⤷ Title: DAY 1 Recon: Manual Reconnaissance: How I Explore Targets Like a Hacker (But With Good Intentions)
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:57 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #ethical_hacking #programming #cybersecurity
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:57 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #ethical_hacking #programming #cybersecurity
Medium
DAY 1 Recon: Manual Reconnaissance: How I Explore Targets Like a Hacker (But With Good Intentions)
Before the tools come out, I like to get my hands dirty — and here’s why that matters.
⤷ Title: Ticket to Trouble: How I Hijacked Support Tickets to See Everyone’s Complaints ️
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:50 GMT
════════════════════════
⌗ Tags: #hacking #infosec #money #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:50 GMT
════════════════════════
⌗ Tags: #hacking #infosec #money #bug_bounty #cybersecurity
Medium
Ticket to Trouble: How I Hijacked Support Tickets to See Everyone’s Complaints 🎟️😈
Free Link 🎈
⤷ Title: Burp Suite For Beginners: How I Learned the Proxy and Interceptor
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:21 GMT
════════════════════════
⌗ Tags: #programming #bug_bounty #hacking #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:35:21 GMT
════════════════════════
⌗ Tags: #programming #bug_bounty #hacking #ethical_hacking #cybersecurity
Medium
Burp Suite For Beginners: How I Learned the Proxy and Interceptor
Ever tried to peek behind the curtain of a website? Maybe you’re curious how apps talk to each other. Or you keep hearing about “Burp…
⤷ Title: Reflected XSS Made Easy: Catching Real Bugs in the Wild
════════════════════════
𐀪 Author: Monika sharma
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:33:44 GMT
════════════════════════
⌗ Tags: #penetration_testing #tips_and_tricks #javanoscript #vulnerability #bug_bounty
════════════════════════
𐀪 Author: Monika sharma
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:33:44 GMT
════════════════════════
⌗ Tags: #penetration_testing #tips_and_tricks #javanoscript #vulnerability #bug_bounty
Medium
Reflected XSS Made Easy: Catching Real Bugs in the Wild
How a Simple Payload Uncovered a Real Vulnerability on MTN’s Website
⤷ Title: Extracting Data from the Subdomain Grave
════════════════════════
𐀪 Author: SIDDHANT SHUKLA
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:33:39 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #technology #programming #cybersecurity
════════════════════════
𐀪 Author: SIDDHANT SHUKLA
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:33:39 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #technology #programming #cybersecurity
Medium
Extracting Data from the Subdomain Grave
The buried aren’t always silent
⤷ Title: Forgotten by Design: How an Unused Subdomain Gave Me Full Cloud Access ☁️
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:33:29 GMT
════════════════════════
⌗ Tags: #infosec #bug_bounty #cybersecurity #money #hacking
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:33:29 GMT
════════════════════════
⌗ Tags: #infosec #bug_bounty #cybersecurity #money #hacking
Medium
💡 Forgotten by Design: How an Unused Subdomain Gave Me Full Cloud Access ☁️🔑
Hey there!😁
⤷ Title: I Turned IDOR and XSS Into a Mass Account Takeover
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:29:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #idor #web_security #bug_bounty #xss_attack
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:29:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #idor #web_security #bug_bounty #xss_attack
Medium
I Turned IDOR and XSS Into a Mass Account Takeover
Ever missed a critical bug because you didn’t chain vulnerabilities?
⤷ Title: “Day 2: Reconnaissance — How I Found My First Real Bug (And How You Can Too)”
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 04:45:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #money #bug_bounty #programming #technology
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 04:45:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #money #bug_bounty #programming #technology
Medium
“Day 2: Reconnaissance — How I Found My First Real Bug (And How You Can Too)”
On Day 1, I learned the basics. On Day 2, I got real. I remember staring at a company’s website, completely lost — where do I even start…
⤷ Title: Clean-Up Fail: How a Forgotten Admin Endpoint Let Me Drop All The Data ️
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 04:45:05 GMT
════════════════════════
⌗ Tags: #money #hacking #infosec #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 04:45:05 GMT
════════════════════════
⌗ Tags: #money #hacking #infosec #bug_bounty #cybersecurity
Medium
🧹 Clean-Up Fail: How a Forgotten Admin Endpoint Let Me Drop All The Data 🗑️🔧
Hey there!😁
⤷ Title: Package of Problems: How a Frontend NPM Library Leaked Internal API Keys
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 04:43:54 GMT
════════════════════════
⌗ Tags: #money #bug_bounty #infosec #cybersecurity #hacking
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 04:43:54 GMT
════════════════════════
⌗ Tags: #money #bug_bounty #infosec #cybersecurity #hacking
Medium
📦 Package of Problems: How a Frontend NPM Library Leaked Internal API Keys 🎁🧪
Hey there!😁
⤷ Title: O que é rollback e por que ele precisa estar no seu plano de segurança da informação
════════════════════════
𐀪 Author: Bughunt
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:22:41 GMT
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Bughunt
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:22:41 GMT
════════════════════════
⌗ Tags: No_Tags
BugHunt
O que é rollback e sua importância para a segurança
Rollback em TI permite reverter sistemas a estados anteriores, minimizando impactos de falhas e ataques em ambientes críticos. Saiba mais!
⤷ Title: Do you Practice, but Still Feel Stuck at Bug Bounty?
════════════════════════
𐀪 Author: Appsec.pt
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:47:48 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #bug_bounty_tips #red_teaming #bug_bounty_writeup
════════════════════════
𐀪 Author: Appsec.pt
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:47:48 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #bug_bounty_tips #red_teaming #bug_bounty_writeup
Medium
Do you Practice, but Still Feel Stuck at Bug Bounty?
Browsing Reddit recently, I found a lot of hunters who faced a common problem… They studied the theory, did CTFs, and spent time doing Bug…
⤷ Title: [Web Security Academy] — Server-Side Vulnerabilities / Access Control
════════════════════════
𐀪 Author: Voltsec
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:13:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #bug_bounty #access_control #ctf_writeup
════════════════════════
𐀪 Author: Voltsec
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:13:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #bug_bounty #access_control #ctf_writeup
Medium
[Web Security Academy] — Server-Side Vulnerabilities / Access Control
In this write-up, I’ll introduce the topic of access control in web applications and walk through a lab that demonstrates a vertical…
⤷ Title: CTF Day(46)
════════════════════════
𐀪 Author: Ahmed Narmer
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:06:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_penetration_testing #bug_bounty #web_pen_testing #ctf
════════════════════════
𐀪 Author: Ahmed Narmer
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:06:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_penetration_testing #bug_bounty #web_pen_testing #ctf
Medium
CTF Day(46)
picoCTF Web Exploitation: picobrowser
⤷ Title: CTF Day(45)
════════════════════════
𐀪 Author: Ahmed Narmer
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:52:59 GMT
════════════════════════
⌗ Tags: #web_pen_testing #cybersecurity #bug_bounty #ctf #web_penetration_testing
════════════════════════
𐀪 Author: Ahmed Narmer
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:52:59 GMT
════════════════════════
⌗ Tags: #web_pen_testing #cybersecurity #bug_bounty #ctf #web_penetration_testing
Medium
CTF Day(45)
picoCTF Web Exploitation: It is my Birthday
⤷ Title: Portswigger Information disclosure Labs — Practitioner
════════════════════════
𐀪 Author: Mike (sl0th0x87)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:36:02 GMT
════════════════════════
⌗ Tags: #bug_bounty #burpsuite #walkthrough #portswigger #information_disclosure
════════════════════════
𐀪 Author: Mike (sl0th0x87)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:36:02 GMT
════════════════════════
⌗ Tags: #bug_bounty #burpsuite #walkthrough #portswigger #information_disclosure
Medium
Portswigger Information disclosure Labs — Practitioner
Information Disclosure in Version Control History
⤷ Title: Portswigger Information Disclosure Labs — Apprentice
════════════════════════
𐀪 Author: Mike (sl0th0x87)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:31:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #portswigger #burpsuite #information_disclosure #walkthrough
════════════════════════
𐀪 Author: Mike (sl0th0x87)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:31:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #portswigger #burpsuite #information_disclosure #walkthrough
Medium
Portswigger Information Disclosure Labs — Apprentice
Information Disclosure in Error Messages
⤷ Title: CTF Day(44)
════════════════════════
𐀪 Author: Ahmed Narmer
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:22:25 GMT
════════════════════════
⌗ Tags: #bug_bounty #web_pen_testing #ctf #cybersecurity #web_penetration_testing
════════════════════════
𐀪 Author: Ahmed Narmer
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:22:25 GMT
════════════════════════
⌗ Tags: #bug_bounty #web_pen_testing #ctf #cybersecurity #web_penetration_testing
Medium
CTF Day(44)
picoCTF Web Exploitation: More Cookies
⤷ Title: Bug Bounty Hunting — Are Self Hosted Programs Any Better?
════════════════════════
𐀪 Author: Rehan Sohail
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:19:44 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips #bug_bounty_hunting #activated_thinker
════════════════════════
𐀪 Author: Rehan Sohail
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:19:44 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips #bug_bounty_hunting #activated_thinker
Medium
Bug Bounty Hunting — Are Self Hosted Programs Any Better?
You’ll see why I think External Programs are not worth it
⤷ Title: How an API Token Flaw Let Me Bypass Premium Restrictions
════════════════════════
𐀪 Author: Shubham Sharma
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:52:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_writeup #bug_bounty #bug_bounty_tips #api
════════════════════════
𐀪 Author: Shubham Sharma
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:52:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_writeup #bug_bounty #bug_bounty_tips #api
Medium
How an API Token Flaw Let Me Bypass Premium Restrictions
Hi Guys, Welcome back to yet another article, Today, I want to walk you through one of the bugs I found while hunting on HackerOne. I was…
⤷ Title: Coinbase Breach: Threats Exposed
════════════════════════
𐀪 Author: Kalariya Het
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:45:01 GMT
════════════════════════
⌗ Tags: #breach #vulnerability #loss #coinbase #bug_bounty
════════════════════════
𐀪 Author: Kalariya Het
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:45:01 GMT
════════════════════════
⌗ Tags: #breach #vulnerability #loss #coinbase #bug_bounty
Medium
Coinbase Breach: Threats Exposed
A Real-World Hook: The Coinbase Breach