⤷ Title: PortSwigger Access Control Vulnerabilities Lab Notes
════════════════════════
𐀪 Author: Emre A.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:17:24 GMT
════════════════════════
⌗ Tags: #portswigger #bug_bounty #access_control #web_security
════════════════════════
𐀪 Author: Emre A.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:17:24 GMT
════════════════════════
⌗ Tags: #portswigger #bug_bounty #access_control #web_security
Medium
PortSwigger Access Control Vulnerabilities Lab Notes
Lab: Unprotected admin functionality
⤷ Title: Most Beginner Bug Bounty Hunters Never Turn Pro — Here’s the Complete Blueprint That Actually…
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:08:09 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #earn_money_online #business #earnings
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:08:09 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #earn_money_online #business #earnings
Medium
Most Beginner Bug Bounty Hunters Never Turn Pro — Here’s the Complete Blueprint That Actually Explains Why (2026 Edition)
Introduction: The Graveyard of Almost-Pro Hunters
⤷ Title: Consistent Bug Bounty Income Is Not About Finding More Bugs — Here’s the Strategic Blueprint That…
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:08:00 GMT
════════════════════════
⌗ Tags: #earnings #bug_bounty #business #bug_bounty_tips #make_money_online
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:08:00 GMT
════════════════════════
⌗ Tags: #earnings #bug_bounty #business #bug_bounty_tips #make_money_online
Medium
Consistent Bug Bounty Income Is Not About Finding More Bugs — Here’s the Strategic Blueprint That Changes Everything in 2026
Introduction: The Hunter Who Found Everything and Earned Nothing
⤷ Title: Setting up OWASP BLT on the go! Fast and Free.
════════════════════════
𐀪 Author: Chigorin
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:19:45 GMT
════════════════════════
⌗ Tags: #google_summer_of_code #gsoc #hacking #owasp #cloud
════════════════════════
𐀪 Author: Chigorin
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:19:45 GMT
════════════════════════
⌗ Tags: #google_summer_of_code #gsoc #hacking #owasp #cloud
Medium
Setting up OWASP BLT on the go! Fast and Free.
OWASP BLT is becoming an increasingly popular platform for bug reporting and remediation with that we also need an on-the-go setup and for…
⤷ Title: Wordpress: CVE-2021–29447 (THM) Tryhackme Write-Up With Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:16:32 GMT
════════════════════════
⌗ Tags: #hacking #wordpress #cybersecurity #tryhackme #vulnerability
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:16:32 GMT
════════════════════════
⌗ Tags: #hacking #wordpress #cybersecurity #tryhackme #vulnerability
Medium
Wordpress: CVE-2021–29447 (THM) Tryhackme Write-Up With Answer
Denoscription : Vulnerability allow a authenticated user whith low privilages upload a malicious WAV file that could lead to remote arbitrary…
⤷ Title: Cross-Site Scripting (XSS) Attack Lab: A Hands-On Journey Through Client-Side Exploitation
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:59:38 GMT
════════════════════════
⌗ Tags: #ethical_hacking #penetration_testing #web_development #cybersecurity #javanoscript
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:59:38 GMT
════════════════════════
⌗ Tags: #ethical_hacking #penetration_testing #web_development #cybersecurity #javanoscript
Medium
Cross-Site Scripting (XSS) Attack Lab: A Hands-On Journey Through Client-Side Exploitation
Comprehensive walkthrough of XSS exploitation techniques, from cookie theft to malicious redirection
⤷ Title: INE-Web Application Penetration Testing CTF 1 by Singkhon
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:41:00 GMT
════════════════════════
⌗ Tags: #coding #ctf #cybersecurity #penetration_testing #programming
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:41:00 GMT
════════════════════════
⌗ Tags: #coding #ctf #cybersecurity #penetration_testing #programming
Medium
INE-Web Application Penetration Testing CTF 1 by Singkhon
Hello, my name is Singkhon. After completing the eJPT course, I would like to share my methods and approaches for solving each CTF problem…
⤷ Title: SQL Injection Attack Lab: A Hands-On Journey Through Database Exploitation
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:24:11 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #sql #ethical_hacking #web_development
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:24:11 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #sql #ethical_hacking #web_development
Medium
SQL Injection Attack Lab: A Hands-On Journey Through Database Exploitation
Comprehensive walkthrough of SQL injection techniques, schema enumeration, data extraction, and hash cracking.
⤷ Title: I Roasted a Service Account and Walked Out with the Whole Domain: TryHackMe Attacktive Directory
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:14:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #tryhackme #active_directory #penetration_testing
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:14:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #tryhackme #active_directory #penetration_testing
Medium
I Roasted a Service Account and Walked Out with the Whole Domain: TryHackMe Attacktive Directory
Every Active Directory lab I’ve done has taught me something new. My home lab taught me how to build a domain and tear it apart. The…
⤷ Title: Prompt Engineering for Hackers
════════════════════════
𐀪 Author: Spectat0rguy
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 22:29:43 GMT
════════════════════════
⌗ Tags: #infosec #hacking #bug_bounty #information_security #cybersecurity
════════════════════════
𐀪 Author: Spectat0rguy
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 22:29:43 GMT
════════════════════════
⌗ Tags: #infosec #hacking #bug_bounty #information_security #cybersecurity
Medium
Prompt Engineering for Hackers
The Unfair Advantage in Modern Bug Bounty
⤷ Title: Find An Interesting Account Take-Over Vulnerability.
════════════════════════
𐀪 Author: Md Nawshad Ahmmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:44:12 GMT
════════════════════════
⌗ Tags: #bug_bounty #account_takeover #research_reports
════════════════════════
𐀪 Author: Md Nawshad Ahmmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:44:12 GMT
════════════════════════
⌗ Tags: #bug_bounty #account_takeover #research_reports
Medium
Find An Interesting Account Take-Over Vulnerability.
Account Takeover via Email Change Token Parameter(newUid) Manipulation
🔥1
⤷ Title: Cómo una API mal diseñada expuso los datos de todos los usuarios: IDOR, contraseñas en texto plano…
════════════════════════
𐀪 Author: C37webak1ix
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:38:05 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #web_security #ethical_hacking #api_security
════════════════════════
𐀪 Author: C37webak1ix
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:38:05 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #web_security #ethical_hacking #api_security
Medium
Cómo una API mal diseñada expuso los datos de todos los usuarios: IDOR, contraseñas en texto plano y más
Un caso real de cómo NO diseñar la seguridad de una aplicación
⤷ Title: The Day Admin Access Became an Organisation Takeover
════════════════════════
𐀪 Author: Kaivalya Gurav
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:38:03 GMT
════════════════════════
⌗ Tags: #infosec #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking
════════════════════════
𐀪 Author: Kaivalya Gurav
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:38:03 GMT
════════════════════════
⌗ Tags: #infosec #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking
Medium
The Day Admin Access Became an Organisation Takeover
Who am i
⤷ Title: ROT13 in terminal
════════════════════════
𐀪 Author: Abderrahim Aoudj
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:55:10 GMT
════════════════════════
⌗ Tags: #infosec #linux #cybersecurity #capture_the_flag
════════════════════════
𐀪 Author: Abderrahim Aoudj
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:55:10 GMT
════════════════════════
⌗ Tags: #infosec #linux #cybersecurity #capture_the_flag
Medium
ROT13 in terminal
Starting point with level 10 :
⤷ Title: Escape_202
════════════════════════
𐀪 Author: MS.Jix
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 22:16:27 GMT
════════════════════════
⌗ Tags: #linux_security #capture_the_flag #cybersecurity #web_security #ethical_hacking
════════════════════════
𐀪 Author: MS.Jix
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 22:16:27 GMT
════════════════════════
⌗ Tags: #linux_security #capture_the_flag #cybersecurity #web_security #ethical_hacking
Medium
Escape_202
http://cybertalents.com/challenges/web/escape_202
⤷ Title: Ethical Hacking
════════════════════════
𐀪 Author: Anas
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:51:42 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Anas
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:51:42 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
Ethical Hacking
Today I began expanding my knowledge in Ethical Hacking and Cybersecurity, focusing on how attackers operate and how organizations defend…
⤷ Title: Command Injection Nedir? DVWA Üzerinde Komut Çalıştırma Senaryosu
════════════════════════
𐀪 Author: Melih Yılmaz
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:28:10 GMT
════════════════════════
⌗ Tags: #command_injection #web_security #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Melih Yılmaz
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:28:10 GMT
════════════════════════
⌗ Tags: #command_injection #web_security #ethical_hacking #cybersecurity
Medium
Command Injection
Command Injection Command Injection Nedir? Command Injection (Komut Enjeksiyonu), bir uygulamanın kullanıcıdan aldığı girdiyi yeterli doğrulama ve filtreleme yapmadan sistem kabuğuna (shell) …
⤷ Title: Netcat Guide for Pentesting: Commands, Reverse Shells, and Exfiltration
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:01:03 GMT
════════════════════════
⌗ Tags: #networking #technology #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:01:03 GMT
════════════════════════
⌗ Tags: #networking #technology #hacking #cybersecurity #penetration_testing
Medium
Netcat Guide for Pentesting: Commands, Reverse Shells, and Exfiltration
Master Netcat for Bug Hunting: from banners and file transfers to reverse shells and firewall evasion.
⤷ Title: Redis to SYSTEM—TryHackMe VulnNet: Active
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:38:13 GMT
════════════════════════
⌗ Tags: #penetration_testing #redis #windows_security #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:38:13 GMT
════════════════════════
⌗ Tags: #penetration_testing #redis #windows_security #tryhackme #cybersecurity
Medium
Redis to SYSTEM—TryHackMe VulnNet: Active
Some boxes have one interesting thing. VulnNet: Active had a chain of them. Every step fed directly into the next, and by the end I had a…
⤷ Title: TryHackMe — Intro To Pwntools
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:09:05 GMT
════════════════════════
⌗ Tags: #writeup #ctf_writeup #tryhackme_walkthrough #tryhackme #tryhackme_writeup
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:09:05 GMT
════════════════════════
⌗ Tags: #writeup #ctf_writeup #tryhackme_walkthrough #tryhackme #tryhackme_writeup
Medium
TryHackMe — Intro To Pwntools
Task 1: Introduction
⤷ Title: Kali Linux Serisi#1: Yeni Başlayanlar İçin Kali Linux Nedir ve Neden Kullanılır?
════════════════════════
𐀪 Author: Şüheda Yavuz
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:10:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #kali_linux #bilgi_güvenliği #linux #siber_guvenlik
════════════════════════
𐀪 Author: Şüheda Yavuz
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:10:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #kali_linux #bilgi_güvenliği #linux #siber_guvenlik
Medium
Kali Linux Serisi#1: Yeni Başlayanlar İçin Kali Linux Nedir ve Neden Kullanılır?
Siber Güvenlik dünyasına adım atmak isteyen herkesin yolu bir noktada Kali Linux ile kesişir. Peki Kali Linux nedir? Neden Siber güvenlik…