1 Exploit: How a Calldata Corruption Vulnerabil... exploit Thu, 29 Jan 2026 14:53:06 GMT SOC or VAPT? The Career Confusion Every Cybersecurity Beginner vapt Sun, 28 Dec 2025 08:13:44 GMT Subzy Tool subdomain-takeover Tue, 10 Feb 2026 08:55:00 GMT XSS Exfiltration: How Attackers Steal Data Using JavaScript xss-attack, cross-site-scripting Tue, 06 Jan 2026 18:31:45 GMT Ghost in the Machine: Bypassing Authentication to Access Live Shi... vulnerability-disclosure Fri, 02 Jan 2026 14:24:24 GMT Cross-Site Scripting (XSS) Vulnerability in DeepSeeks AI Input Fi... xss-bypass Tue, 10 Feb 2026 14:17:57 GMT How to treat scarcity as a feature in the software industry bugs Sat, 24 Jan 2026 07:54:28 GMT Write-up: Gatekeeper lab (Medium) on THM pentest Tue, 23 Sep 2025 06:36:22 GMT Mengamankan File Sensitif & Directory Listing website dengan .ht... directory-listing Thu, 05 Feb 2026 04:33:48 GMT Weaponizing Useless XSS: How Path Traversal Turned Reflection int... xss-attack Wed, 07 Jan 2026 00:58:19 GMT Why Your Cache Rules are Leaking User Data (Web Cache Deception) web-cache-poisoning Tue, 19 Aug 2025 11:22:08 GMT How to Get Started with Bug Bounties bug-bounty-hunting Mon, 18 Aug 2025 18:06:38 GMT The Importance of Legal Directory Listings for Your Practice directory-listing Fri, 30 Jan 2026 03:54:37 GMT สอน Upload Single & Multiple Files ด้วย Playwright ... file-upload Mon, 08 Dec 2025 11:02:43 GMT Comisiones de trading DESACTIVADAS! bounty-program Tue, 10 Feb 2026 23:53:27 GMT NOTICE: Date/Time Normalization Maintenance of Historical CVE Rec... infosec Tue, 23 Dec 2025 18:32:40 GMT The Night I Found a Backup ZIP File Sitting in Plain Sight —... bounties Tue, 10 Feb 2026 09:03:53 GMT The Zombie SSH: How I Forced a Modern Server into a “Logjamâ€� ... bug-bounty-writeup Thu, 11 Sep 2025 22:20:14 GMT It’s Coming: DorkFi Delivers PreFi Rewards Surge dorking Thu, 05 Feb 2026 07:08:00 GMT Y Type Pneumatic Valve Exporters in the World Industry recon Fri, 29 Aug 2025 04:43:21 GMT 9. The Secret Power of Google Dorking dorking Sun, 01 Feb 2026 11:25:59 GMT IDOR Lets Attackers Choose Your Payment Method idor Wed, 14 Jan 2026 17:17:39 GMT 7 Ways Uploading Websites Streamline Custom Print Orders for Smal... file-upload Sun, 04 Jan 2026 07:12:14 GMT Stop Writing Your Own HTML Encoders: A Guide to XSS Prevention in... cross-site-scripting Sat, 25 Jan 2025 23:20:10 GMT Full GitHub Dorking guide: for OSINT and BugBounty (Reconnaissanc... github-dorking Tue, 10 Feb 2026 16:59:27 GMT HackerDNA — Nmap Lab 102 Write-Up | Telnet Misconfiguration & ... pentesting Mon, 09 Feb 2026 16:09:42 GMT Introduction to Web Application Security xss-attack Mon, 21 Nov 2022 22:42:17 GMT Explorando XSS no lugar do meu nome. web-pentest Thu, 22 Jan 2026 14:37:10 GMT What Is Nessus? A Beginner-Friendly Guide With Linux Installation vulnerability-scanning Sat, 03 Jan 2026 17:51:10 GMT Espelho, espelho meu : Existe alguém mais exposto do que Eu? shodan Thu, 27 Nov 2025 13:53:54 GMT xss0r Black Friday Special Offer — 50% OFF ALL PLANS! xss-bypass Sun, 01 Feb 2026 02:21:37 GMT Linux Kernel Dirty Pipe Exploitation (Logic Bug — CVE-2022â... exploit Mon, 09 Feb 2026 04:52:31 GMT Firefox Containers for IDOR & BAC Testing idor Wed, 28 Jan 2026 07:57:40 GMT API SECURITY #2: API Keys vs OAuth vs JWTs vs mTLS api-key Mon, 26 Jan 2026 16:00:51 GMT Mapping Security Frameworks and Regulations (ISO27001, NIS2, NIST... cyber-sec Sun, 25 Jan 2026 18:20:12 GMT Getting Started with Penetration Testing (Pentest) — A Begi... pentest Tue, 10 Feb 2026 12:53:21 GMT CVE-2019–15107 Analysis and the Void Write-up cve Sat, 24 Jan 2026 12:37:50 GMT XSS — Merry XSSMas xss-vulnerability