⤷ Title: How to Uncover Hidden Attack Surfaces? Recon part 6
════════════════════════
𐀪 Author: It4chis3c
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:17 GMT
════════════════════════
⌗ Tags: #bug_bounty #attack_surface #hidden #port_scanning #ip_scans
════════════════════════
𐀪 Author: It4chis3c
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:17 GMT
════════════════════════
⌗ Tags: #bug_bounty #attack_surface #hidden #port_scanning #ip_scans
Medium
How to Uncover Hidden Attack Surfaces? Recon part 6
Probing | IP Resolution | Port Scanning
⤷ Title: Bug Bounty Target Selection: How Hackers Find the Most Profitable & Juicy Bugs Before Anyone Else!
════════════════════════
𐀪 Author: Akash Ghosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:18:51 GMT
════════════════════════
⌗ Tags: #technology #programming #cybersecurity #bug_bounty_writeup #bug_bounty
════════════════════════
𐀪 Author: Akash Ghosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:18:51 GMT
════════════════════════
⌗ Tags: #technology #programming #cybersecurity #bug_bounty_writeup #bug_bounty
Medium
Bug Bounty Target Selection: How Hackers Find the Most Profitable & Juicy Bugs Before Anyone Else!
Free Link
⤷ Title: Threat Hunting Techniques and Generative AI: A Practical Approach
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:20:05 GMT
════════════════════════
⌗ Tags: #information_technology #cybersecurity #bug_bounty #threat_hunting #ai
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:20:05 GMT
════════════════════════
⌗ Tags: #information_technology #cybersecurity #bug_bounty #threat_hunting #ai
Medium
Threat Hunting Techniques and Generative AI: A Practical Approach
Cyber threats are evolving rapidly, making proactive threat hunting a crucial security function. Traditional detection methods, such as…
⤷ Title: Notify Tutorial for Bug Hunters
════════════════════════
𐀪 Author: AbhirupKonwar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:11:46 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #pentesting #hacking #bug_bounty_tips
════════════════════════
𐀪 Author: AbhirupKonwar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:11:46 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #pentesting #hacking #bug_bounty_tips
Medium
Notify Tutorial for Bug Hunters
Get quick alerts on Discord (Automation Guide)
⤷ Title: Unleashing the Power of Delta Executor APK: A Gamer’s Journey
════════════════════════
𐀪 Author: MalikHassan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:22 GMT
════════════════════════
⌗ Tags: #application_security #application #application_development #applicant_tracking_system #apps
════════════════════════
𐀪 Author: MalikHassan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:22 GMT
════════════════════════
⌗ Tags: #application_security #application #application_development #applicant_tracking_system #apps
Medium
Unleashing the Power of Delta Executor APK: A Gamer’s Journey
Gaming has evolved beyond simple entertainment. For many, it’s a world of endless possibilities, customization, and innovation. Among the…
⤷ Title: Linux Privilege Escalation, some ideas from tryhackme machines — part 1
════════════════════════
𐀪 Author: Loaymorad
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:49:28 GMT
════════════════════════
⌗ Tags: #tryhackme #bugbounty_writeup #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Loaymorad
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:49:28 GMT
════════════════════════
⌗ Tags: #tryhackme #bugbounty_writeup #hacking #cybersecurity #penetration_testing
Medium
Linux Privilege Escalation, some ideas from tryhackme machines — part 1
بسم الله الرحمن الرحيم
⤷ Title: Creating a Code Obfuscation Program For C
════════════════════════
𐀪 Author: Aleksa Zatezalo
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:55 GMT
════════════════════════
⌗ Tags: #hacking #c #python #code_obfuscation
════════════════════════
𐀪 Author: Aleksa Zatezalo
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:55 GMT
════════════════════════
⌗ Tags: #hacking #c #python #code_obfuscation
Medium
Creating a Code Obfuscation Program For C
Imagine you’re trying to sneak past a security guard. If you walk right up wearing a mask and carrying suspicious stuff, you’ll get caught…
⤷ Title: Understanding XSS (Cross-Site Scripting) — A Complete Guide
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:12:54 GMT
════════════════════════
⌗ Tags: #cross_site_scripting #bugbounty_writeup #xss_attack #hacking #bug_bounty_tips
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:12:54 GMT
════════════════════════
⌗ Tags: #cross_site_scripting #bugbounty_writeup #xss_attack #hacking #bug_bounty_tips
Medium
Understanding XSS (Cross-Site Scripting) — A Complete Guide
Hello! My name is XABIT, and I am an ethical hacker and part-time bug bounty hunter. In this write-up, I will teach you everything about…
⤷ Title: Do you want to ?
════════════════════════
𐀪 Author: Horizon Secured
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:41:05 GMT
════════════════════════
⌗ Tags: #windows_security #active_directory_security #cybersecurity #windows #active_directory
════════════════════════
𐀪 Author: Horizon Secured
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:41:05 GMT
════════════════════════
⌗ Tags: #windows_security #active_directory_security #cybersecurity #windows #active_directory
Medium
Do you want to 𝗱𝗶𝘀𝗮𝗯𝗹𝗲 𝗥𝗖𝟰 𝗶𝗻 𝘆𝗼𝘂𝗿 𝗱𝗼𝗺𝗮𝗶𝗻?
You definitely should!
⤷ Title: Ransomware vs Malware: What’s the Difference?
════════════════════════
𐀪 Author: Hamza Hanif
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:36:30 GMT
════════════════════════
⌗ Tags: #cyberattack #cybercrime #ransomeware #malware #cybersecurity
════════════════════════
𐀪 Author: Hamza Hanif
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:36:30 GMT
════════════════════════
⌗ Tags: #cyberattack #cybercrime #ransomeware #malware #cybersecurity
Medium
Ransomware vs Malware: What’s the Difference?
In the ever-evolving landscape of cybersecurity, understanding the difference between ransomware and malware is crucial for protecting your…
⤷ Title: Nmap as an active reconnaissance technique
════════════════════════
𐀪 Author: Supun Pramuditha Jayawardhana
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:27:00 GMT
════════════════════════
⌗ Tags: #ubuntu #nmap #linux #cybersecurity
════════════════════════
𐀪 Author: Supun Pramuditha Jayawardhana
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:27:00 GMT
════════════════════════
⌗ Tags: #ubuntu #nmap #linux #cybersecurity
Medium
Nmap as an active reconnaissance technique
Nmap (“Network Mapper”) is a powerful linux command-line tool that is widely used to scan IP addresses, ports and services used by devices…
⤷ Title: Best Cyber Security Certifications for Beginners In 2025
════════════════════════
𐀪 Author: Craw Security
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:26:05 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #cybersecurity_course #ethical_hacking #cyber_security_services
════════════════════════
𐀪 Author: Craw Security
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:26:05 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #cybersecurity_course #ethical_hacking #cyber_security_services
Medium
Best Cyber Security Certifications for Beginners In 2025
Introduction
⤷ Title: HACKER 4 HIRE IS LEGIT This is the best/top professionals hacker for all hacking related issues(…
════════════════════════
𐀪 Author: Madison Wright
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:22:55 GMT
════════════════════════
⌗ Tags: #technology #programming #data_science #true_crime #cybersecurity
════════════════════════
𐀪 Author: Madison Wright
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:22:55 GMT
════════════════════════
⌗ Tags: #technology #programming #data_science #true_crime #cybersecurity
Medium
HACKER 4 HIRE IS LEGIT This is the best/top professionals hacker for all hacking related issues(…
-Social media Hacking & Recovery.
⤷ Title: सोशल मीडिया पर फूहड़तापन समय रैना और रणवीर इलाहाबादिया
════════════════════════
𐀪 Author: Ravish yadav
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:21:23 GMT
════════════════════════
⌗ Tags: #medium #psychology #justice #cybersecurity #deep_learning
════════════════════════
𐀪 Author: Ravish yadav
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:21:23 GMT
════════════════════════
⌗ Tags: #medium #psychology #justice #cybersecurity #deep_learning
Medium
सोशल मीडिया पर फूहड़तापन समय रैना और रणवीर इलाहाबादिया
समय रैना और रणवीर इलाहाबादिया के शो इंडियाज गॉट लेटेंट पर अश्लील भाषा और बेहूदा कंटेंट को लेकर विवाद खड़ा हो चुका है। इन दोनों पर आईपीसी की धारा 294 और आईटी एक्ट की धारा 67 के तहत एफआईआर दर्ज की गई…
⤷ Title: The “Exam: 312–50 CEHv12-Certified Ethical Hacker: +1000 Exam Practice Questions with Detailed…
════════════════════════
𐀪 Author: james William
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:10 GMT
════════════════════════
⌗ Tags: #education #cybersecurity
════════════════════════
𐀪 Author: james William
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:10 GMT
════════════════════════
⌗ Tags: #education #cybersecurity
Medium
The “Exam: 312–50 CEHv12-Certified Ethical Hacker: +1000 Exam Practice Questions with Detailed…
cybersecurity, Ethical hacker
⤷ Title: How to Prevent HTTP Parameter Pollution in Laravel: Best Practices & Code Examples
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:00:34 GMT
════════════════════════
⌗ Tags: #cybersecurity #laravel #http_parameter_pollution #penetration_testing #vulnerability
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:00:34 GMT
════════════════════════
⌗ Tags: #cybersecurity #laravel #http_parameter_pollution #penetration_testing #vulnerability
Medium
How to Prevent HTTP Parameter Pollution in Laravel: Best Practices & Code Examples
Introduction
⤷ Title: HTTP in detail — TryHackMe
════════════════════════
𐀪 Author: Avinash Nirmalkar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:23:30 GMT
════════════════════════
⌗ Tags: #networking #tryhackme #cybersecurity #tryhackme_walkthrough
════════════════════════
𐀪 Author: Avinash Nirmalkar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:23:30 GMT
════════════════════════
⌗ Tags: #networking #tryhackme #cybersecurity #tryhackme_walkthrough
Medium
HTTP in detail — TryHackMe
The internet is a vast and complex world, but at its heart lies a simple yet powerful language: HTTP. It’s the secret handshake between…
⤷ Title: 8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 12:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 12:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Gcore Radar report reveals 56% year-on-year increase in DDoS attacks
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:00:28 +0000
════════════════════════
⌗ Tags: #Press Release #Breach and Attack #Report #Research
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:00:28 +0000
════════════════════════
⌗ Tags: #Press Release #Breach and Attack #Report #Research
Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
Gcore Radar report reveals 56% year-on-year increase in DDoS attacks
Luxembourg, Luxembourg, 11th February 2025, CyberNewsWire
⤷ Title: SAP Security Patch Day February 2025: Multi Vulnerabilities Addressed
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:33:52 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2024_38819 #CVE_2024_38820 #CVE_2024_38828 #CVE_2025_0064 #CVE_2025_24876 #CVE_2025_25243 #SAP Security Patch Day
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:33:52 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2024_38819 #CVE_2024_38820 #CVE_2024_38828 #CVE_2025_0064 #CVE_2025_24876 #CVE_2025_25243 #SAP Security Patch Day
Cybersecurity News
SAP Security Patch Day February 2025: Multi Vulnerabilities Addressed
Discover the critical security vulnerabilities addressed in the latest SAP Patch Day. Take action to protect your SAP systems from CVE-2025-0064 and other high-severity flaws.
⤷ Title: Robust Open Online Safety Tools (ROOST): Tech Giants Unite to Build AI-Era Security Infrastructure
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:23:38 +0000
════════════════════════
⌗ Tags: #Technology #Discord #google #OpenAI #Roblox #Robust Open Online Safety Tools #ROOST
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:23:38 +0000
════════════════════════
⌗ Tags: #Technology #Discord #google #OpenAI #Roblox #Robust Open Online Safety Tools #ROOST
Cybersecurity News
Robust Open Online Safety Tools (ROOST): Tech Giants Unite to Build AI-Era Security Infrastructure
Learn about ROOST, the non-profit organization formed by Roblox, Discord, OpenAI, and Google to develop advanced open-source security tools for a safer online environment, particularly for children.