⤷ Title: CTF Day(45)
════════════════════════
𐀪 Author: Ahmed Narmer
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:52:59 GMT
════════════════════════
⌗ Tags: #web_pen_testing #cybersecurity #bug_bounty #ctf #web_penetration_testing
════════════════════════
𐀪 Author: Ahmed Narmer
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:52:59 GMT
════════════════════════
⌗ Tags: #web_pen_testing #cybersecurity #bug_bounty #ctf #web_penetration_testing
Medium
CTF Day(45)
picoCTF Web Exploitation: It is my Birthday
⤷ Title: Portswigger Information disclosure Labs — Practitioner
════════════════════════
𐀪 Author: Mike (sl0th0x87)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:36:02 GMT
════════════════════════
⌗ Tags: #bug_bounty #burpsuite #walkthrough #portswigger #information_disclosure
════════════════════════
𐀪 Author: Mike (sl0th0x87)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:36:02 GMT
════════════════════════
⌗ Tags: #bug_bounty #burpsuite #walkthrough #portswigger #information_disclosure
Medium
Portswigger Information disclosure Labs — Practitioner
Information Disclosure in Version Control History
⤷ Title: Portswigger Information Disclosure Labs — Apprentice
════════════════════════
𐀪 Author: Mike (sl0th0x87)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:31:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #portswigger #burpsuite #information_disclosure #walkthrough
════════════════════════
𐀪 Author: Mike (sl0th0x87)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:31:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #portswigger #burpsuite #information_disclosure #walkthrough
Medium
Portswigger Information Disclosure Labs — Apprentice
Information Disclosure in Error Messages
⤷ Title: CTF Day(44)
════════════════════════
𐀪 Author: Ahmed Narmer
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:22:25 GMT
════════════════════════
⌗ Tags: #bug_bounty #web_pen_testing #ctf #cybersecurity #web_penetration_testing
════════════════════════
𐀪 Author: Ahmed Narmer
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:22:25 GMT
════════════════════════
⌗ Tags: #bug_bounty #web_pen_testing #ctf #cybersecurity #web_penetration_testing
Medium
CTF Day(44)
picoCTF Web Exploitation: More Cookies
⤷ Title: Bug Bounty Hunting — Are Self Hosted Programs Any Better?
════════════════════════
𐀪 Author: Rehan Sohail
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:19:44 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips #bug_bounty_hunting #activated_thinker
════════════════════════
𐀪 Author: Rehan Sohail
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:19:44 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips #bug_bounty_hunting #activated_thinker
Medium
Bug Bounty Hunting — Are Self Hosted Programs Any Better?
You’ll see why I think External Programs are not worth it
⤷ Title: How an API Token Flaw Let Me Bypass Premium Restrictions
════════════════════════
𐀪 Author: Shubham Sharma
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:52:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_writeup #bug_bounty #bug_bounty_tips #api
════════════════════════
𐀪 Author: Shubham Sharma
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:52:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_writeup #bug_bounty #bug_bounty_tips #api
Medium
How an API Token Flaw Let Me Bypass Premium Restrictions
Hi Guys, Welcome back to yet another article, Today, I want to walk you through one of the bugs I found while hunting on HackerOne. I was…
⤷ Title: Coinbase Breach: Threats Exposed
════════════════════════
𐀪 Author: Kalariya Het
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:45:01 GMT
════════════════════════
⌗ Tags: #breach #vulnerability #loss #coinbase #bug_bounty
════════════════════════
𐀪 Author: Kalariya Het
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:45:01 GMT
════════════════════════
⌗ Tags: #breach #vulnerability #loss #coinbase #bug_bounty
Medium
Coinbase Breach: Threats Exposed
A Real-World Hook: The Coinbase Breach
⤷ Title: Stop Common Attacks Cold with These Built-In PHP Defenses
════════════════════════
𐀪 Author: Asian Digital Hub
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 09:15:44 GMT
════════════════════════
⌗ Tags: #tech_tips #owasp #php #application_security #php_development
════════════════════════
𐀪 Author: Asian Digital Hub
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 09:15:44 GMT
════════════════════════
⌗ Tags: #tech_tips #owasp #php #application_security #php_development
Medium
Stop Common Attacks Cold with These Built-In PHP Defenses
Most PHP devs don’t get hacked because they’re bad coders. They get hacked because they assumed the defaults were enough.
⤷ Title: The Secrets of Secure Code
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 16:55:19 GMT
════════════════════════
⌗ Tags: #vulnerability_prevention #code_security #secure_coding #application_security #software_security
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 16:55:19 GMT
════════════════════════
⌗ Tags: #vulnerability_prevention #code_security #secure_coding #application_security #software_security
Medium
The Secrets of Secure Code
In the rapidly evolving landscape of modern software, where applications form the backbone of businesses and daily life, the integrity and…
⤷ Title: PortSwigger Lab Walkthrough: OS Command Injection (Simple Case)
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 13:20:42 GMT
════════════════════════
⌗ Tags: #application_security #web_penetration_testing #application_pen_testing #penetration_testing #offensive_security
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 13:20:42 GMT
════════════════════════
⌗ Tags: #application_security #web_penetration_testing #application_pen_testing #penetration_testing #offensive_security
Medium
PortSwigger Lab Walkthrough: OS Command Injection (Simple Case)
✅Introduction
⤷ Title: Application Layer Attacks: The Silent Killer of Modern Apps
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Sun, 03 Aug 2025 20:27:04 GMT
════════════════════════
⌗ Tags: #application_attacks #application_security #secure_coding #appsec #web_application_attack
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Sun, 03 Aug 2025 20:27:04 GMT
════════════════════════
⌗ Tags: #application_attacks #application_security #secure_coding #appsec #web_application_attack
Medium
Application Layer Attacks: The Silent Killer of Modern Apps
When we talk about cyberattacks, many think of massive DDoS floods, network breaches, or ransomware.
⤷ Title: A Comprehensive Guide to GPG-Signed Hash Manifests with GitHub Actions
════════════════════════
𐀪 Author: Femi Oyesanya
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 17:47:21 GMT
════════════════════════
⌗ Tags: #application_security
════════════════════════
𐀪 Author: Femi Oyesanya
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 17:47:21 GMT
════════════════════════
⌗ Tags: #application_security
Medium
A Comprehensive Guide to GPG-Signed Hash Manifests with GitHub Actions
In modern software development, ensuring the integrity and authenticity of your code is paramount. A robust method for achieving this is to…
⤷ Title: One Character, One Flaw: Why & sleep 5 # Works But & sleep 5 Doesn’t
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:19:45 GMT
════════════════════════
⌗ Tags: #command_injection #hacking #os_command_injection #secure_coding #web_app_pentesting
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:19:45 GMT
════════════════════════
⌗ Tags: #command_injection #hacking #os_command_injection #secure_coding #web_app_pentesting
Medium
One Character, One Flaw: Why & sleep 5 # Works But & sleep 5 Doesn’t
When testing for command injection, you might notice something odd:
⤷ Title: How I Went from IT Support to Senior Pentester in Just 2 Years
════════════════════════
𐀪 Author: ATNO For Cybersecurity | Hacking
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:31:41 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #senior_pentester
════════════════════════
𐀪 Author: ATNO For Cybersecurity | Hacking
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:31:41 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #senior_pentester
Medium
How I Went from IT Support to Senior Pentester in Just 2 Years
1. Stopped Waiting for “The Perfect Time”
⤷ Title: LazyOwn RedTeam Framework: How Open-Source Chaos Forces Blue Teams to Stay Sharp (and Sane)
════════════════════════
𐀪 Author: Lazyown Redteam
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:30:45 GMT
════════════════════════
⌗ Tags: #hacking #red_team #blue_team
════════════════════════
𐀪 Author: Lazyown Redteam
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:30:45 GMT
════════════════════════
⌗ Tags: #hacking #red_team #blue_team
Medium
LazyOwn RedTeam Framework: How Open-Source Chaos Forces Blue Teams to Stay Sharp (and Sane)
Let’s be real: if you’re a Blue Teamer, you’ve probably woken up in a cold sweat wondering, “What new horror did the Red Team deploy while…
⤷ Title: Advanced Info-Stealer Targets 4,000+ IPs Worldwide
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:22:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #malware #news #infostealer
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:22:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #malware #news #infostealer
Medium
Advanced Info-Stealer Targets 4,000+ IPs Worldwide
Researchers have identified a surge in credential theft operations driven by a Vietnamese-speaking threat group leveraging a Python-based…
⤷ Title: Recovery Made Easy With James
════════════════════════
𐀪 Author: Norman Meg
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:34:37 GMT
════════════════════════
⌗ Tags: #cryptocurrency #hacking #world
════════════════════════
𐀪 Author: Norman Meg
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:34:37 GMT
════════════════════════
⌗ Tags: #cryptocurrency #hacking #world
Medium
Recovery Made Easy With James
After losing over $600,000.00 to fraudulent stock brokers who operated under the name “fxtradebit,” I found myself drowning in debt. However, I was fortunate enough to come across so reviews about a…
⤷ Title: Cracked in Seconds: How a Weak Password Exposed 64 Million McDonald’s Applicants
════════════════════════
𐀪 Author: Kalariya Het
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:35:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #medium #security #hacking #mcdonalds
════════════════════════
𐀪 Author: Kalariya Het
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:35:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #medium #security #hacking #mcdonalds
Medium
Cracked in Seconds: How a Weak Password Exposed 64 Million McDonald’s Applicants
The Hook
⤷ Title: Professional Hacking Service | Sessions Hijacking
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 15:13:33 GMT
════════════════════════
⌗ Tags: #hacking #artificial_intelligence #apple #business #android
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 15:13:33 GMT
════════════════════════
⌗ Tags: #hacking #artificial_intelligence #apple #business #android
Medium
Professional Hacking Service | Sessions Hijacking
Session hijacking is a type of cyber attack where hackers takes control of a user’s active session after the user has authenticated to a service. The goal of this attack is often to steal sensitive…
⤷ Title: Face Swap: the tool hackers don’t want you to know about
════════════════════════
𐀪 Author: Luciano Gutierrez
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:17:08 GMT
════════════════════════
⌗ Tags: #cibersecurity #tecnology #osint #hacking #data_privacy
════════════════════════
𐀪 Author: Luciano Gutierrez
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:17:08 GMT
════════════════════════
⌗ Tags: #cibersecurity #tecnology #osint #hacking #data_privacy
Medium
Face Swap: the tool hackers don’t want you to know about
Sofía is at home, worried because her partner, Marcos, tells her he is working late. Marcos sends her a photo in which he appears serious…
⤷ Title: Fluffy | Easy | Hack The Box
════════════════════════
𐀪 Author: Anasmohammed
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:16:33 GMT
════════════════════════
⌗ Tags: #fluffy #smb #smbclient #hacking
════════════════════════
𐀪 Author: Anasmohammed
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:16:33 GMT
════════════════════════
⌗ Tags: #fluffy #smb #smbclient #hacking
Medium
Fluffy | Easy | Hack The Box
Welcome to another Hack the Box exercise. In this blog post, I will show you how I owned the Fluffy machine on Hack the Box. Hack The Box…