| Sun, 05 Apr 2026 09:21:17 GMT |
The Art of Finding Endpoints: A Developer’s Field Guide |
cybersecurity |
Yes |
Yes |
| Sun, 05 Apr 2026 09:07:10 GMT |
Zero-Day Incident Response: First 72 Hours |
cybersecurity |
Yes |
Yes |
| Sun, 05 Apr 2026 09:01:01 GMT |
DeepLoad: كيÙ� تستخدم البرمجيات الخبيثة Ø... |
cybersecurity |
Yes |
Yes |
| Sun, 05 Apr 2026 09:18:34 GMT |
How to Spot a Fake Website Instantly (Before It Steals Your Data) |
cybersecurity |
Yes |
Yes |
| Sun, 05 Apr 2026 09:01:01 GMT |
I Tried to Hack a Bank (In My Head). I Didn’t Get Very Far. |
hacking |
Yes |
Yes |
| Sun, 05 Apr 2026 09:18:43 GMT |
CafeClub (Business Logic) (Bugforge.io) |
hacking |
Yes |
Yes |
| Sun, 05 Apr 2026 09:15:37 GMT |
Exploiting MCPJam Inspector: Understanding RCE via /api/mcp/conne... |
cybersecurity |
Yes |
Yes |
| Sun, 05 Apr 2026 05:35:32 GMT |
The Rise of AI Security Analysts |
ethical-hacking |
|
Yes |
| Sun, 05 Apr 2026 07:22:06 GMT |
The Invisible Threat: Detecting Early-Stage Phishing & Scam Campa... |
infosec, information-security |
|
Yes |
| Sun, 05 Apr 2026 00:45:12 GMT |
4.8 Million Cybersecurity Jobs Are Open. Here’s Why You Still C... |
infosec, information-security |
|
Yes |
| Sun, 05 Apr 2026 01:38:33 GMT |
Felly4D Login Resmi: Cara Daftar & Main Slot Gacor Mudah |
information-technology |
|
Yes |
| Sun, 05 Apr 2026 08:08:21 GMT |
How I Built an Automated Recon Pipeline for Bug Bounty Hunting |
bug-bounty, ethical-hacking, recon |
|
Yes |
| Sun, 05 Apr 2026 08:21:45 GMT |
How to Start Linux Career After 12th — Complete Guide |
cybersecurity, ethical-hacking |
|
Yes |
| Sun, 05 Apr 2026 05:05:15 GMT |
Philosophy and Information Technology,Philosophy of Information T... |
information-technology |
|
Yes |
| Sun, 05 Apr 2026 07:49:42 GMT |
Your API Can DDoS Itself |
application-security |
|
Yes |
| Sun, 05 Apr 2026 07:02:11 GMT |
Phishing Toolkit Review: 15 Tools in 2026 Every Cybersecurity Pro... |
bug-bounty, penetration-testing, hacking |
|
Yes |
| Sun, 05 Apr 2026 08:07:35 GMT |
What to Do When Your Password Gets Hacked |
security |
|
Yes |
| Sun, 05 Apr 2026 07:10:01 GMT |
Some weird things about me |
vulnerability |
|
Yes |
| Sun, 05 Apr 2026 06:19:16 GMT |
First Look inside Databricks Lakewatch: A Modern, Open, Agentic S... |
security |
|
Yes |
| Sun, 05 Apr 2026 08:17:15 GMT |
Broken Authentication & Password Reset Vulnerabilities |
cybersecurity, penetration-testing, web-security, ethical-hacking |
|
Yes |
| Sun, 05 Apr 2026 05:44:34 GMT |
The Invisible War |
hacking |
|
Yes |
| Sun, 05 Apr 2026 00:56:35 GMT |
Microsoft Is Quietly Killing Local Account Lateral Movement (And ... |
security, penetration-testing, hacking |
|
Yes |
| Sun, 05 Apr 2026 06:24:08 GMT |
CyberDefenders — DumpMe Lab Writeup |
information-technology, infosec |
|
Yes |
| Sun, 05 Apr 2026 03:10:54 GMT |
Auth Mistakes Every Vibe Coder Ships to Production |
security |
|
Yes |
| Sun, 05 Apr 2026 08:22:50 GMT |
What I Learned From Earning 32+ IT Certifications |
cybersecurity |
|
Yes |
| Sun, 05 Apr 2026 05:52:32 GMT |
My biggest cybersecurity fails… |
information-technology, infosec |
|
Yes |
| Sun, 05 Apr 2026 05:04:05 GMT |
99.2% AND A BROKEN DREAM: WHY I STOPPED TELLING PEOPLE MY GOALS |
vulnerability |
|
Yes |
| Sun, 05 Apr 2026 04:26:43 GMT |
Insecure Logging — Mobile Apps Security Static Analysis Part II |
cyber-security-awareness |
|
Yes |
| Sun, 05 Apr 2026 06:18:59 GMT |
RidoMovies 2026: Complete Guide to Features, Safety, and Alternat... |
information-security |
|
Yes |
| Sun, 05 Apr 2026 05:58:17 GMT |
What actually keeps your office network secure when you’re work... |
information-security |
|
Yes |
| Sun, 05 Apr 2026 04:31:15 GMT |
IDOR: Unauthorized Invoice Access on a Major Job Portal |
bug-bounty, idor |
|
Yes |
| Sun, 05 Apr 2026 03:15:33 GMT |
How I got my first Hall of Fame — A stepping stone in bug bount... |
bug-bounty |
|
Yes |
| Sun, 05 Apr 2026 06:54:16 GMT |
From Zero to Full Recon: How Subfinder Starts the Hunt |
ethical-hacking |
|
Yes |
| Sun, 05 Apr 2026 08:50:51 GMT |
AWS Certified Security Specialty SCS-C03: Ultimate 2026 Guide to ... |
cybersecurity |
|
Yes |
| Sun, 05 Apr 2026 00:17:02 GMT |
Stop Hunting Blind: Build a Structured Bug Bounty Workflow |
bug-bounty, bug-bounty-tips |
|
Yes |
| Sun, 05 Apr 2026 05:06:11 GMT |
ATO in Bug Bounty: From Passive Recon to an ATO and a Reward |
bug-bounty, vulnerability, pentesting |
|
Yes |
| Sun, 05 Apr 2026 05:02:34 GMT |
Exploiting an IPv6 Remote Code Execution Vulnerability: A Practic... |
remote-code-execution |
|
Yes |
| Sun, 05 Apr 2026 08:05:18 GMT |
I Just Open-Sourced My Entire SOC Training Curriculum — And Itâ... |
information-security |
|
Yes |
| Sun, 05 Apr 2026 00:04:26 GMT |
Breaking Into Cybersecurity in 2026: What Changed, What Still Mat... |
information-security |
|
Yes |
| Sun, 05 Apr 2026 08:37:46 GMT |
How to Leverage TPRM Technology According to Gartner |
cybersecurity, web-security |
|
Yes |
| Sun, 05 Apr 2026 00:44:01 GMT |
Why Panic Is Powerful: Confessions From the Help Desk |
pentesting |
|
Yes |
| Sun, 05 Apr 2026 05:36:20 GMT |
I Stopped Reading Cybersecurity News — And Built an AI That Doe... |
cyber-security-awareness |
|
Yes |
| Sun, 05 Apr 2026 03:01:02 GMT |
Fundamentals of Information Security — Chapter 03 |
information-security |
|
Yes |
| Sun, 05 Apr 2026 02:32:19 GMT |
Every time we click the little checkbox that says “I am not a r... |
security |
|
Yes |
| Sun, 05 Apr 2026 08:50:08 GMT |
Cyber Hygiene for Your Business: A Simple Checklist |
hacking, cyber-security-awareness |
|
Yes |
| Sat, 14 Feb 2026 19:47:58 GMT |
Pentest+ in 90 Days or Less (Hopefully) |
pentest |
|
|
| Sun, 21 Sep 2025 07:02:30 GMT |
Affordable but Vulnerable? The Dark Side of CMORE HMI |
censys |
|
|
| Sat, 04 Apr 2026 05:16:03 GMT |
Windows — LDAP User Kerberoastable (Root-Me) Write-up |
pentesting |
|
|
| Mon, 16 Feb 2026 08:42:31 GMT |
Lab: Exploiting HTTP request smuggling to perform web cache poiso... |
web-cache-poisoning |
|
|
| Tue, 17 Mar 2026 09:18:53 GMT |
Web Security Series #6 — Exploiting SQL Injection to Extract Se... |
bug-bounty-hunting |
|
|
| Fri, 20 Feb 2026 18:55:00 GMT |
12+ MUST Know Google Dorking Commands in 2026 |
google-dorking |
|
|
| Mon, 23 Mar 2026 14:17:48 GMT |
Authentication bypass via information disclosure | Lab-04 |
information-disclosure |
|
|
| Tue, 10 Mar 2026 19:42:42 GMT |
CVE-2026-31900: How a Permissive Regex Led to RCE in psf/black’... |
remote-code-execution |
|
|
| Thu, 12 Mar 2026 15:22:45 GMT |
TryHackMe | Lo-Fi |
local-file-inclusion |
|
|
| Mon, 30 Mar 2026 07:59:10 GMT |
20 Underrated Web Security Tools & Browser Extensions Every Learn... |
vapt |
|
|
| Sat, 04 Apr 2026 06:33:03 GMT |
Stop Wasting Time on Scanners — This Is How Real Hackers Find V... |
web-security |
|
|
| Mon, 30 Mar 2026 10:47:54 GMT |
Cross Site Scripting (XSS): Real Examples and Security Guide |
cross-site-scripting |
|
|
| Wed, 01 Apr 2026 06:40:14 GMT |
BAC: THE Money-Making Machine |
bug-bounty-writeup |
|
|
| Thu, 19 Feb 2026 04:57:17 GMT |
Introducing “Information Gathering� as the First Phase of Web... |
google-dorking |
|
|
| Fri, 12 Dec 2025 06:49:56 GMT |
How Variable Data Technology is Transforming Postcard & Brochure ... |
vdp |
|
|
| Fri, 20 Feb 2026 17:56:31 GMT |
TryHackMe — Include — Walkthrough |
local-file-inclusion |
|
|
| Sat, 21 Feb 2026 15:06:35 GMT |
Breaking into Cyber: The Student’s Survival Kit |
cybersecurity-tools |
|
|
| Sun, 15 Mar 2026 14:04:59 GMT |
Microsoft Graph API Attack Surface: OAuth Flows, Abused Endpoints... |
recon |
|
|
| Thu, 26 Mar 2026 18:33:45 GMT |
From Recon to Critical: Finding an Unauthenticated Security Dashb... |
bugbounty-writeup |
|
|
| Fri, 13 Mar 2026 14:55:26 GMT |
Web Security Series #2 — Bypassing Authentication via MFA Tampe... |
bug-bounty-hunting |
|
|
| Fri, 03 Apr 2026 04:57:38 GMT |
CWD-Based Module Hijacking in Python pymanager (CVE-2026-5271) |
cve |
|
|
| Tue, 31 Mar 2026 13:09:06 GMT |
An Open Door for Attackers. Lock It with CSP. |
xss-vulnerability |
|
|
| Sat, 28 Mar 2026 06:56:48 GMT |
The Definitive Guide to Secret Management in Python AI Projects |
api-key |
|
|
| Thu, 21 Aug 2025 10:04:08 GMT |
Dork Like a Demon: FOFA Edition for Hackers & Bug Bounty Hunters |
dorking |
|
|
| Sat, 10 Jan 2026 05:03:45 GMT |
Lab:Web cache poisoning via an unkeyed query parameter | Portswi... |
web-cache-poisoning |
|
|
| Thu, 19 Mar 2026 22:19:50 GMT |
Vulnerability Scanning 101: How to Manage Your Vulnerabilities |
vulnerability-scanning |
|
|
| Fri, 03 Apr 2026 10:59:51 GMT |
Juice Shop Write-up: View Basket Challenge |
idor |
|
|
| Thu, 09 Oct 2025 18:33:05 GMT |
0-click Account Takeover via Punycode |
bug-bounty-program |
|
|
| Sat, 28 Feb 2026 07:39:59 GMT |
CYBERDUDEBIVASH® SSRF Filter + Secure Proxy Service v1.0.0 |
cybersecurity-tools |
|
|
| Mon, 30 Mar 2026 03:28:04 GMT |
Understanding API Security by Building, Exploiting, and Hardening... |
ssrf |
|
|
| Thu, 02 Apr 2026 17:35:36 GMT |
How I Found a Subdomain Takeover via BetterUptime |
subdomain-takeover |
|
|
| Sun, 08 Feb 2026 12:21:01 GMT |
How AI Became My Reporting Partner in Security Research |
bugcrowd |
|
|
| Sat, 04 Apr 2026 12:05:07 GMT |
Partner with a Leading Laravel Application Development Company: W... |
application-security |
|
|
| Fri, 27 Mar 2026 17:20:49 GMT |
End-to-End File Handling in Angular and ASP.NET Core |
file-upload |
|
|
| Wed, 11 Mar 2026 14:37:41 GMT |
Is Your Backend Still Handling File Uploads? |
file-upload |
|
|
| Fri, 03 Apr 2026 11:33:28 GMT |
SameSite Strict Bypass via Sibling Domain (CSWSH) — Practical W... |
xss-attack |
|
|
| Mon, 30 Mar 2026 16:47:34 GMT |
Domain Spoofing via Unicode Homoglyphs: A Practical Breakdown |
vapt |
|
|
| Fri, 20 Feb 2026 14:44:02 GMT |
XSS Attack Methodology: How Attackers Actually Exploit Your Brows... |
xss-bypass |
|
|
| Wed, 01 Apr 2026 09:33:58 GMT |
How to earn VDS in Vadeus Network [Rewards Center] |
bounty-program |
|
|
| Thu, 25 Dec 2025 00:47:15 GMT |
Subdomain Takeover Explained: Complete Step-by-Step Guide (Recon ... |
subdomain-takeover |
|
|
| Sun, 22 Mar 2026 14:53:56 GMT |
Source code disclosure via backup files | Lab-03 |
information-disclosure |
|
|
| Wed, 25 Feb 2026 02:51:18 GMT |
Impact Scenario Hackviser |
local-file-inclusion |
|
|
| Sat, 04 Apr 2026 08:13:07 GMT |
DVWA: File Upload Vulnerability (Low Security) |
vapt, file-upload |
|
|
| Tue, 31 Mar 2026 13:05:08 GMT |
Robots CTF | TryHackMe Walkthrough |
xss-vulnerability |
|
|
| Tue, 24 Feb 2026 07:38:15 GMT |
Glassdoor’s IDOR vulnerability to retrieve email addresses of a... |
bounty-program |
|
|
| Sat, 04 Apr 2026 09:11:24 GMT |
I Audited 50 Websites. Nearly Half Were Silently Broken. |
bugs |
|
|
| Fri, 20 Mar 2026 18:17:58 GMT |
Server-Side Request Forgery (SSRF) - When Attackers Use Your Own ... |
ssrf |
|
|
| Sat, 28 Feb 2026 09:31:10 GMT |
Google Dork’un Pentest Yaşam Döngüsündeki Yeri |
google-dork |
|
|
| Sun, 22 Feb 2026 22:04:07 GMT |
Beyond The Black Box: A Multi-Stage Approach For Evaluating Auton... |
pentest |
|
|
| Sat, 04 Apr 2026 17:32:35 GMT |
How I Earned $200 in 5 Minutes Using a Simple Broken Link Hijack... |
bug-bounty-tips, bug-bounty-writeup, bug-bounty-hunter |
|
|
| Fri, 06 Mar 2026 22:34:06 GMT |
3 Logic Bugs in Zendesk : A Single API Request Gave Me an Adminis... |
bugcrowd |
|
|
| Sat, 28 Feb 2026 21:11:37 GMT |
I Shouldn’t Be Sharing This: The 2026 Google Dork Bible That St... |
google-dork |
|
|
| Thu, 02 Apr 2026 21:17:38 GMT |
CVE-2023–6019 Walkthrough (Proving Ground-OSCP) |
cve |
|
|
| Fri, 03 Apr 2026 02:48:54 GMT |
Designing a production-grade, autonomous vulnerability research p... |
cve |
|
|
| Sat, 04 Apr 2026 05:31:01 GMT |
Shodan + Censys Internet Ka X-Ray: Bina Scan Kiye Sab Kuch Dekho!... |
shodan |
|
|
| Sat, 04 Apr 2026 12:04:21 GMT |
I Walked Into an Admin Panel -Without Being an Admin |
web-security |
|
|
| Thu, 19 Mar 2026 22:46:44 GMT |
How I Earned $76,000 From a Single Program on Bugcrowd |
bugcrowd |
|
|
| Fri, 24 Jan 2025 00:08:47 GMT |
A majestic temple opportunity of wellbeing and wellness |
web-pentest |
|
|
| Fri, 13 Mar 2026 00:55:22 GMT |
OpenClaw Part II: The Growing Security Risks Behind One-Click RCE... |
rce |
|
|
| Thu, 26 Mar 2026 18:22:21 GMT |
CVE-2025–4123 Grafana Open Redirect & SSRF — Full PoC — CVS... |
vapt, ssrf |
|
|
| Sat, 28 Mar 2026 05:15:09 GMT |
LLM Vulnerability to Internet Source Manipulation |
security-research |
|
|
| Thu, 26 Feb 2026 00:47:58 GMT |
From Shodan Recon to Multiple Security Flaws in the Same Program |
shodan |
|
|
| Fri, 03 Apr 2026 14:37:04 GMT |
Browsed — HackTheBox Writeup |
pentesting |
|
|
| Thu, 02 Apr 2026 08:23:39 GMT |
Cross-Site Scripting (XSS) Deep Dive: Türleri, Senaryoları ve E... |
xss-attack |
|
|
| Wed, 01 Apr 2026 12:45:32 GMT |
Content Security Policy (CSP) in Modern Web Apps: The Practical G... |
xss-attack |
|
|
| Sat, 04 Apr 2026 18:57:15 GMT |
The Linux Security Journey — nosymfollow (No Symbolic Link Foll... |
information-security |
|
|
| Thu, 12 Mar 2026 18:45:23 GMT |
Pulse-Zero: Atomic Memory Slicing and Sub-Layer Evasion via x64 A... |
cyber-sec |
|
|
| Sat, 04 Apr 2026 20:06:01 GMT |
Ch-Ch-Ch… Pass-Pass-Pass: My Friday the 13th Journey to eJPT |
penetration-testing |
|
|
| Wed, 01 Apr 2026 14:42:47 GMT |
Ruby Hash Inconsistency Bug Story |
bugs |
|
|
| Thu, 18 Dec 2025 10:06:53 GMT |
Learn Google Dorking: Arama Motorlarıyla Bilgi Keşfi |
google-dork |
|
|
| Thu, 26 Mar 2026 14:24:48 GMT |
A Comprehensive VAPT Methodology Applied in Practical Security As... |
bugbounty-writeup, vapt |
|
|
| Sat, 04 Apr 2026 19:38:47 GMT |
No title |
cyber-security-awareness |
|
|
| Sun, 23 Feb 2025 11:17:25 GMT |
$1000-$10k worth Leaks via Github Secret Dorks |
github-dorking |
|
|
| Sat, 14 Feb 2026 22:03:31 GMT |
6 Hours, 6 Real-world Critical Bugs: A Case Study in Efficient Bu... |
cyber-sec |
|
|
| Wed, 01 Apr 2026 17:01:03 GMT |
Claud: The Ultimate Game Changer for Bug Fixing |
bugs |
|
|
| Sat, 25 Jan 2025 23:20:10 GMT |
Full GitHub Dorking guide: for OSINT and BugBounty (Reconnaissanc... |
github-dorking |
|
|
| Wed, 25 Feb 2026 14:23:06 GMT |
Lo-Fi TryHackMe Writeup |
lfi, file-inclusion |
|
|
| Mon, 16 Feb 2026 01:01:36 GMT |
Valenfind — TryHackMe Writeup | by P4NTHR |
lfi |
|
|
| Fri, 27 Mar 2026 03:29:10 GMT |
TryHackMe — File Inclusion (Walkthrough) |
file-inclusion |
|
|
| Mon, 16 Mar 2026 16:35:28 GMT |
Hackerlar Nasıl Düşünür? |
security-research |
|
|
| Thu, 04 Dec 2025 05:32:24 GMT |
ChainBounty Rewards & Bonus Guide — December 2025 |
bounties |
|
|
| Tue, 31 Mar 2026 14:47:06 GMT |
Web Security Series #13 — Command Injection Exploitation (Rever... |
cross-site-scripting |
|
|
| Fri, 29 Aug 2025 04:43:21 GMT |
9. The Secret Power of Google Dorking |
dorking |
|
|
| Sat, 17 Jan 2026 07:44:23 GMT |
Google Dorks to Find SQL Injection Vulnerable Websites |
google-dork |
|
|
| Tue, 13 Jan 2026 13:27:13 GMT |
Hacking “Time�: When Critical Infrastructure Forgets to Set a... |
vulnerability-disclosure |
|
|
| Tue, 03 Mar 2026 19:29:30 GMT |
Wie angreifbar ist Ihr Unternehmen wirklich? |
pentest |
|
|
| Sat, 04 Apr 2026 22:23:06 GMT |
DOUBLE HOP |
security |
|
|
| Sat, 04 Apr 2026 18:23:26 GMT |
Built an Automated Network Scanner That Updates Itself Every 10 M... |
infosec |
|
|
| Wed, 18 Mar 2026 15:35:26 GMT |
This Web3 Interview Task Was Actually a Remote Access Trojan |
exploit |
|
|
| Sat, 04 Apr 2026 08:07:30 GMT |
It Took Fifteen Years and a War |
vulnerability |
|
|
| Sat, 04 Apr 2026 05:50:50 GMT |
WHY MOST RECON IS USELESS |
bug-bounty-tips |
|
|
| Fri, 03 Apr 2026 12:07:45 GMT |
Understanding OTP Verification Bypass via Client-Side Response Ma... |
security-research |
|
|
| Thu, 04 Dec 2025 10:22:05 GMT |
The Billion-Naira Blueprint: How SuperteamNG Turned Nigerian Tale... |
bounties |
|
|
| Sat, 04 Apr 2026 15:03:08 GMT |
Anthropic confirma haber filtrado accidentalmente el código fuen... |
information-technology |
|
|
| Sat, 04 Apr 2026 22:01:43 GMT |
� Beyond the Visual: The Technical Reality of Homoglyph Attacks |
infosec |
|
|
| Thu, 02 Apr 2026 18:59:50 GMT |
File Inclusion (LFI/RFI) — Extracting Sensitive Data from confi... |
local-file-inclusion, file-inclusion |
|
|
| Tue, 31 Mar 2026 08:17:14 GMT |
Exploiting OData Wildcards: How I Scraped Tesla’s Internal Empl... |
hackerone, bugcrowd |
|
|
| Wed, 11 Mar 2026 17:16:42 GMT |
Secure and Scalable File Uploads/Downloads to S3 via CloudFront |
file-upload |
|
|
| Fri, 27 Mar 2026 17:43:18 GMT |
Introducing GhostIntel: Your Open-Source OSINT & Reconnaissance T... |
security-research |
|
|
| Sun, 08 Mar 2026 06:50:53 GMT |
XSS Inbound Attack: I Didn’t Steal Your Cookie. I Stole Your So... |
xss-bypass |
|
|
| Sat, 04 Apr 2026 07:04:16 GMT |
The Insecurity I Chose to Defy |
vulnerability |
|
|
| Fri, 03 Apr 2026 22:10:38 GMT |
Open Intelligence Lab v0.5.0: From Research Platform to Productio... |
application-security |
|
|
| Tue, 17 Feb 2026 10:44:13 GMT |
Top 15 Website Security Mistakes That Get Sites Hacked |
recon |
|
|
| Wed, 18 Feb 2026 01:09:03 GMT |
cURL’s Bug Bounty Is Dead. AI Killed It. |
bounty-program |
|
|
| Sat, 04 Apr 2026 18:46:50 GMT |
Scapy 102 — Ağı Aktif Olarak Sorgulamak |
ethical-hacking |
|
|
| Mon, 02 Mar 2026 11:21:53 GMT |
How I Found a Critical PII Leak in a Public API | Cyber Tamarin |
information-disclosure |
|
|
| Fri, 27 Mar 2026 13:01:03 GMT |
Kioptrix Level 4(Kioptrix 1.3) | 04/100 |
vapt |
|
|
| Mon, 17 Nov 2025 23:45:18 GMT |
DorkFi: The Triumph of a Team You Can Trust |
dorks |
|
|
| Wed, 01 Apr 2026 04:45:42 GMT |
Claude Code Leak: What if it was a Calculated Move and not an Acc... |
exploit |
|
|
| Tue, 23 Dec 2025 18:32:40 GMT |
The Night I Found a Backup ZIP File Sitting in Plain Sight —... |
bounties |
|
|
| Tue, 18 Nov 2025 18:12:40 GMT |
Dork Labs Awarded AWS Activate Startup Grant |
dorks |
|
|
| Sat, 28 Feb 2026 14:32:47 GMT |
TryHackMe CTF Walkthrough- Love at First Breach 2026: Valenfind |
lfi |
|
|
| Sun, 22 Mar 2026 17:16:08 GMT |
I Built a Scalable File Upload System Twice — Here’s What Cha... |
file-upload |
|
|
| Fri, 03 Apr 2026 16:55:38 GMT |
APNs Token Registration Issues on iOS A Complete Debugging Journe... |
bug-bounty-tips |
|
|
| Wed, 01 Apr 2026 18:43:56 GMT |
Lab: SQL injection attack, listing the database contents on Oracl... |
web-pentest |
|
|
| Sun, 29 Mar 2026 07:01:15 GMT |
�Log Injection & sshguard Bypass in pfSense 2.8.0 — A Securit... |
exploit |
|
|
| Fri, 27 Mar 2026 11:02:23 GMT |
Microsoft Power BI API Credential Exposure: From Public Postman W... |
recon |
|
|
| Sat, 04 Apr 2026 11:09:34 GMT |
Axios NPM Supply Chain Attack |
vulnerability |
|
|
| Sat, 04 Apr 2026 15:00:21 GMT |
Top 10 Google Dorks for Bug Bounty (Beginner to Pro Guide) |
web-security |
|
|
| Fri, 27 Mar 2026 14:27:07 GMT |
WIZ Bug Bounty Master Class: SSRF Vulnerability on Major Gaming C... |
hackerone, ssrf |
|
|
| Thu, 27 Mar 2025 23:46:11 GMT |
Make Break and Betrayal |
web-pentest |
|
|
| Fri, 19 Sep 2025 07:40:16 GMT |
How I Tracked Our Clients’ Device Versions Without Direct Repor... |
zoomeye |
|
|
| Thu, 26 Mar 2026 05:10:23 GMT |
How I Made $47,000 on HackerOne This Year Without a Degree — Th... |
hackerone |
|
|
| Fri, 30 Jan 2026 02:02:40 GMT |
Missing authentication in API Endpoints lead to update orders and... |
bugcrowd |
|
|
| Thu, 05 Mar 2026 21:41:26 GMT |
Finding a P1 in NASA: The Power of Google Dorking |
google-dork |
|
|
| Fri, 03 Apr 2026 23:30:20 GMT |
Security Advisory: QuickLaunch SSO Platform — Unauthenticated C... |
information-disclosure |
|
|
| Mon, 23 Mar 2026 06:24:04 GMT |
From iframe Injection to Account Takeover (Full Exploit Chain) |
xss-vulnerability |
|
|
| Sun, 23 Nov 2025 15:58:33 GMT |
just memecoin Rewards Eligibility & Claim Guide — November 2025 |
dorks |
|
|
| Wed, 01 Apr 2026 07:55:42 GMT |
CVE-2026–24018: A Logic flaw to Local Privilege Escalation 0day... |
exploit, security-research |
|
|
| Thu, 19 Feb 2026 12:53:45 GMT |
Lab: Web cache poisoning via HTTP/2 request tunnelling | Portswi... |
web-cache-poisoning |
|
|
| Tue, 06 Jan 2026 15:29:55 GMT |
Lab: Web cache poisoning via a fat GET request | Portswigger |
web-cache-poisoning |
|
|
| Sat, 21 Mar 2026 13:15:25 GMT |
Stored DOM XSS to Account Takeover |
xss-vulnerability |
|
|
| Fri, 03 Apr 2026 09:07:35 GMT |
IDOR / BOLA: The Vulnerability That Keeps Leaking Everyone’s Da... |
idor |
|
|
| Sat, 04 Apr 2026 18:05:37 GMT |
The Weakest Link in Cybersecurity: Humans as Gatekeepers |
penetration-testing |
|
|
| Fri, 03 Apr 2026 11:16:41 GMT |
The Hackers Labs Writeup — Stars Wars I (Spanish) |
pentesting |
|
|
| Wed, 17 Dec 2025 09:57:30 GMT |
The Mother Lode: Hacking with GitHub Dorking |
github-dorking |
|
|
| Thu, 26 Dec 2024 15:23:03 GMT |
GitHub Dorking List: The Ultimate Guide to Exploring and Securing... |
github-dorking |
|
|
| Mon, 23 Mar 2026 21:03:28 GMT |
SOC129 — Successful Local File Inclusion (EventID: 63) |
local-file-inclusion |
|
|
| Sun, 08 Mar 2026 11:01:01 GMT |
I Paid $500 for AI Directory Listings. Here Is My Honest ROI Brea... |
directory-listing |
|
|
| Wed, 03 Dec 2025 18:29:09 GMT |
How I Discovered a Flaw That Let Me Access Enterprise-Only Featur... |
bounty-program |
|
|
| Tue, 24 Mar 2026 17:38:54 GMT |
Why location.href Isn’t Just a Redirect: |
xss-vulnerability |
|
|
| Tue, 06 Jan 2026 06:42:57 GMT |
WHAT IS A SHODAN? |
shodan |
|
|
| Tue, 22 Apr 2025 10:38:20 GMT |
Trump’s Tariffs Cut Out Censys — ZoomEye Steps In Strong! |
zoomeye |
|
|
| Fri, 13 Mar 2026 07:57:18 GMT |
Information disclosure in error messages | Lab -01 |
information-disclosure |
|
|
| Sun, 14 Dec 2025 06:37:06 GMT |
My Bug Bounty Diary |
subdomain-enumeration |
|
|
| Sat, 04 Apr 2026 07:11:29 GMT |
Beyond the CVE: What I Learned While Hunting Bugs and Jobs Simult... |
cve |
|
|
| Wed, 01 Apr 2026 11:47:47 GMT |
Most companies in India collect personal data every single day. |
vapt |
|
|
| Mon, 30 Mar 2026 06:03:13 GMT |
Why Business Directory Listings Are the Secret Weapon of Off-Page... |
directory-listing |
|
|
| Tue, 23 Sep 2025 13:01:51 GMT |
Why Email Marketing Is the Secret Growth Tool for Directory Websi... |
directory-listing |
|
|
| Sat, 14 Feb 2026 02:43:54 GMT |
Invicti: The Enterprise Web Application Security Scanner for Accu... |
vulnerability-scanning |
|
|
| Sun, 15 Mar 2026 16:45:35 GMT |
Web Security Series #4 — Discovering Unauthorized Resources via... |
bug-bounty-hunting |
|
|
| Mon, 08 Dec 2025 11:02:43 GMT |
Comisiones de trading DESACTIVADAS! |
bounty-program |
|
|
| Sat, 04 Apr 2026 20:46:06 GMT |
The Evolution of the “Impossible� |
information-technology |
|
|
| Fri, 27 Mar 2026 19:03:21 GMT |
Pentest Chronicles: My Web App Journey Day #1 |
cross-site-scripting |
|
|
| Thu, 02 Apr 2026 15:28:31 GMT |
O Primeiro passo é o mais importante! |
pentest |
|
|
| Fri, 13 Mar 2026 00:00:04 GMT |
File Inclusion | TryHackMe Write-up | Farros |
file-inclusion |
|
|
| Tue, 11 Nov 2025 16:43:14 GMT |
Beyond Google: Navigating the Hidden Internet with Shodan and Cen... |
censys |
|
|
| Fri, 03 Apr 2026 19:49:06 GMT |
What Actually Happens When You Go Looking for API Keys in JavaScr... |
bug-bounty-tips |
|
|
| Thu, 14 Aug 2025 10:54:38 GMT |
Unlocking the Hidden Power of Search Engines |
censys |
|
|
| Tue, 31 Mar 2026 09:02:27 GMT |
Securing the Edges: A Practical Way to Handle XSS in Modern Apps |
cross-site-scripting, xss-vulnerability |
|
|
| Wed, 01 Apr 2026 20:08:39 GMT |
Breaking It During a Hackathon |
bug-bounty-writeup |
|
|
| Fri, 06 Feb 2026 06:33:08 GMT |
5 Ways to Bypass Email Verification Without Using Any Tool |
bug-bounty-program |
|
|
| Mon, 21 Jul 2025 14:07:41 GMT |
“403 Forbidden? |
vdp |
|
|
| Sun, 29 Mar 2026 15:21:24 GMT |
Plant Photographer TryHackMe Writeup |
ssrf |
|
|
| Sun, 22 Feb 2026 13:02:39 GMT |
OtterCTF - Hopity Hop Reverse Engineering Walkthrough |
cyber-sec |
|
|
| Sat, 04 Apr 2026 17:27:29 GMT |
THM CTF: Offensive Security |
ethical-hacking |
|
|
| Sat, 04 Apr 2026 17:55:44 GMT |
Windows Notepad’de Kritik RCE: Markdown Linkleri Üzerinden Kom... |
exploit |
|
|
| Wed, 25 Mar 2026 07:01:14 GMT |
Hackviser Unrestricted File Upload Labs — Basic Unrestricted Fi... |
file-upload |
|
|
| Tue, 25 Nov 2025 09:25:11 GMT |
Step-by-Step BOUNTY Rewards Guide — November 2025 |
bounties |
|
|
| Wed, 11 Feb 2026 18:30:13 GMT |
Understanding Vulnerabilities, Threats, and OWASP Standard Testin... |
cyber-sec |
|
|
| Sat, 04 Apr 2026 20:28:45 GMT |
Integrating gRPC with Mendix |
information-technology |
|
|
| Sat, 04 Apr 2026 19:16:18 GMT |
Defensive Perspective: Where Can We Stop Ransomware? |
information-security |
|
|
| Fri, 03 Apr 2026 18:21:34 GMT |
Bug Hunting Without Touching the Target: The Power of External In... |
bug-bounty-writeup |
|
|
| Tue, 15 Jul 2025 12:15:58 GMT |
“Secure� OPC UA Setups Are Being Hacked — Here’s Why |
censys |
|
|
| Tue, 05 Dec 2023 07:54:40 GMT |
LFI via SMTP log poisoning |
log-poisoning |
|
|
| Tue, 10 Mar 2026 09:59:23 GMT |
I Thought I Found 259 Exposed Systems in Bengaluru… I Was Wrong |
shodan |
|
|
| Mon, 02 Mar 2026 00:00:27 GMT |
TakeOver | TryHackMe Write-up | Farros |
subdomain-takeover |
|
|
| Sat, 28 Mar 2026 18:53:58 GMT |
From $500 to $1,500 Email Verification Bypass: Impact Chaining |
hackerone |
|
|
| Thu, 18 Dec 2025 20:10:01 GMT |
Google Dorking Nedir? |
google-dork |
|
|
| Fri, 09 Jan 2026 05:50:02 GMT |
Caches, Edge, and Exploits |
web-cache-poisoning |
|
|
| Fri, 20 Mar 2026 23:01:01 GMT |
How I Automated Google Dorking with a Simple Bookmarklet |
google-dorking |
|
|
| Wed, 01 Apr 2026 10:50:02 GMT |
Volume 3, Post 10: Demystifying Cross-Site Scripting (XSS) |
xss-attack |
|
|
| Wed, 04 Mar 2026 20:13:26 GMT |
How I Got 3 Bugs No Automation, Just Logic |
information-disclosure |
|
|
| Mon, 16 Feb 2026 04:16:35 GMT |
Gratuité des transports au Mans : une promesse audacieuse de LFI |
lfi |
|
|
| Tue, 31 Mar 2026 07:57:14 GMT |
How I Test API Keys Using Only Burp Suite |
api-key |
|
|
| Sat, 04 Apr 2026 22:14:15 GMT |
TryHackMe Attacktive Directory Writeup (Step-by-Step Deep Dive) |
penetration-testing |
|
|
| Thu, 02 Apr 2026 19:03:43 GMT |
How I Found a Critical SAML Authentication Bypasson a Major Autom... |
bug-bounty-writeup |
|
|
| Mon, 23 Mar 2026 11:04:28 GMT |
File Upload by RCE: Apache Tomcat Manager Exploit |
rce, remote-code-execution |
|
|
| Wed, 18 Feb 2026 21:56:48 GMT |
Chapter 14: Subdomain Takeover |
subdomain-takeover |
|
|
| Sat, 04 Apr 2026 22:39:36 GMT |
You Can’t Build Intimacy If You Won’t Let Anyone Support You |
vulnerability |
|
|
| Sun, 24 Aug 2025 20:18:55 GMT |
How I found an Account Lockout Vulnerability Without Any Tools |
bug-bounty-program |
|
|
| Thu, 02 Apr 2026 15:46:23 GMT |
S1: Security Is a Design Decision |
application-security |
|
|
| Wed, 01 Apr 2026 13:07:21 GMT |
CafeClub writeup (IDOR) Bugforge |
idor |
|
|
| Sat, 01 Nov 2025 20:09:17 GMT |
just memecoin — Best Platforms |
dorks |
|
|
| Sat, 21 Mar 2026 20:37:31 GMT |
Using Nmap |
vulnerability-scanning |
|
|
| Sun, 15 Mar 2026 13:49:03 GMT |
Как подключить Java приложение к кла�... |
api-key |
|
|
| Sun, 29 Mar 2026 19:09:33 GMT |
TryHackMe | Plant Photographer Walkthrough |
ssrf |
|
|
| Fri, 03 Apr 2026 15:11:10 GMT |
Exposed .env File Leads To API Key Leak & Financial Impact |
bug-bounty-tips, pentesting, bug-bounty-writeup |
|
|
| Thu, 02 Apr 2026 07:44:22 GMT |
SeedLab: Cross-Site Scripting(XXS) Attack Writeup |
xss-attack, cross-site-scripting |
|
|
| Sat, 14 Mar 2026 04:04:52 GMT |
Information disclosure on debug page APPRENTICE | Lab -02 |
information-disclosure |
|
|
| Thu, 12 Mar 2026 05:18:51 GMT |
How I Found Information Disclosure on a Non-Standard Port: The St... |
information-disclosure |
|
|
| Sun, 15 Feb 2026 09:26:13 GMT |
TryHackMe Walkthrough -Subdomain Enumeration |
subdomain-enumeration |
|
|
| Sat, 04 Apr 2026 18:47:27 GMT |
Path Traversal Vulnerability in Go: From Source Code Review to Ex... |
penetration-testing, web-security, ethical-hacking |
|
|
| Fri, 03 Apr 2026 06:59:49 GMT |
What Is Application Security and Why Do Modern Enterprises Need I... |
application-security |
|
|
| Sat, 14 Mar 2026 03:59:24 GMT |
Mail Service Lab: Extreme Red Team LAB Review |
exploit |
|
|
| Mon, 23 Mar 2026 19:43:06 GMT |
I Thought It Was a Container… It Was a Whole Azure VM (RCE Stor... |
rce |
|
|
| Sat, 04 Apr 2026 14:03:16 GMT |
Conversor [H.T.B] machine Writeup : |
infosec |
|
|
| Mon, 30 Mar 2026 14:45:53 GMT |
5 XSS at xyz.com lead to 5000€ — Shivang Maurya |
hackerone |
|
|
| Wed, 18 Feb 2026 04:39:59 GMT |
​"Beyond the Alert Box: Demonstrating Real-World XSS Impact" |
xss-bypass |
|
|
| Mon, 16 Feb 2026 14:31:00 GMT |
BOUNTY | HTB | Windows |Walkthrough | Write up |
bounties |
|
|
| Wed, 11 Feb 2026 19:07:33 GMT |
Google Search Operators You Can Use |
google-dork |
|
|
| Mon, 09 Mar 2026 06:56:21 GMT |
File Inclusion Vulnerability: Easy concept explanation |
file-inclusion |
|
|
| Sat, 04 Apr 2026 18:01:01 GMT |
ثغرة CVE-2026–20093 Ù�ÙŠ Cisco IMC: تخطÙ� كامل للÙ... |
hacking, cve |
|
|
| Mon, 23 Mar 2026 06:32:32 GMT |
What Is Remote Code Execution (RCE)? How It Works, Risks & Preven... |
remote-code-execution |
|
|
| Fri, 13 Mar 2026 15:01:05 GMT |
Reverse Engineering a Password Checker — picoCTF PW Crack 3 |
security-research |
|
|
| Fri, 23 May 2025 06:02:53 GMT |
Search Skills |
censys |
|
|
| Thu, 02 Apr 2026 07:24:26 GMT |
Cross Site Scripting (XSS): |
xss-attack, xss-vulnerability |
|
|
| Sat, 06 Dec 2025 23:06:15 GMT |
Big News from DorkFi — PreFi Rewards Drop + Contest Live! |
dorks |
|
|
| Wed, 11 Mar 2026 08:12:14 GMT |
The Bug Bounty Hunter Roadmap (2026): From Curious Beginner to Re... |
bug-bounty-hunting |
|
|
| Thu, 28 Sep 2023 23:05:39 GMT |
Archangel — TryHackMe |
log-poisoning |
|
|
| Fri, 26 Dec 2025 07:43:53 GMT |
Beginner's Guide to Claiming BOUNTY Airdrop — Claim Up To $50,0... |
bounties |
|
|
| Wed, 25 Mar 2026 07:44:25 GMT |
Side Hustles for Cybersecurity Professionals: Bug Bounties, Cons... |
bugbounty-writeup |
|
|
| Sun, 07 Dec 2025 06:18:32 GMT |
Breaking the Perimeter: How My Custom Python Tool Bypassed a Fede... |
vdp |
|
|
| Tue, 24 Mar 2026 17:48:00 GMT |
The Ultimate Bug Bounty Course: From Zero to Advanced Hacker 1 |
bug-bounty-hunting |
|
|
| Thu, 02 Apr 2026 20:20:02 GMT |
What a Real Autonomous Recon Pipeline Looks Like |
recon |
|
|
| Tue, 03 Mar 2026 05:34:39 GMT |
Documenting my journey. |
cyber-sec |
|
|
| Sat, 06 Dec 2025 06:43:54 GMT |
The Midnight Pwn: How a News Alert Led to a Critical Bounty |
vulnerability-disclosure |
|
|
| Thu, 12 Feb 2026 15:16:03 GMT |
Practical Research Article: Email OSINT Tool — Epieos |
cybersecurity-tools |
|
|
| Thu, 12 Feb 2026 03:21:30 GMT |
Lumma Stealer dan Evolusi Social Engineering |
pentest |
|
|
| Fri, 03 Apr 2026 00:00:15 GMT |
Decoder & Comparer — Reading What Applications Hide Inside Enco... |
application-security |
|
|
| Tue, 10 Feb 2026 23:04:46 GMT |
Effective Dorking Tools |
dorking |
|
|
| Wed, 01 Apr 2026 02:46:54 GMT |
How I Found an IDOR That Exposed Cancer Patient Identities on a G... |
idor |
|
|
| Fri, 03 Apr 2026 15:31:40 GMT |
TryHackMe | Spring AI: CVE-2026–22738 | WriteUp |
cve |
|
|
| Fri, 27 Mar 2026 01:57:54 GMT |
DarkSword: A Sophisticated iPhone Spyware Threat Targeting Malays... |
exploit |
|
|
| Thu, 12 Mar 2026 18:11:47 GMT |
A Simple P4 Bug That Ended as Duplicate |
bug-bounty-hunting |
|
|
| Sat, 04 Apr 2026 11:58:35 GMT |
Learning Broken Access Control — My Journey with PortSwigger Ac... |
idor |
|
|
| Wed, 18 Mar 2026 14:34:33 GMT |
File Inclusion Zafiyetleri: LFI ve RFI Nedir, Nasıl Çalışır ... |
file-inclusion |
|
|
| Thu, 20 Nov 2025 09:45:04 GMT |
Timber Doors in Surrey: Style, Durability, and Value Explained |
dorking |
|
|
| Thu, 11 Sep 2025 22:20:14 GMT |
It’s Coming: DorkFi Delivers PreFi Rewards Surge |
dorking |
|
|
| Sun, 28 Dec 2025 08:13:44 GMT |
Subzy Tool |
subdomain-takeover |
|
|
| Mon, 26 Jan 2026 07:25:06 GMT |
How Forgotten DNS Records Lead to Subdomain Takeovers |
subdomain-takeover |
|
|
| Sat, 04 Apr 2026 18:13:09 GMT |
Pro-tips for better bug bounty reports |
penetration-testing, hacking, bug-bounty-tips |
|
|
| Sat, 04 Apr 2026 11:02:37 GMT |
Web Red Team Analyst (Web‑RTA) Exam Write‑Up & Overview |
web-security |
|
|
| Sun, 29 Mar 2026 20:36:11 GMT |
XSS (Cross-Site Scripting) |
cross-site-scripting |
|
|
| Fri, 03 Apr 2026 16:28:52 GMT |
The Bugs No Scanner Will Ever Find |
idor |
|
|
| Fri, 27 Mar 2026 11:01:08 GMT |
Finding XSS Through HTML Injection — Without Fuzzing Tools |
xss-bypass |
|
|
| Tue, 31 Mar 2026 21:33:04 GMT |
The Hidden Reason Your Pest Problem Keeps Coming Back (And How to... |
bugs |
|
|
| Fri, 28 Jun 2024 14:51:14 GMT |
X-Forwarded HTTP header-ləri : Qısa izah |
log-poisoning |
|
|
| Fri, 03 Apr 2026 08:10:44 GMT |
Your code didn’t break. Europe changed the time: the bug that o... |
bugs |
|
|
| Tue, 23 Dec 2025 06:58:24 GMT |
How I Found Vulnerabilities in NASA and Got into the Hall of Fame |
vulnerability-disclosure |
|
|
| Tue, 05 Aug 2025 00:19:11 GMT |
Breaking Recon with AMASS |
subdomain-enumeration |
|
|
| Sat, 28 Mar 2026 08:13:46 GMT |
How Exposed n8n Webhooks Become an Attack Surface |
shodan |
|
|
| Sun, 13 Jul 2025 16:32:21 GMT |
ProConOS Exposed: What ICS Security Teams Need to Know |
censys |
|
|
| Mon, 16 Mar 2026 07:31:29 GMT |
How I hacked AI Agent and worth bounty of $$$$ |
bugcrowd |
|
|
| Fri, 24 Jan 2025 09:34:52 GMT |
A new Holistic temple opening InLeeds |
web-pentest |
|
|
| Tue, 24 Mar 2026 13:18:44 GMT |
Information disclosure in version control history | Lab-05 |
information-disclosure |
|
|
| Wed, 22 Oct 2025 14:11:32 GMT |
Mastering Subdomain Enumeration: A Beginner’s Guide to Expandin... |
subdomain-enumeration |
|
|
| Tue, 14 Oct 2025 01:36:00 GMT |
Hackviser  —  File Inclusion Labs |
file-inclusion |
|
|
| Sat, 20 Apr 2024 17:20:58 GMT |
TryHackMe — Brute Walkthrough | TheHiker |
log-poisoning |
|
|
| Wed, 25 Mar 2026 10:55:24 GMT |
METASPLOIT EXPLOIT |TRYHACKME PREMIUM |
cyber-sec |
|
|
| Fri, 03 Apr 2026 13:05:51 GMT |
Why Choose Associative as Your Trusted Kotlin Application Develop... |
application-security |
|
|
| Thu, 02 Apr 2026 21:03:19 GMT |
OWASP ASVS is one of the best things in AppSec. Most engineering ... |
application-security |
|
|
| Sun, 26 Jan 2025 19:08:11 GMT |
Matrix strike’s back against honesty from a power stance |
web-pentest |
|
|
| Fri, 07 Feb 2025 05:12:28 GMT |
Do You Struggle Finding Internal/Hidden Subdomains? Recon part 5 |
subdomain-enumeration |
|
|
| Mon, 02 Mar 2026 10:51:58 GMT |
How I Found Yet Another Misconfiguration on This College Site |
bug-bounty-hunting |
|
|
| Tue, 04 Nov 2025 07:31:55 GMT |
Google Dorking |
dorks |
|
|
| Mon, 03 Nov 2025 19:42:12 GMT |
Announcing DorkFi Go-Live Date: Liquidity is Coming |
dorks |
|
|
| Tue, 23 Sep 2025 06:36:22 GMT |
Mengamankan File Sensitif & Directory Listing website dengan .ht... |
directory-listing |
|
|
| Sat, 04 Apr 2026 15:30:26 GMT |
This Phishing EML is Really Creative: Edition 1.0 |
cyber-security-awareness |
|
|
| Sat, 14 Mar 2026 08:26:08 GMT |
How I Spent 30 Days Chasing a $40,000 Bug Bounty And What I Learn... |
rce |
|
|
| Sat, 21 Mar 2026 17:45:32 GMT |
CVE-2025–66034 POC |
remote-code-execution |
|
|
| Sun, 22 Mar 2026 10:40:15 GMT |
DVWA: File Inclusion Vulnerability (Low Security) |
local-file-inclusion, file-inclusion |
|
|
| Sun, 22 Feb 2026 14:57:32 GMT |
How Domain Enumeration, Content Discovery, Leaked Secrets, and Se... |
recon |
|
|
| Fri, 01 Aug 2025 06:17:06 GMT |
15,000 Critical Systems Are Exposed — Thanks to This Outdat... |
censys |
|
|
| Wed, 01 Apr 2026 06:33:15 GMT |
My First Bug Bounty Report: |
hackerone |
|
|
| Wed, 11 Mar 2026 08:27:57 GMT |
Exposed Credentials in a Public Repository Leading to Administrat... |
bug-bounty-hunter |
|
|
| Sat, 04 Apr 2026 14:36:39 GMT |
June 2026: The Secure Boot Problem Nobody Wants on Their Calendar |
cyber-security-awareness |
|
|
| Sun, 08 Mar 2026 16:31:00 GMT |
Exploiting CVE-2026–1731: A Critical Pre-Auth RCE in BeyondTrus... |
remote-code-execution |
|
|
| Sat, 07 Mar 2026 12:52:14 GMT |
The God-Mode Leak: How One JavaScript Variable Toppled an Entire ... |
bug-bounty-hunter |
|
|
| Mon, 09 Mar 2026 18:49:55 GMT |
Walkthrough: Vulnerability Scanning w/ OpenVAS |
vulnerability-scanning |
|
|
| Sat, 14 Feb 2026 05:46:19 GMT |
CVE-2025–4406 Writeup: Stored XSS on wpForo Forum |
xss-bypass |
|
|
| Fri, 03 Apr 2026 08:30:09 GMT |
Inside The Vault Sentry — How We Detect and Stop API Key Leaks |
api-key |
|
|
| Sat, 04 Apr 2026 19:39:09 GMT |
Reverse Engineering Basics |
hacking |
|
|
| Sat, 20 Dec 2025 18:21:40 GMT |
N0aziXss SubSpectre: Advanced Subdomain Discovery with Intelligen... |
subdomain-enumeration |
|
|
| Thu, 12 Feb 2026 03:11:00 GMT |
XSS & SVG: PentesterLab Feb2026 |
xss-bypass |
|
|
| Sat, 28 Mar 2026 08:57:59 GMT |
Web Security Series #11 — Exploiting Stored Cross-Site Scriptin... |
cross-site-scripting |
|
|
| Mon, 30 Mar 2026 00:22:12 GMT |
I Found a Bug That Could Delete Anyone’s Profile on a U.S. Navy... |
bugbounty-writeup |
|
|
| Tue, 03 Feb 2026 17:12:47 GMT |
My First Week: 3 Business Logic Bugs in Major E-Commerce |
bug-bounty-program |
|
|
| Thu, 02 Oct 2025 06:59:46 GMT |
Endless Cashback Glitch:How I Unlocked Unlimited Free Orders with... |
bug-bounty-program |
|
|
| Thu, 05 Mar 2026 21:45:19 GMT |
Berlin im Visier der Hacker: Warum jedes Unternehmen heute einen ... |
pentest |
|
|
| Fri, 03 Apr 2026 09:26:29 GMT |
STRATEGIC CYBERSECURITY AUDIT 2026 |
pentesting |
|
|
| Fri, 03 Apr 2026 05:30:39 GMT |
Corridor Walkthrough — TryHackMe |
idor |
|
|
| Mon, 23 Mar 2026 14:36:00 GMT |
ClamAV ile Spring Boot’ta Virüs Taraması |
file-upload |
|
|
| Sat, 06 Dec 2025 17:05:14 GMT |
GitHub Pages Subdomain Takeover on aiaa-dpw.larc.nasa.gov (NASA V... |
subdomain-takeover |
|
|
| Sat, 04 Apr 2026 19:57:06 GMT |
Finding Unique Fingerprint Keywords for FOFA, Shodan, ZoomEye, Ce... |
bug-bounty |
|
|
| Tue, 24 Mar 2026 08:56:25 GMT |
Detection_WorkBench: The Unified Security Detection & Intelligenc... |
cybersecurity-tools |
|
|
| Wed, 03 Dec 2025 23:26:26 GMT |
TryHackMe-TakeOver-WriteUp |
subdomain-takeover |
|
|
| Thu, 26 Mar 2026 14:29:57 GMT |
Your SSH Keys, API Credentials, and AI Secrets Are at Risk — Th... |
api-key |
|
|
| Wed, 11 Feb 2026 11:05:20 GMT |
TuesdayTool 39: Darkweb Tools |
cybersecurity-tools |
|
|
| Thu, 26 Mar 2026 09:09:22 GMT |
Modern SSRF — Part 4 (Expert Edition): How to Write High-I... |
ssrf |
|
|
| Sat, 04 Apr 2026 23:02:22 GMT |
CVE-2023–40582 Walkthrough (Proving Ground-OSCP) |
cve |
|
|
| Sat, 04 Apr 2026 20:21:22 GMT |
Disclose Facebook Private Groups Appealed Content |
bug-bounty |
|
|
| Sat, 28 Mar 2026 15:02:46 GMT |
Exploiting Second-Order SQL Injection to Retrieve the Flag |
hackerone, bugbounty-writeup |
|
|
| Tue, 06 Jan 2026 16:02:54 GMT |
Spider-Man, Google Dorks e OSINT: quando cercare diventa un super... |
google-dorking |
|
|
| Fri, 27 Mar 2026 07:14:38 GMT |
Best Practices for Cloud Security Posture Management |
vapt |
|
|
| Sat, 21 Feb 2026 15:56:17 GMT |
My Personal Favorite Recon Method to Find URL Endpoints |
recon |
|
|
| Sat, 04 Apr 2026 18:34:57 GMT |
Blind SQL Injection in Private Program Leads to $2,100 Bounty |
bug-bounty, bug-bounty-tips, bug-bounty-writeup |
|
|
| Wed, 18 Feb 2026 06:00:02 GMT |
Google Dorking |
google-dorking |
|
|
| Mon, 30 Mar 2026 00:00:20 GMT |
F5 BIG‑IP RCE Exploited: Why You Must Patch Now — Actionable ... |
rce |
|
|
| Tue, 09 Sep 2025 10:14:01 GMT |
The Psychology of Listings: Why Users Trust Some Directories More... |
directory-listing |
|
|
| Mon, 16 Mar 2026 18:05:08 GMT |
xss0r V6 is Finally Released! |
xss-bypass |
|
|
| Sat, 04 Apr 2026 16:06:32 GMT |
Cybersecurity Consulting Services for U.S. Businesses |
cyber-security-awareness |
|
|
| Fri, 13 Mar 2026 10:38:07 GMT |
Insecure Deserialization in Java |
remote-code-execution |
|
|
| Tue, 18 Nov 2025 13:26:47 GMT |
GitHub Dorking: The Hunter’s Guide to Finding Secrets in Public... |
github-dorking |
|
|
| Thu, 26 Feb 2026 13:54:44 GMT |
Poison — HTB |
lfi |
|
|
| Mon, 02 Feb 2026 11:59:59 GMT |
El cashback está en el aire |
bounty-program |
|
|
| Sun, 15 Mar 2026 11:14:38 GMT |
Local File Inclusion (LFI) in Leave Application System (PHP & SQL... |
lfi |
|
|
| Thu, 12 Mar 2026 15:02:24 GMT |
Using Claude Opus 4.6 for Codebase Vulnerability Discovery |
bugcrowd |
|
|
| Fri, 27 Mar 2026 11:58:55 GMT |
Why Beginners Fail in Bug Bounty (And How to Fix It in 2026) |
bug-bounty-hunter |
|
|
| Wed, 25 Feb 2026 00:40:05 GMT |
Icy “Doodle� Site | ATC CTF 2.0 | Google Dorking| CTFs |
google-dorking |
|
|
| Sat, 14 Mar 2026 18:06:12 GMT |
Web Security Series #3 — Discovering Credentials Using Cluster ... |
bug-bounty-hunting |
|
|
| Fri, 03 Apr 2026 07:21:16 GMT |
Why API Key Security Should Be Your Startup’s First Priority |
api-key |
|
|
| Tue, 10 Mar 2026 20:44:39 GMT |
TuesdayTool 41: ReconSpider, All-In-One Reconnaissance Tool |
cybersecurity-tools |
|
|
| Thu, 02 Apr 2026 20:16:56 GMT |
Advanced IDOR Guide: How to Find and Exploit Broken Access Contro... |
idor |
|
|
| Sat, 03 Jan 2026 17:51:10 GMT |
Espelho, espelho meu : Existe alguém mais exposto do que Eu? |
shodan |
|
|
| Mon, 30 Mar 2026 13:22:15 GMT |
Web Security Series #12 — Cookie Theft via Stored XSS |
cross-site-scripting |
|
|
| Tue, 12 Aug 2025 17:24:22 GMT |
How I Removed Other User`s Uploaded Images in a Few Clicks |
bug-bounty-program |
|
|
| Mon, 02 Feb 2026 17:05:37 GMT |
Lab: Web cache poisoning to exploit a DOM vulnerability via a cac... |
web-cache-poisoning |
|
|
| Sat, 21 Feb 2026 16:39:23 GMT |
React2shell |
remote-code-execution |
|
|
| Sat, 14 Mar 2026 01:59:36 GMT |
LFI/RFI |
lfi |
|
|
| Thu, 12 Mar 2026 22:51:26 GMT |
Payment Bypass That Let Me Get a Premium Course for $0 [Business... |
bugcrowd |
|
|
| Thu, 25 Dec 2025 20:15:32 GMT |
Investigation into MSP Data Breach |
google-dork |
|
|
| Wed, 01 Apr 2026 12:35:29 GMT |
Portal | CyCTF Luxor Finals 2026 |
ssrf |
|
|
| Fri, 10 Nov 2023 03:38:01 GMT |
Apache error.log advanced Log poisoning RCE |
log-poisoning |
|
|
| Thu, 29 Jan 2026 21:21:39 GMT |
Turning Fuzzing Into $2,550: How a Simple Bug Gave Me Access to E... |
bounties |
|
|
| Wed, 30 Apr 2025 17:08:29 GMT |
Exploring Subdomains: What They Are and How to Find Them |
subdomain-enumeration |
|
|
| Tue, 24 Mar 2026 01:09:22 GMT |
From Stored XSS to Cookie Tossing into Credit Card Theft |
bugbounty-writeup |
|
|
| Wed, 01 Apr 2026 08:44:49 GMT |
From Exposure to RCE: Inside the Wing FTP Server Attack Chain |
rce |
|
|
| Wed, 25 Feb 2026 11:25:59 GMT |
Understanding Modern Cybersecurity Practices for Scalable SaaS Pr... |
vulnerability-scanning |
|
|
| Wed, 23 Jul 2025 15:15:01 GMT |
TryHackMe Include walkthrough: SSRF, log poisoning & LFI2RCE, wit... |
log-poisoning |
|
|
| Fri, 03 Apr 2026 22:03:43 GMT |
How I Simulated a Supply Chain Attack on Thousands of Servers —... |
hackerone |
|
|
| Sat, 04 Apr 2026 13:42:48 GMT |
The Hospital Is the New Battlefield |
cyber-security-awareness |
|
|
| Sun, 21 Sep 2025 03:55:56 GMT |
Is it easy to discover a critical vulnerability [P1]Â ? |
directory-listing |
|
|
| Mon, 30 Mar 2026 12:28:22 GMT |
API Access Explained: Everything You Need to Know to Get Started |
api-key |
|
|
| Thu, 19 Feb 2026 07:55:49 GMT |
Upload. Execute. Compromise. The Hidden Danger of Unrestricted Fi... |
remote-code-execution |
|
|
| Sun, 22 Feb 2026 20:52:28 GMT |
How I Became a PAPA (Practical AI Pentest Associate) by TCM |
pentest |
|
|
| Sat, 04 Apr 2026 09:38:32 GMT |
CVE-2024–25180 Walkthrough (Proving Ground-OSCP) |
cve |
|
|
| Sat, 04 Apr 2026 15:25:29 GMT |
We Are All Desperate to Be Loved and Terrified to Be Known. And W... |
vulnerability |
|
|
| Tue, 24 Mar 2026 14:51:27 GMT |
XPFarm: Top 10 AI Tools for Cybersecurity Automation |
bugbounty-writeup |
|
|
| Tue, 31 Mar 2026 21:48:32 GMT |
Venus Protocol: THE Market Donation Attack |
exploit |
|
|
| Sat, 04 Apr 2026 17:25:09 GMT |
How to Find Security Bugs in Source Code: A Complete Code Review ... |
web-security |
|
|
| Fri, 20 Mar 2026 11:44:04 GMT |
#Searchlight OSINT Writeup |
google-dorking |
|
|
| Thu, 26 Mar 2026 00:32:02 GMT |
Révolution Lumière |
lfi |
|
|
| Sat, 14 Mar 2026 19:53:51 GMT |
Secure File Uploads to S3 Directly from Frontend |
file-upload |
|
|
| Thu, 02 Apr 2026 16:25:47 GMT |
Why Most Recon Pipelines Break After a Week |
recon |
|
|
| Wed, 01 Apr 2026 05:48:20 GMT |
The Bug That Hid in Plain Sight: Fixing a Timezone Problem in an ... |
bugs |
|
|
| Wed, 11 Mar 2026 18:53:25 GMT |
From Recon to Jackpot: IDOR That Exposed Billing Data and CHAINED... |
bug-bounty-hunter |
|
|
| Tue, 10 Mar 2026 13:08:17 GMT |
Maritime Open Source Intelligence: Techniques, Tools, and Investi... |
security-research |
|
|
| Fri, 03 Apr 2026 08:19:32 GMT |
Why API Key Security Should Be Your Startup’s First Priority |
api-key |
|
|
| Fri, 20 Mar 2026 10:25:48 GMT |
Secure Spring Boot logs: Automatic masking of passwords, API keys... |
api-key |
|
|
| Wed, 25 Mar 2026 08:34:09 GMT |
Improper Input Handling Leading to Client Side Code Execution and... |
bug-bounty-hunter, vulnerability-disclosure |
|
|
| Wed, 07 Jan 2026 00:58:19 GMT |
Why Your Cache Rules are Leaking User Data (Web Cache Deception) |
web-cache-poisoning |
|
|
| Tue, 10 Mar 2026 08:53:48 GMT |
Adding a reusable image uploader to Angular Signal Forms |
file-upload |
|
|
| Fri, 13 Feb 2026 16:22:19 GMT |
How I Approach XSS Hunting as a Security Beginner |
xss-bypass |
|
|
| Sat, 04 Apr 2026 13:14:38 GMT |
Conquering the Buffer: Journey into Memory Vulnerabilities |
information-technology |
|
|
| Sat, 04 Apr 2026 04:36:31 GMT |
How I Got Unauthorized Access to Staging Environments via Search ... |
bug-bounty-tips |
|
|
| Thu, 26 Feb 2026 21:33:21 GMT |
External Vulnerability Scanning FAQ |
vulnerability-scanning |
|
|
| Thu, 29 Jan 2026 05:03:15 GMT |
Subdomain Takeover: Understanding, Detecting, and Recovering from... |
subdomain-takeover |
|
|
| Tue, 31 Mar 2026 12:15:47 GMT |
When File Uploads Go Wrong: Stored XSS Through Public Cloud Stora... |
bugs, hackerone |
|
|
| Sun, 14 Jul 2024 11:56:11 GMT |
How I Can Get P1 Nasa easily — Dorking |
web-pentest |
|
|
| Wed, 25 Mar 2026 08:04:43 GMT |
Privilege Escalation via Block Device Access. |
exploit |
|
|
| Fri, 27 Feb 2026 00:44:16 GMT |
Walkthrough: Web Application Attacks - XSS, SQL Injections, Direc... |
local-file-inclusion |
|
|
| Wed, 04 Mar 2026 17:07:07 GMT |
I Built a Free Prompt Kit That Helps Bug Bounty Hunters Get More ... |
bug-bounty-hunter |
|
|
| Thu, 02 Apr 2026 16:16:16 GMT |
The Media Layer Most Teams Never Plan For (Until It Hurts): Why W... |
file-upload |
|
|
| Wed, 25 Mar 2026 17:00:00 GMT |
CVE-2026–33139 How I Found My First CVE: Bypassing PySpector’... |
security-research |
|
|
| Sat, 14 Mar 2026 14:07:56 GMT |
Learning Recon: A Look at Burgerprofiel |
security-research |
|
|
| Fri, 06 Mar 2026 12:01:01 GMT |
Salà de compras y terminé en Roma |
bounty-program |
|
|
| Mon, 26 Jan 2026 16:00:51 GMT |
Mapping Security Frameworks and Regulations (ISO27001, NIS2, NIST... |
cyber-sec |
|
|
| Sat, 04 Apr 2026 17:42:19 GMT |
Penetration Testing on Metasploitable 2: A Beginner’s Complete ... |
penetration-testing, ethical-hacking |
|
|
| Fri, 27 Mar 2026 17:58:18 GMT |
Broken Access Control: The Most Dangerous Vulnerability Is Not a ... |
vapt |
|
|
| Thu, 20 Nov 2025 17:16:47 GMT |
The Health Factor: How DorkFi Keeps Your Position Safe |
dorks |
|
|
| Sat, 21 Feb 2026 14:47:36 GMT |
AI Innovation or Market Disruption? |
vulnerability-scanning |
|
|
| Thu, 13 Feb 2025 03:29:37 GMT |
ZoomEye Meets DeepSeek: AI-Powered Cyberspace Intelligence |
zoomeye |
|
|
| Sat, 04 Apr 2026 22:04:14 GMT |
Supply Chain Security - SANS CyberThreat Summit 2025 |
infosec, cyber-security-awareness |
|
|
| Mon, 23 Mar 2026 15:20:20 GMT |
How I Found a Critical Account Takeover Vulnerability in a Passwo... |
bug-bounty-hunter |
|
|
| Wed, 01 Apr 2026 21:03:37 GMT |
How I Got My First Bounty $$$ |
idor |
|
|
| Fri, 11 Jul 2025 16:20:24 GMT |
PC WORX: The Hidden Risk in Your Industrial Network |
censys |
|
|
| Wed, 05 Nov 2025 12:42:46 GMT |
How I Hacked Bank’s Admin Portal |
vdp |
|
|
| Mon, 02 Mar 2026 04:32:17 GMT |
Cybersicherheits-Check für KMU: Die unterschätzte Alternative z... |
pentest |
|
|
| Sat, 14 Feb 2026 19:02:25 GMT |
XSS WAF Bypass: 3 Tricks to Beat Alert Blockers |
xss-bypass |
|
|
| Sat, 04 Apr 2026 09:10:35 GMT |
We’ve messed up, a lot. Here’s Why Scribble Still Exists to c... |
bounties |
|
|
| Sun, 15 Feb 2026 16:04:42 GMT |
Discovering Security Weaknesses: A Practical Guide to Vulnerabili... |
vulnerability-scanning |
|
|
| Thu, 02 Apr 2026 12:05:48 GMT |
IoT Cihazlar: Evinizde ki Yabancı |
shodan |
|
|
| Sat, 04 Apr 2026 14:29:21 GMT |
BUG BOUNTY from Zero To Hero! All secrects finally revealed !! @l... |
hackerone, bugbounty-writeup, bug-bounty-writeup |
|
|
| Sat, 04 Apr 2026 07:08:25 GMT |
Part 5: Output Funnel: Rethinking What “Secure Enough to Deploy... |
application-security |
|
|
| Thu, 04 Dec 2025 04:45:36 GMT |
What is Google Dorking? |
dorking |
|
|
| Sat, 28 Mar 2026 10:41:03 GMT |
Subfinder Subdomains Dhundho Like an Elite Hacker! (Hinglish Mein... |
recon |
|
|
| Mon, 17 Nov 2025 09:27:29 GMT |
200 reports, 11 valid bugs, 0 critical issues. Here’s everythin... |
vdp |
|
|
| Wed, 21 Jan 2026 15:09:15 GMT |
Lab: Weak isolation on dual-use endpoint | Portswigger |
web-cache-poisoning |
|
|
| Fri, 06 Jun 2025 15:47:21 GMT |
��♂� GitHub Dorking for Bug Bounty: Hackers' Hidden Playg... |
github-dorking |
|
|
| Fri, 20 Mar 2026 05:45:47 GMT |
Cloudflare WAF Bypass Leading to Reflected XSS via SVG Injection |
xss-bypass |
|
|
| Fri, 03 Apr 2026 22:35:22 GMT |
CVE-2025–32375 Walkthrough (Proving Ground-OSCP) |
cve |
|
|
| Sat, 14 Feb 2026 11:50:52 GMT |
SHODAN — SEOH |
shodan |
|
|
| Sun, 17 Aug 2025 17:58:45 GMT |
$$$ How I Exploited a Business Logic Flaw to Slash Product Prices... |
bug-bounty-program |
|
|
| Sat, 24 Jan 2026 06:47:12 GMT |
Google Dorkware Pro |
google-dorking, google-dork |
|
|
| Wed, 18 Feb 2026 07:41:16 GMT |
TryHackMe Valenfind Writeup: Hardcoded Keys & Broken Hearts |
local-file-inclusion |
|
|
| Tue, 31 Mar 2026 13:11:54 GMT |
TryHackMe — Intro to SSRF (Walkthrough) |
ssrf |
|
|
| Tue, 24 Mar 2026 07:41:00 GMT |
How I Built a Directory Listing Site (ToolIndex.net) and What I L... |
directory-listing |
|
|
| Thu, 14 Aug 2025 10:08:18 GMT |
Predictive Analytics and Voice Technology: A Winning Combination ... |
vdp |
|
|
| Thu, 26 Mar 2026 17:17:23 GMT |
Venus Protocol, IoTeX, and SOF Token Exploits: $6.65M |
exploit |
|
|
| Sat, 28 Mar 2026 17:58:43 GMT |
I Built a Remote Code Execution Engine. |
remote-code-execution |
|
|
| Mon, 11 Dec 2023 18:17:01 GMT |
Exploiting a Log Poisoning. |
log-poisoning |
|
|
| Fri, 31 May 2024 13:29:16 GMT |
Map of the worlds best URLs 2025 |
log-poisoning |
|
|
| Sun, 22 Oct 2023 19:57:30 GMT |
Performing a Log Poisoning Attack |
log-poisoning |
|
|
| Fri, 03 Apr 2026 08:32:10 GMT |
CVE-2025–31131 Walkthrough (Proving Ground- OSCP) |
cve |
|
|
| Sat, 04 Apr 2026 22:42:21 GMT |
Critical Cybersecurity and DevOps News Updates | 2026.04.04 | A... |
security |
|
|
| Sat, 04 Apr 2026 06:41:47 GMT |
From Zero to eJPT: My Honest Experience, Lessons Learned & What N... |
pentesting |
|
|
| Wed, 11 Feb 2026 21:37:40 GMT |
From Course Notes to CVE: How a GXPN Study Session Uncovered a 40... |
vulnerability-disclosure |
|
|
| Wed, 04 Mar 2026 03:20:45 GMT |
Why PHP Errors Only Appear in Production — And How to Fix Them |
file-inclusion |
|
|
| Wed, 12 Feb 2025 22:46:35 GMT |
https://www.express.co.uk/life-style/property/2012927/cleaning-ch... |
web-pentest |
|
|
| Sat, 21 Mar 2026 17:10:46 GMT |
CVE-2026–22812: How I Got RCE on a 71k-Star AI Coding Tool With... |
rce |
|
|
| Tue, 24 Feb 2026 23:01:09 GMT |
A Step-by-Step Guide to Uncovering Vulnerabilities in a Mobile Ap... |
lfi |
|
|
| Thu, 22 Jan 2026 06:57:21 GMT |
Top 20 Tools Inside Parrot OS Explained (With Real-World Use Case... |
cybersecurity-tools |
|
|
| Sun, 15 Mar 2026 17:49:52 GMT |
TryHackMe — Takeover Writeup |
subdomain-takeover |
|
|
| Sun, 29 Mar 2026 16:51:00 GMT |
You’re debugging what you can see — not what’s actually wro... |
bugs |
|
|
| Fri, 27 Mar 2026 14:46:10 GMT |
SQL Injection in PHP Reservation System — Breaking Access Contr... |
bugbounty-writeup |
|
|
| Wed, 01 Apr 2026 23:00:30 GMT |
How to Hunt IDORs When IDs Are UUIDs (Not Integers) Lab: User ID ... |
bug-bounty-writeup |
|
|
| Sun, 23 Nov 2025 13:28:34 GMT |
When IP Whitelisting Isn’t What It Seems: A Real-World Case Stu... |
vulnerability-disclosure |
|
|
| Wed, 14 Jan 2026 09:06:30 GMT |
Lab: Web cache poisoning via an unkeyed query string | Portswige... |
web-cache-poisoning |
|
|
| Sat, 04 Apr 2026 23:01:01 GMT |
2020 SolarWinds Turned Artifact Lineage Into a Customer-Facing De... |
security |
|
|
| Sat, 04 Apr 2026 09:51:44 GMT |
Cooctus-Stories TryHackMe Walkthrough | by Yoel Yosief |
web-security |
|
|
| Tue, 31 Mar 2026 15:45:51 GMT |
If You Use @Transactional in Spring Boot, Read This Before It’s... |
bugs |
|
|
| Fri, 13 Mar 2026 12:53:55 GMT |
Remote Code Execution (RCE) Vulnerability |
rce |
|
|
| Sat, 02 Aug 2025 14:15:23 GMT |
The Silent Risk in Your ICS: Why S7 Protocol Needs Security Atten... |
censys |
|
|
| Sat, 04 Apr 2026 23:05:31 GMT |
If you need secure your ssh server then use onuion-sshd AI Agent. |
security |
|
|
| Tue, 30 Dec 2025 07:53:12 GMT |
One Mantle DevCard, Three Reward Pools for Mantle Global Hackatho... |
bounty-program |
|
|
| Mon, 30 Mar 2026 13:29:06 GMT |
insect repellent, mosquito repellent, tick repellent, picaridin, ... |
bugs |
|
|
| Wed, 10 Dec 2025 12:06:41 GMT |
Strengthening Web3 Security: Recent Vulnerability Findings from Y... |
vulnerability-disclosure |
|
|
| Sun, 01 Mar 2026 14:20:56 GMT |
Valenfind— CTF Writeup |
local-file-inclusion |
|
|
| Wed, 18 Mar 2026 10:03:26 GMT |
Web Security Series #7 — Exploiting Blind SQL Injection via Ses... |
bug-bounty-hunting |
|
|
| Sat, 07 Mar 2026 01:11:15 GMT |
The Silent Observer: A Deep Dive into Shodan Dorks for Security R... |
shodan |
|
|
| Thu, 02 Apr 2026 19:45:00 GMT |
Insecure File Upload in KYC Systems - When the Document Verificat... |
application-security |
|
|
| Sat, 04 Apr 2026 14:19:07 GMT |
When Attackers Use AI Better Than Developers |
cyber-security-awareness |
|
|
| Sat, 04 Jan 2025 17:20:23 GMT |
GitHub dork |
github-dorking |
|
|
| Tue, 31 Mar 2026 13:47:32 GMT |
Cybersecurity Trends in 2026: Protecting the Digital Future |
cybersecurity-tools |
|
|
| Sat, 04 Apr 2026 16:17:37 GMT |
Stored XSS via iframe Injection Leads to $505 Bounty |
bug-bounty-tips, xss-attack, bug-bounty-writeup |
|
|
| Wed, 11 Mar 2026 09:56:42 GMT |
Hardening Keycloak: Implementing Security Pentest Requirements as... |
pentest |
|
|
| Fri, 03 Apr 2026 12:23:17 GMT |
XSS Is Not Just <script>alert(1)</script> — Here's What Actuall... |
pentesting, xss-attack |
|
|
| Thu, 26 Mar 2026 05:34:51 GMT |
XSS (Cross site scripting) |
xss-vulnerability |
|
|
| Sat, 14 Mar 2026 09:09:10 GMT |
How to Get Your Gemini API Key Free: A Step-by-Step Guide |
api-key |
|
|
| Sat, 04 Apr 2026 21:26:18 GMT |
Módulo 2 — Redes, Protocolos y Superficie de Ataque (Visión H... |
ethical-hacking |
|
|
| Thu, 02 Apr 2026 05:35:20 GMT |
My VAPT Intern Interview Experience — From LinkedIn Application... |
vapt |
|
|
| Tue, 24 Mar 2026 16:47:04 GMT |
TuesdayTool 42: Domain Digger, One-Stop Interface For Domain Inve... |
cybersecurity-tools |
|
|
| Fri, 13 Mar 2026 13:51:55 GMT |
Cracking Hidden Password Logic -PicoCTF “PW Crack 2� |
security-research |
|
|
| Sat, 04 Apr 2026 21:31:21 GMT |
Staying Cautious in the Age of AI Adoption - BSides Bristol 2025 |
security, infosec |
|
|
| Thu, 26 Mar 2026 03:31:59 GMT |
IDOR on Tesla Disclosing Users’ Emails |
bug-bounty-hunter |
|
|
| Tue, 18 Nov 2025 08:33:41 GMT |
A Chain of Vulnerabilities Leading to Critical Information Disclo... |
bug-bounty-program |
|
|
| Sun, 17 Aug 2025 19:26:05 GMT |
ï·½ |
bug-bounty-program |
|
|
| Mon, 02 Mar 2026 01:51:25 GMT |
What is penetration testing? | What is pen testing? |
pentest |
|
|
| Fri, 19 Dec 2025 20:23:57 GMT |
How I Found an Unauthenticated XXE That Allowed Arbitrary File Re... |
vulnerability-disclosure |
|
|
| Wed, 28 Jan 2026 07:31:37 GMT |
Lab: Targeted web cache poisoning using an unknown header | Port... |
web-cache-poisoning |
|
|
| Mon, 26 Jan 2026 23:45:48 GMT |
Beyond Takeover AWS Bucket |
bugcrowd |
|
|
| Mon, 16 Feb 2026 21:15:14 GMT |
local file inclusion via xml |
local-file-inclusion |
|
|
| Sat, 04 Apr 2026 04:41:46 GMT |
OpenTofu Security Scanner: How to Catch Misconfigurations Before ... |
vulnerability-scanning |
|
|
| Mon, 30 Mar 2026 13:14:30 GMT |
Gaining Cybersecurity Knowledge as a Cybersecurity Student: My Fi... |
cybersecurity-tools |
|
|
| Wed, 01 Apr 2026 14:48:29 GMT |
Stored XSS into HTML Context with Nothing Encoded Writeup— Port... |
xss-attack |
|
|
| Sat, 31 Jan 2026 13:52:11 GMT |
SSRF via Referer Header: How a Simple Header Led to a Serious Fin... |
bugcrowd |
|
|
| Fri, 13 Mar 2026 02:31:00 GMT |
How I Use Google Dorking to Find Hidden Vulnerabilities |
google-dorking, google-dork |
|
|
| Sat, 28 Mar 2026 12:23:40 GMT |
CVE-2026–24061 GNU InetUtils Telnetd Authentication Bypass Vuln... |
rce |
|
|
| Wed, 18 Feb 2026 10:05:21 GMT |
Gods Eye: The Reconnaissance Tool I Wish I Had 5 Years Ago |
recon |
|
|
| Sat, 04 Apr 2026 13:16:07 GMT |
ReactOOPs Challenge Write-Up — React2Shell (CVE-2025–55182) |
pentesting |
|
|
| Thu, 18 Sep 2025 05:45:26 GMT |
Data Accuracy in Directory Websites: Why Clean Listings = Loyal U... |
directory-listing |
|
|
| Sat, 04 Apr 2026 08:11:01 GMT |
Lockdown Mode: Engineering a Near-Zero Attack Surface on iOS |
vulnerability |
|
|
| Mon, 27 Jan 2025 16:51:28 GMT |
The man who suffered 11 years in hell for freedom has now been fr... |
web-pentest |
|
|
| Thu, 13 Mar 2025 18:09:56 GMT |
How I Found Sensitive Information using Github Dorks in Bug Bount... |
github-dorking |
|
|
| Tue, 27 Jan 2026 11:29:48 GMT |
The “Botnet� Exchange: Why ZSZRUN is spamming the Internet |
cyber-sec |
|
|
| Sat, 04 Apr 2026 21:50:46 GMT |
When the Container Becomes the Weapon: Tailscale C2 via Docker Es... |
information-security |
|
|
| Mon, 30 Mar 2026 19:18:38 GMT |
Juice Shop Write-up: DOM XSS Challenge |
cross-site-scripting |
|
|
| Fri, 25 Jul 2025 16:41:01 GMT |
� SubDNS-UI: Build Your Own Subdomain + DNS Enumerator with a C... |
subdomain-enumeration |
|
|
| Mon, 16 Mar 2026 14:32:42 GMT |
Web Security Series #5 — Exploiting Broken Access Control via T... |
bug-bounty-hunting |
|
|
| Wed, 19 Nov 2025 19:44:02 GMT |
The Pulse of Liquidity: How DorkFi’s Interest Rates Adapt in Re... |
dorks |
|
|
| Sat, 25 Oct 2025 12:23:25 GMT |
How to find leaks on GitHub as a beginner. Logic is main key |
github-dorking |
|
|
| Wed, 16 Jul 2025 12:07:42 GMT |
Hackers Love This 1979 Protocol (Because It Can’t Defend Itself... |
censys |
|
|
| Sat, 04 Apr 2026 12:59:02 GMT |
I Watched a $25 Million Deepfake Heist — Why 2026 Phishing Is Y... |
infosec |
|
|
| Sat, 07 Mar 2026 04:09:52 GMT |
Threat Intelligence Investigation — Dropbox Phishing Domain Ana... |
google-dorking |
|
|
| Wed, 25 Feb 2026 01:47:45 GMT |
How I Found a Path Traversal in the Rancher Dashboard via HAR Rep... |
web-pentest |
|
|
| Wed, 09 Jul 2025 01:02:19 GMT |
Start with VDPs Before Aiming for Private Bug Bounty Programs |
vdp |
|
|
| Wed, 25 Mar 2026 18:14:32 GMT |
Keterbukaan Informasi atau Terlalu Terbuka? |
information-disclosure |
|
|
| Sat, 04 Apr 2026 22:49:43 GMT |
TryHackMe LazyAdmin Walkthrough: Step-by-Step Writeup |
bug-bounty, vulnerability, penetration-testing, hacking |
|
|
| Sat, 04 Apr 2026 10:55:08 GMT |
HTTP vs HTTPS 為什麼多一個 S 這麼��? |
web-security |
|
|
| Fri, 20 Mar 2026 14:08:53 GMT |
Modern SSRF — Part 3 (EXPERT EDITION): Advanced Techniques... |
ssrf |
|
|
| Sat, 04 Apr 2026 16:55:36 GMT |
37 Percent of Companies Plan to Cut IT Jobs by the End of 2026. |
information-technology |
|
|
| Sat, 06 Dec 2025 08:29:35 GMT |
The Midnight Epiphany: How a News Notification Cracked My Stubbor... |
vulnerability-disclosure |
|
|
| Mon, 26 Jan 2026 02:10:21 GMT |
The Truth About Internet Capital Markets |
bounty-program |
|
|
| Sat, 04 Apr 2026 15:01:01 GMT |
Internet Story #2 — From the BBS’ to Internet |
information-technology |
|
|
| Thu, 08 Jan 2026 09:02:50 GMT |
osint-Forgotten Ruins bounty $$ |
bounties |
|
|