⤷ Title: Finding subdomains that are hidden in the cloud.
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:25:15 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #penetration_testing #cybersecurity #cloud
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:25:15 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #penetration_testing #cybersecurity #cloud
Medium
Finding subdomains that are hidden in the cloud.
👋 Hello all👋
⤷ Title: Stored XSS into Onclick Event: Bypassing Angle Brackets, Double Quotes, and Escaped Characters —…
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:25:04 GMT
════════════════════════
⌗ Tags: #exploiting_onclick_xss #bug_bounty #portswigger_xss_lab #stored_xss_bypass #bypass_html_encoding
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:25:04 GMT
════════════════════════
⌗ Tags: #exploiting_onclick_xss #bug_bounty #portswigger_xss_lab #stored_xss_bypass #bypass_html_encoding
Medium
Stored XSS into Onclick Event: Bypassing Angle Brackets, Double Quotes, and Escaped Characters — XSS Labs
[Write-up] Stored XSS into Onclick Event with Angle Brackets and Double Quotes HTML-encoded and Single Quotes and Backslash Escaped.
⤷ Title: How to Uncover Hidden Attack Surfaces? Recon part 6
════════════════════════
𐀪 Author: It4chis3c
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:17 GMT
════════════════════════
⌗ Tags: #bug_bounty #attack_surface #hidden #port_scanning #ip_scans
════════════════════════
𐀪 Author: It4chis3c
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:17 GMT
════════════════════════
⌗ Tags: #bug_bounty #attack_surface #hidden #port_scanning #ip_scans
Medium
How to Uncover Hidden Attack Surfaces? Recon part 6
Probing | IP Resolution | Port Scanning
⤷ Title: Bug Bounty Target Selection: How Hackers Find the Most Profitable & Juicy Bugs Before Anyone Else!
════════════════════════
𐀪 Author: Akash Ghosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:18:51 GMT
════════════════════════
⌗ Tags: #technology #programming #cybersecurity #bug_bounty_writeup #bug_bounty
════════════════════════
𐀪 Author: Akash Ghosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:18:51 GMT
════════════════════════
⌗ Tags: #technology #programming #cybersecurity #bug_bounty_writeup #bug_bounty
Medium
Bug Bounty Target Selection: How Hackers Find the Most Profitable & Juicy Bugs Before Anyone Else!
Free Link
⤷ Title: Threat Hunting Techniques and Generative AI: A Practical Approach
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:20:05 GMT
════════════════════════
⌗ Tags: #information_technology #cybersecurity #bug_bounty #threat_hunting #ai
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:20:05 GMT
════════════════════════
⌗ Tags: #information_technology #cybersecurity #bug_bounty #threat_hunting #ai
Medium
Threat Hunting Techniques and Generative AI: A Practical Approach
Cyber threats are evolving rapidly, making proactive threat hunting a crucial security function. Traditional detection methods, such as…
⤷ Title: Notify Tutorial for Bug Hunters
════════════════════════
𐀪 Author: AbhirupKonwar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:11:46 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #pentesting #hacking #bug_bounty_tips
════════════════════════
𐀪 Author: AbhirupKonwar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:11:46 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #pentesting #hacking #bug_bounty_tips
Medium
Notify Tutorial for Bug Hunters
Get quick alerts on Discord (Automation Guide)
⤷ Title: Unleashing the Power of Delta Executor APK: A Gamer’s Journey
════════════════════════
𐀪 Author: MalikHassan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:22 GMT
════════════════════════
⌗ Tags: #application_security #application #application_development #applicant_tracking_system #apps
════════════════════════
𐀪 Author: MalikHassan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:22 GMT
════════════════════════
⌗ Tags: #application_security #application #application_development #applicant_tracking_system #apps
Medium
Unleashing the Power of Delta Executor APK: A Gamer’s Journey
Gaming has evolved beyond simple entertainment. For many, it’s a world of endless possibilities, customization, and innovation. Among the…
⤷ Title: Linux Privilege Escalation, some ideas from tryhackme machines — part 1
════════════════════════
𐀪 Author: Loaymorad
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:49:28 GMT
════════════════════════
⌗ Tags: #tryhackme #bugbounty_writeup #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Loaymorad
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:49:28 GMT
════════════════════════
⌗ Tags: #tryhackme #bugbounty_writeup #hacking #cybersecurity #penetration_testing
Medium
Linux Privilege Escalation, some ideas from tryhackme machines — part 1
بسم الله الرحمن الرحيم
⤷ Title: Creating a Code Obfuscation Program For C
════════════════════════
𐀪 Author: Aleksa Zatezalo
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:55 GMT
════════════════════════
⌗ Tags: #hacking #c #python #code_obfuscation
════════════════════════
𐀪 Author: Aleksa Zatezalo
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:55 GMT
════════════════════════
⌗ Tags: #hacking #c #python #code_obfuscation
Medium
Creating a Code Obfuscation Program For C
Imagine you’re trying to sneak past a security guard. If you walk right up wearing a mask and carrying suspicious stuff, you’ll get caught…
⤷ Title: Understanding XSS (Cross-Site Scripting) — A Complete Guide
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:12:54 GMT
════════════════════════
⌗ Tags: #cross_site_scripting #bugbounty_writeup #xss_attack #hacking #bug_bounty_tips
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:12:54 GMT
════════════════════════
⌗ Tags: #cross_site_scripting #bugbounty_writeup #xss_attack #hacking #bug_bounty_tips
Medium
Understanding XSS (Cross-Site Scripting) — A Complete Guide
Hello! My name is XABIT, and I am an ethical hacker and part-time bug bounty hunter. In this write-up, I will teach you everything about…
⤷ Title: Do you want to ?
════════════════════════
𐀪 Author: Horizon Secured
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:41:05 GMT
════════════════════════
⌗ Tags: #windows_security #active_directory_security #cybersecurity #windows #active_directory
════════════════════════
𐀪 Author: Horizon Secured
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:41:05 GMT
════════════════════════
⌗ Tags: #windows_security #active_directory_security #cybersecurity #windows #active_directory
Medium
Do you want to 𝗱𝗶𝘀𝗮𝗯𝗹𝗲 𝗥𝗖𝟰 𝗶𝗻 𝘆𝗼𝘂𝗿 𝗱𝗼𝗺𝗮𝗶𝗻?
You definitely should!
⤷ Title: Ransomware vs Malware: What’s the Difference?
════════════════════════
𐀪 Author: Hamza Hanif
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:36:30 GMT
════════════════════════
⌗ Tags: #cyberattack #cybercrime #ransomeware #malware #cybersecurity
════════════════════════
𐀪 Author: Hamza Hanif
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:36:30 GMT
════════════════════════
⌗ Tags: #cyberattack #cybercrime #ransomeware #malware #cybersecurity
Medium
Ransomware vs Malware: What’s the Difference?
In the ever-evolving landscape of cybersecurity, understanding the difference between ransomware and malware is crucial for protecting your…
⤷ Title: Nmap as an active reconnaissance technique
════════════════════════
𐀪 Author: Supun Pramuditha Jayawardhana
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:27:00 GMT
════════════════════════
⌗ Tags: #ubuntu #nmap #linux #cybersecurity
════════════════════════
𐀪 Author: Supun Pramuditha Jayawardhana
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:27:00 GMT
════════════════════════
⌗ Tags: #ubuntu #nmap #linux #cybersecurity
Medium
Nmap as an active reconnaissance technique
Nmap (“Network Mapper”) is a powerful linux command-line tool that is widely used to scan IP addresses, ports and services used by devices…
⤷ Title: Best Cyber Security Certifications for Beginners In 2025
════════════════════════
𐀪 Author: Craw Security
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:26:05 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #cybersecurity_course #ethical_hacking #cyber_security_services
════════════════════════
𐀪 Author: Craw Security
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:26:05 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #cybersecurity_course #ethical_hacking #cyber_security_services
Medium
Best Cyber Security Certifications for Beginners In 2025
Introduction
⤷ Title: HACKER 4 HIRE IS LEGIT This is the best/top professionals hacker for all hacking related issues(…
════════════════════════
𐀪 Author: Madison Wright
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:22:55 GMT
════════════════════════
⌗ Tags: #technology #programming #data_science #true_crime #cybersecurity
════════════════════════
𐀪 Author: Madison Wright
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:22:55 GMT
════════════════════════
⌗ Tags: #technology #programming #data_science #true_crime #cybersecurity
Medium
HACKER 4 HIRE IS LEGIT This is the best/top professionals hacker for all hacking related issues(…
-Social media Hacking & Recovery.
⤷ Title: सोशल मीडिया पर फूहड़तापन समय रैना और रणवीर इलाहाबादिया
════════════════════════
𐀪 Author: Ravish yadav
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:21:23 GMT
════════════════════════
⌗ Tags: #medium #psychology #justice #cybersecurity #deep_learning
════════════════════════
𐀪 Author: Ravish yadav
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:21:23 GMT
════════════════════════
⌗ Tags: #medium #psychology #justice #cybersecurity #deep_learning
Medium
सोशल मीडिया पर फूहड़तापन समय रैना और रणवीर इलाहाबादिया
समय रैना और रणवीर इलाहाबादिया के शो इंडियाज गॉट लेटेंट पर अश्लील भाषा और बेहूदा कंटेंट को लेकर विवाद खड़ा हो चुका है। इन दोनों पर आईपीसी की धारा 294 और आईटी एक्ट की धारा 67 के तहत एफआईआर दर्ज की गई…
⤷ Title: The “Exam: 312–50 CEHv12-Certified Ethical Hacker: +1000 Exam Practice Questions with Detailed…
════════════════════════
𐀪 Author: james William
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:10 GMT
════════════════════════
⌗ Tags: #education #cybersecurity
════════════════════════
𐀪 Author: james William
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:10 GMT
════════════════════════
⌗ Tags: #education #cybersecurity
Medium
The “Exam: 312–50 CEHv12-Certified Ethical Hacker: +1000 Exam Practice Questions with Detailed…
cybersecurity, Ethical hacker
⤷ Title: How to Prevent HTTP Parameter Pollution in Laravel: Best Practices & Code Examples
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:00:34 GMT
════════════════════════
⌗ Tags: #cybersecurity #laravel #http_parameter_pollution #penetration_testing #vulnerability
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:00:34 GMT
════════════════════════
⌗ Tags: #cybersecurity #laravel #http_parameter_pollution #penetration_testing #vulnerability
Medium
How to Prevent HTTP Parameter Pollution in Laravel: Best Practices & Code Examples
Introduction
⤷ Title: HTTP in detail — TryHackMe
════════════════════════
𐀪 Author: Avinash Nirmalkar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:23:30 GMT
════════════════════════
⌗ Tags: #networking #tryhackme #cybersecurity #tryhackme_walkthrough
════════════════════════
𐀪 Author: Avinash Nirmalkar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:23:30 GMT
════════════════════════
⌗ Tags: #networking #tryhackme #cybersecurity #tryhackme_walkthrough
Medium
HTTP in detail — TryHackMe
The internet is a vast and complex world, but at its heart lies a simple yet powerful language: HTTP. It’s the secret handshake between…
⤷ Title: 8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 12:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 12:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Gcore Radar report reveals 56% year-on-year increase in DDoS attacks
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:00:28 +0000
════════════════════════
⌗ Tags: #Press Release #Breach and Attack #Report #Research
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:00:28 +0000
════════════════════════
⌗ Tags: #Press Release #Breach and Attack #Report #Research
Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
Gcore Radar report reveals 56% year-on-year increase in DDoS attacks
Luxembourg, Luxembourg, 11th February 2025, CyberNewsWire