⤷ Title: Linktree Username Validation Bypass: A Hidden Threat with a Leading Space
════════════════════════
𐀪 Author: Yeswehack
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:26 GMT
════════════════════════
⌗ Tags: #google #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Yeswehack
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:26 GMT
════════════════════════
⌗ Tags: #google #bug_bounty #cybersecurity
Medium
Linktree Username Validation Bypass: A Hidden Threat with a Leading Space
By Aditya Sunny
Bug Bounty Hunter | Security Researcher | Ethical Hacker
📅 Reported: July 2025
🎯 Target: *.linktr.ee
Bug Bounty Hunter | Security Researcher | Ethical Hacker
📅 Reported: July 2025
🎯 Target: *.linktr.ee
⤷ Title: How a Small Open Redirect Flaw Became a $1000 rXSS Payday
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:13 GMT
════════════════════════
⌗ Tags: #tech #hacking #cybersecurity #programming #bug_bounty
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:13 GMT
════════════════════════
⌗ Tags: #tech #hacking #cybersecurity #programming #bug_bounty
Medium
How a Small Open Redirect Flaw Became a $1000 rXSS Payday
Most hackers ignore Open Redirects — but this one turned into a $1,000 payday. Here’s how.
⤷ Title: Learn about JWT if you want to Bypass Auth
════════════════════════
𐀪 Author: Mr Horbio
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:50 GMT
════════════════════════
⌗ Tags: #hacking #ethical_hacking #cybersecurity #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Mr Horbio
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:50 GMT
════════════════════════
⌗ Tags: #hacking #ethical_hacking #cybersecurity #penetration_testing #bug_bounty
Medium
Learn about JWT if you want to Bypass Auth
This article describe about JWT token. How JWT helps in authentication? and how to use JWT?
⤷ Title: Hacking Headless on Hack The Box: OSCP Prep
════════════════════════
𐀪 Author: enigma_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:09 GMT
════════════════════════
⌗ Tags: #ethical_hacking #oscp #penetration_testing #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: enigma_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:09 GMT
════════════════════════
⌗ Tags: #ethical_hacking #oscp #penetration_testing #bug_bounty #cybersecurity
Medium
Hacking Headless on Hack The Box: OSCP Prep
Recon, exploitation, privilege escalation.
⤷ Title: Reflected XSS in HTML Context with Most Tags and Attributes Blocked
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:46:44 GMT
════════════════════════
⌗ Tags: #xss_payload #bypass_waf_xss #bug_bounty #xss_attack #reflected_xss
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:46:44 GMT
════════════════════════
⌗ Tags: #xss_payload #bypass_waf_xss #bug_bounty #xss_attack #reflected_xss
Medium
Reflected XSS in HTML Context with Most Tags and Attributes Blocked
Discover how attackers exploit reflected XSS in restricted HTML contexts to bypass filters and trigger Javanoscript (print())execution.
⤷ Title: Secrets in GitHub Repos: How Hackers Find API Keys & Config Files
════════════════════════
𐀪 Author: Vipul Sonule
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:00:50 GMT
════════════════════════
⌗ Tags: #bug_bounty #ai #cybersecurity #hacking #programming
════════════════════════
𐀪 Author: Vipul Sonule
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:00:50 GMT
════════════════════════
⌗ Tags: #bug_bounty #ai #cybersecurity #hacking #programming
Medium
Secrets in GitHub Repos: How Hackers Find API Keys & Config Files 🔍
🚀 Introduction
⤷ Title: Recon in Minutes: Automating Subdomain Discovery for Penetration Tests
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:31:38 GMT
════════════════════════
⌗ Tags: #automation #penetration_testing #open_source #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:31:38 GMT
════════════════════════
⌗ Tags: #automation #penetration_testing #open_source #bug_bounty #cybersecurity
Medium
Recon in Minutes: Automating Subdomain Discovery for Penetration Tests
Time is a critical factor in penetration testing, so I have automated the use of several reconnaissance tools to efficiently gather…
⤷ Title: Password Security: “60 Million Pounds of Trouble” — Are You Next?
════════════════════════
𐀪 Author: CtrlC3
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:29:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #password_security #data_breach #hacking
════════════════════════
𐀪 Author: CtrlC3
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:29:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #password_security #data_breach #hacking
Medium
Password Security: “60 Million Pounds of Trouble” — Are You Next?
Okay, let’s talk about something that should scare you a little: password security. Or rather, the lack thereof. Imagine discovering that…
⤷ Title: Revenant: A Modern, Full-Stack Reverse Shell C2 Framework — From Payload Generation to Victim…
════════════════════════
𐀪 Author: Hack-Bat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:30:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #security #hacking #pentesting
════════════════════════
𐀪 Author: Hack-Bat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:30:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #security #hacking #pentesting
Medium
Revenant: A Modern, Full-Stack Reverse Shell C2 Framework — From Payload Generation to Victim session Management
A proof-of-concept that turns plain HTTP into a full-fledged C2 infrastructure, built entirely in C++.
⤷ Title: Master’s Degree vs. Certifications in Cybersecurity: Which Wins?
════════════════════════
𐀪 Author: Authlyn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:34 GMT
════════════════════════
⌗ Tags: #certification #infosec #cybersecurity #education #career_advice
════════════════════════
𐀪 Author: Authlyn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:34 GMT
════════════════════════
⌗ Tags: #certification #infosec #cybersecurity #education #career_advice
Medium
Master’s Degree vs. Certifications in Cybersecurity: Which Wins?
So, you want to break into cybersecurity, huh? Awesome choice! It’s a wild ride, but super rewarding. Now comes the big question: Do you…
⤷ Title: ️ Securing Binaries Against Reverse Engineering: A Developer’s Guide
════════════════════════
𐀪 Author: Geeky Vartika
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:54:50 GMT
════════════════════════
⌗ Tags: #data_security #information_security #reverse_engineering #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Geeky Vartika
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:54:50 GMT
════════════════════════
⌗ Tags: #data_security #information_security #reverse_engineering #cyber_security_awareness #cybersecurity
Medium
🛡️ Securing Binaries Against Reverse Engineering: A Developer’s Guide
Software development isn’t just about writing code — it’s also about protecting it. Once your code is compiled into a binary and shipped…
⤷ Title: Rapid7 Layoffs: “Brutal, but is it really a surprise?”
════════════════════════
𐀪 Author: Truspex
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:48:05 GMT
════════════════════════
⌗ Tags: #career_advice #cybersecurity #security #layoffs #tech_industry
════════════════════════
𐀪 Author: Truspex
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:48:05 GMT
════════════════════════
⌗ Tags: #career_advice #cybersecurity #security #layoffs #tech_industry
Medium
Rapid7 Layoffs: “Brutal, but is it really a surprise?”
Okay, let’s address the elephant in the room. The cybersecurity world is buzzing about the recent layoffs at Rapid7. It’s never good news…
⤷ Title: What is the difference between IoC and IoA?
════════════════════════
𐀪 Author: BnHany
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:44:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_threat_intelligence #society #technology #information_security
════════════════════════
𐀪 Author: BnHany
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:44:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_threat_intelligence #society #technology #information_security
Medium
What is the difference between IoC and IoA?
“‘IoA’ Indicator of Attack VS ‘IOC’ Indicator of Compromise”
⤷ Title: Cara Menginstal Perangkat Lunak Keamanan Seperti Antivirus
════════════════════════
𐀪 Author: Fadhlan Kiramim
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:42:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #self_improvement
════════════════════════
𐀪 Author: Fadhlan Kiramim
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:42:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #self_improvement
Medium
Cara Menginstal Perangkat Lunak Keamanan Seperti Antivirus
Di era digital seperti sekarang, keamanan siber menjadi hal yang sangat penting. Setiap hari, jutaan perangkat komputer dan smartphone…
⤷ Title: AI SOC Revolution: How Artificial Intelligence is Transforming Cybersecurity Operations in 2025
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:48 GMT
════════════════════════
⌗ Tags: #agentic_ai #cyber_security_awareness #ai_agent #cybersecurity #ai
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:48 GMT
════════════════════════
⌗ Tags: #agentic_ai #cyber_security_awareness #ai_agent #cybersecurity #ai
Medium
AI SOC Revolution: How Artificial Intelligence is Transforming Cybersecurity Operations in 2025
Discover how AI-powered Security Operations Centers (SOCs) are revolutionizing cybersecurity with AI,
⤷ Title: AI SOC Agents — How Agentic SOC Outpace Traditional Tools
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:30 GMT
════════════════════════
⌗ Tags: #agentic_ai #cybersecurity #cyber_security_awareness #ai #ai_agent
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:30 GMT
════════════════════════
⌗ Tags: #agentic_ai #cybersecurity #cyber_security_awareness #ai #ai_agent
Medium
AI SOC Agents — How Agentic SOC Outpace Traditional Tools
Discover how AI SOC agents reduce alert fatigue by 83%, cut MTTR by 90%, and autonomously investigate threats 24/7.
⤷ Title: How AI SOC Analysts Are Revolutionizing Cybersecurity Operations in 2025
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:13 GMT
════════════════════════
⌗ Tags: #ai #agentic_ai #cybersecurity #security_operation_center #ai_agent
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:13 GMT
════════════════════════
⌗ Tags: #ai #agentic_ai #cybersecurity #security_operation_center #ai_agent
Medium
How AI SOC Analysts Are Revolutionizing Cybersecurity Operations in 2025
Learn how AI SOC Analysts are revolutionizing traditional SOC. How to use AI in SOC and much more!
⤷ Title: Building a cyber resilience index beyond traditional risk metrics
════════════════════════
𐀪 Author: Cloud4C Services
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_technology #risk_management #security
════════════════════════
𐀪 Author: Cloud4C Services
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_technology #risk_management #security
Medium
Building a cyber resilience index beyond traditional risk metrics
Measuring cybersecurity by just risk scores is like judging a car’s health just by how clean the windshield is. Sounds moot, right?
⤷ Title: DAILY BUGLE-TRY HACK ME-ROOM
════════════════════════
𐀪 Author: 5kullk3r
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:41:53 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #ctf #cybersecurity #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: 5kullk3r
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:41:53 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #ctf #cybersecurity #tryhackme_writeup #tryhackme
Medium
DAILY BUGLE-TRY HACK ME-ROOM
Hello everyone! This room gave off immediate nostalgic vibes, but we’re here for exploits — although, fun bonus if you’re a Spidey fan thi…
⤷ Title: TryHackMe PT1 Suck
════════════════════════
𐀪 Author: Mahawev
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:21:37 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: Mahawev
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:21:37 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme
Medium
TryHackMe PT1 Suck
Web #1:
The first web application is vulnerable to Cross-Site Scripting (XSS) via the loan comment field, where malicious input such as…
The first web application is vulnerable to Cross-Site Scripting (XSS) via the loan comment field, where malicious input such as…
⤷ Title: Why Stored XSS Is Still So Dangerous: A Real Example and How to Defend
════════════════════════
𐀪 Author: ven coding
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:34:31 GMT
════════════════════════
⌗ Tags: #xss_vulnerability #xss_attack #vulnerability #stored_xss
════════════════════════
𐀪 Author: ven coding
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:34:31 GMT
════════════════════════
⌗ Tags: #xss_vulnerability #xss_attack #vulnerability #stored_xss
Medium
Why Stored XSS Is Still So Dangerous: A Real Example and How to Defend
A real stored XSS vulnerability led to a $500 bug bounty. Here’s what happened, why stored XSS is dangerous, and how to protect your apps.