⤷ Title: ID Parametresi Üzerinden Yetki Aşımı /IDOR
════════════════════════
𐀪 Author: Zekikayaalp
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 15:49:22 GMT
════════════════════════
⌗ Tags: #cybersecurity #bugbounty_writeup #idor #pentesting
════════════════════════
𐀪 Author: Zekikayaalp
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 15:49:22 GMT
════════════════════════
⌗ Tags: #cybersecurity #bugbounty_writeup #idor #pentesting
Medium
ID Parametresi Üzerinden Yetki Aşımı /IDOR
VDP/BBP’de avlanırken daha keşif aşamasında denediğimiz o en umut veren nokta,IDOR. En başından anlaşalım. IDOR , ID değişmesi değildir…
⤷ Title: Starting Your Bug Bounty Journey: Tips for Beginners
════════════════════════
𐀪 Author: Nayan Ghimire
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:33:54 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: Nayan Ghimire
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:33:54 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips
Medium
Starting Your Bug Bounty Journey: Tips for Beginners
Bug bounty programs allow security hobbyists to legally discover vulnerabilities in apps and be compensated. They are an excellent means…
⤷ Title: HackerOne HTML Injection Fix Bypass
════════════════════════
𐀪 Author: ab.infosec
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:22:17 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #hackerone #html_injection
════════════════════════
𐀪 Author: ab.infosec
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:22:17 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #hackerone #html_injection
Medium
HackerOne HTML Injection Fix Bypass👨💻
“Most bug bounty hunters stop after a fix is deployed. That’s a mistake.”
⤷ Title: Design-Level Stored XSS in Matomo i18n Rendering
════════════════════════
𐀪 Author: D7
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:14:35 GMT
════════════════════════
⌗ Tags: #i18n #web_design #bug_bounty #code #xss_attack
════════════════════════
𐀪 Author: D7
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:14:35 GMT
════════════════════════
⌗ Tags: #i18n #web_design #bug_bounty #code #xss_attack
Medium
Design-Level Stored XSS in Matomo i18n Rendering
✍️Design-level Stored Xss In Matomo I18n Rendering — Public Write-up
⤷ Title: Ghost in the Machine: 6 Shocking Ways Your Operating System Tracks Your Every Move
════════════════════════
𐀪 Author: Omega
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:53:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #technology #digital_forensics #infosec
════════════════════════
𐀪 Author: Omega
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:53:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #technology #digital_forensics #infosec
Medium
Ghost in the Machine: 6 Shocking Ways Your Operating System Tracks Your Every Move
1. Introduction: The Myth of the Clean Slate
⤷ Title: Walkthrough: Advent of Cyber Prep Track — TryHackMe
════════════════════════
𐀪 Author: Muhammad Usman
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:25:13 GMT
════════════════════════
⌗ Tags: #walkthrough #adventofcyberpreptrack #tryhackme #advent_of_cyber_2025
════════════════════════
𐀪 Author: Muhammad Usman
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:25:13 GMT
════════════════════════
⌗ Tags: #walkthrough #adventofcyberpreptrack #tryhackme #advent_of_cyber_2025
Medium
Walkthrough: Advent of Cyber Prep Track — TryHackMe
Introduction (Task 1 to Task 3)
⤷ Title: How Attackers Think About Trust (And Defenders Don’t)
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:00:48 GMT
════════════════════════
⌗ Tags: #cybersecurity #zero_trust #ethical_hacking #offensive_security #security_engineering
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:00:48 GMT
════════════════════════
⌗ Tags: #cybersecurity #zero_trust #ethical_hacking #offensive_security #security_engineering
Medium
How Attackers Think About Trust (And Defenders Don’t)
Every secure system is built on trust.
⤷ Title: Entering The Dark Web
════════════════════════
𐀪 Author: Nxgprince
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:32:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #darkweb #dark_web_link
════════════════════════
𐀪 Author: Nxgprince
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:32:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #darkweb #dark_web_link
Medium
Entering The Dark Web
Navigating the Shadows: A Comprehensive Guide to Entering the Dark Web
⤷ Title: Simple Logic Breaks Big Systems: The Contract That Ended Before It Started
════════════════════════
𐀪 Author: default_0x
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:47:05 GMT
════════════════════════
⌗ Tags: #business_logic #bug_bounty_tips #business_logic_flaw #bug_bounty
════════════════════════
𐀪 Author: default_0x
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:47:05 GMT
════════════════════════
⌗ Tags: #business_logic #bug_bounty_tips #business_logic_flaw #bug_bounty
Medium
Simple Logic Breaks Big Systems: The Contract That Ended Before It Started
We all like finding complicated bugs — the kind that takes days to figure out and makes you feel like a genius hacker. But sometimes, the…
⤷ Title: The DNS Query I Almost Ignored
════════════════════════
𐀪 Author: ATAF
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:36:58 GMT
════════════════════════
⌗ Tags: #cyber_defense #cybersecurity #hacking #blue_team
════════════════════════
𐀪 Author: ATAF
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:36:58 GMT
════════════════════════
⌗ Tags: #cyber_defense #cybersecurity #hacking #blue_team
Medium
The DNS Query I Almost Ignored
Every SOC analyst knows this moment if you've been in the industry for a while.
⤷ Title: How Hackers Actually Break Web Apps in 2026
════════════════════════
𐀪 Author: Code Catalyst
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:32:10 GMT
════════════════════════
⌗ Tags: #web_security #application #software_development #web_development #hacking
════════════════════════
𐀪 Author: Code Catalyst
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:32:10 GMT
════════════════════════
⌗ Tags: #web_security #application #software_development #web_development #hacking
Medium
How Hackers Actually Break Web Apps in 2026
One stolen token can destroy a production system faster than any zero day exploit.
⤷ Title: How Hackers Think
════════════════════════
𐀪 Author: Catherine Ma
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:06:31 GMT
════════════════════════
⌗ Tags: #hacking #technology #cybersecurity #cybercrime #online_safety
════════════════════════
𐀪 Author: Catherine Ma
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:06:31 GMT
════════════════════════
⌗ Tags: #hacking #technology #cybersecurity #cybercrime #online_safety
Medium
How Hackers Think
When most people hear the word “hacker”, they imagine someone in a dark room typing furiously on a keyboard. That image is dramatic, but it…
⤷ Title: How Hackers Actually Think:
════════════════════════
𐀪 Author: Abdul Ahad
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:01:51 GMT
════════════════════════
⌗ Tags: #technology #hacking #ai #cybersecurity #infosec
════════════════════════
𐀪 Author: Abdul Ahad
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:01:51 GMT
════════════════════════
⌗ Tags: #technology #hacking #ai #cybersecurity #infosec
Medium
How Hackers Actually Think
A Simple Mental Model Most Defenders Ignore
⤷ Title: Web Application Firewall Detection — WAFW00F
════════════════════════
𐀪 Author: mohandika
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:56:27 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #waf #network_security #ethical_hacking
════════════════════════
𐀪 Author: mohandika
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:56:27 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #waf #network_security #ethical_hacking
Medium
Web Application Firewall Detection — WAFW00F
A Web Hacking Tool
⤷ Title: Ignite — THM Writeups
════════════════════════
𐀪 Author: Alts
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:07:15 GMT
════════════════════════
⌗ Tags: #ctf_writeup #tryhackme #tryhackme_walkthrough #tryhackme_writeup #ctf
════════════════════════
𐀪 Author: Alts
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:07:15 GMT
════════════════════════
⌗ Tags: #ctf_writeup #tryhackme #tryhackme_walkthrough #tryhackme_writeup #ctf
Medium
Ignite — THM Writeups
https://tryhackme.com/room/ignite
⤷ Title: Takeover CTF
════════════════════════
𐀪 Author: Rue
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:31:08 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #subdomains_enumeration #reconnaissance #ctf
════════════════════════
𐀪 Author: Rue
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:31:08 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #subdomains_enumeration #reconnaissance #ctf
Medium
Takeover CTF
This CTF focuses on subdomain enumeration — a critical reconnaissance technique used to discover hidden services and potential attack…
⤷ Title: Lab: Reflected XSS into HTML context with nothing encoded
════════════════════════
𐀪 Author: Mylescorey
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 20:28:02 GMT
════════════════════════
⌗ Tags: #burpsuite #bug_bounty #xss_attack
════════════════════════
𐀪 Author: Mylescorey
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 20:28:02 GMT
════════════════════════
⌗ Tags: #burpsuite #bug_bounty #xss_attack
Medium
Lab: Reflected XSS into HTML context with nothing encoded
After opening the lab, I put the basic alert payload into the search bar and after putting search we got the alert function that lets us…
⤷ Title: Inter Process Communication with RPC
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:52:51 GMT
════════════════════════
⌗ Tags: #malware #hacking #cybersecurity #tryhackme #pentesting
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:52:51 GMT
════════════════════════
⌗ Tags: #malware #hacking #cybersecurity #tryhackme #pentesting
Medium
Inter Process Communication with RPC
Welcome to this new Medium post! In this one we’re gonna mess around with something pretty cool: RPC (Remote Procedure Call), basically the…
⤷ Title: For 11 Minutes, the Internet Trusted a Lie — and No Firewall Noticed
════════════════════════
𐀪 Author: Liam
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:17:19 GMT
════════════════════════
⌗ Tags: #technology #ai_security #cybersecurity #artificial_intelligence #hacking
════════════════════════
𐀪 Author: Liam
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:17:19 GMT
════════════════════════
⌗ Tags: #technology #ai_security #cybersecurity #artificial_intelligence #hacking
Medium
For 11 Minutes, the Internet Trusted a Lie — and No Firewall Noticed
A story about why “secure” networks still fail, and why most defenses are pointed in the wrong direction.
⤷ Title: The Hacking Tool Chronicles: Dirb
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:08:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_hacking #hacking #osint #ethical_hacking
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:08:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_hacking #hacking #osint #ethical_hacking
Medium
The Hacking Tool Chronicles: Dirb
A series of articles focused on freely available hacking tools, in this edition we look at the web recon tool Dirb.
⤷ Title: ওয়েব অ্যাপ্লিকেশন পেনটেস্টিংয়ে রিকন টুলসের ব্যবহার: একটি পূর্ণাঙ্গ গাইড
════════════════════════
𐀪 Author: SecurityMindPro
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:36:41 GMT
════════════════════════
⌗ Tags: #web_testing #penetration_testing #webapplicationpentest
════════════════════════
𐀪 Author: SecurityMindPro
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:36:41 GMT
════════════════════════
⌗ Tags: #web_testing #penetration_testing #webapplicationpentest
Medium
ওয়েব অ্যাপ্লিকেশন পেনটেস্টিংয়ে রিকন টুলসের ব্যবহার: একটি পূর্ণাঙ্গ গাইড
সাইবার সিকিউরিটি এবং পেনিট্রেশন টেস্টিংয়ের জগতে একটি বহুল প্রচলিত কথা আছে — “আপনি যা দেখতে পাচ্ছেন না, তা আপনি হ্যাক করতে পারবেন না।” এই…