⤷ Title: Subdomain Enumeration
════════════════════════
𐀪 Author: Yasmin Abdelraouf
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:04:41 GMT
════════════════════════
⌗ Tags: #security_researchers #pentesting #bug_bounty #web_penetration_testing #subdomains_enumeration
════════════════════════
𐀪 Author: Yasmin Abdelraouf
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:04:41 GMT
════════════════════════
⌗ Tags: #security_researchers #pentesting #bug_bounty #web_penetration_testing #subdomains_enumeration
Medium
Subdomain Enumeration
What is subdomain enumeration?
⤷ Title: Understanding HTTP: The Backbone of the Web
════════════════════════
𐀪 Author: Arfi Tutorials
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:24:03 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #http_request #cybersecurity #https
════════════════════════
𐀪 Author: Arfi Tutorials
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:24:03 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #http_request #cybersecurity #https
Medium
Understanding HTTP: The Backbone of the Web
Hello everyone! My name is Arfat Khan, and I run a YouTube channel called Arfi Tutorials. I am a bug bounty hunter, penetration tester, and…
⤷ Title: How you can integrate our Leaked Credentials API
════════════════════════
𐀪 Author: BreachCollection
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:01:02 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #api #programming #bug_bounty
════════════════════════
𐀪 Author: BreachCollection
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:01:02 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #api #programming #bug_bounty
Medium
How you can integrate our Leaked Credentials API
BreachCollection is a Data Breach Search Engine designed to combat Credential Stuffing. To help you secure your infrastructure, we provide…
⤷ Title: HTB BoardLight (OSCP Prep)
════════════════════════
𐀪 Author: G3XAR
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:41:55 GMT
════════════════════════
⌗ Tags: #infosec #penetration_testing #hacking #cybersecurity #hackthebox
════════════════════════
𐀪 Author: G3XAR
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:41:55 GMT
════════════════════════
⌗ Tags: #infosec #penetration_testing #hacking #cybersecurity #hackthebox
Medium
HTB BoardLight (OSCP Prep)
This machine is from Lainkusanagi’s OSCP-Like list — a well-known collection of boxes for OSCP preparation. This box is simple, but it…
⤷ Title: Web Hack | SQL injection | Hacking Services | Hire Hacker
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:39:52 GMT
════════════════════════
⌗ Tags: #tech #social_media #hacking #web_development #business
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:39:52 GMT
════════════════════════
⌗ Tags: #tech #social_media #hacking #web_development #business
Medium
Web Hack | SQL injection | Hacking Services | Hire Hacker
Web Hack | SQL injection | Hacking Services | Hire Hacker A website is a collection of related web pages that are typically accessed via the internet. Each web page is identified by a unique URL …
⤷ Title: CryoVault CTF 2025 Qualification Round — WriteUps
════════════════════════
𐀪 Author: Ojas Maheshwari
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:59:59 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #hacking #programming #cybersecurity
════════════════════════
𐀪 Author: Ojas Maheshwari
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:59:59 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #hacking #programming #cybersecurity
Medium
CryoVault CTF 2025 Qualification Round — WriteUps
This was nice qualification round, our team BlackArc ranked #1 in this CTF. Although I solved many challenges outside of web category also…
⤷ Title: Drones en el narco y atentados terroristas, como desactivar esta amenaza con ayuda de los hackers.
════════════════════════
𐀪 Author: Hacking en México
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:39:21 GMT
════════════════════════
⌗ Tags: #hacking #security #drones
════════════════════════
𐀪 Author: Hacking en México
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:39:21 GMT
════════════════════════
⌗ Tags: #hacking #security #drones
Medium
Drones en el narco y atentados terroristas, como desactivar esta amenaza con ayuda de los hackers.
Voy a entrar en esto con la misma crudeza que uso cuando desarmo una VM a medianoche: drones, narco-drones y cómo se ha vuelto esta pelea…
⤷ Title: AI vs. Zero-Day Attacks: How Machine Learning Detects the Unknown
════════════════════════
𐀪 Author: Gopi Sri
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:05:38 GMT
════════════════════════
⌗ Tags: #hacking #artificial_intelligence #technology #machine_learning
════════════════════════
𐀪 Author: Gopi Sri
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:05:38 GMT
════════════════════════
⌗ Tags: #hacking #artificial_intelligence #technology #machine_learning
Medium
AI vs. Zero-Day Attacks: How Machine Learning Detects the Unknown
Every day, new vulnerabilities are discovered before defenders even know they exist. These unknown flaws — called zero-day attacks — give…
⤷ Title: How I hacked 100,000+ motorcycles (including my own)…
════════════════════════
𐀪 Author: Ilnur Khakimov
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 15:56:23 GMT
════════════════════════
⌗ Tags: #research #motorcycle #pentesting #vulnerability #hacking
════════════════════════
𐀪 Author: Ilnur Khakimov
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 15:56:23 GMT
════════════════════════
⌗ Tags: #research #motorcycle #pentesting #vulnerability #hacking
Medium
How I hacked 100,000+ motorcycles (including my own)…
Introduction My name is Ilnur Khakimov, and I work as a Penetration Tester (Ethical Hacker) at Bureau Veritas Cybersecurity. In my work…
⤷ Title: Network Detection and Response (NDR): The Modern Art of Adversary Detection
════════════════════════
𐀪 Author: Meriem
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:34:51 GMT
════════════════════════
⌗ Tags: #cybersecurity #ndr
════════════════════════
𐀪 Author: Meriem
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:34:51 GMT
════════════════════════
⌗ Tags: #cybersecurity #ndr
Medium
Network Detection and Response (NDR): The Modern Art of Adversary Detection
Released by :
⤷ Title: ⚙️ Inside the Linux Engine Room — Why It Dominates Cybersecurity and DevOps
════════════════════════
𐀪 Author: Zoningxtr
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:31:14 GMT
════════════════════════
⌗ Tags: #linux #coding #web_development #learning_to_code #cybersecurity
════════════════════════
𐀪 Author: Zoningxtr
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:31:14 GMT
════════════════════════
⌗ Tags: #linux #coding #web_development #learning_to_code #cybersecurity
Medium
⚙️ Inside the Linux Engine Room — Why It Dominates Cybersecurity and DevOps
By Zoningxtr
⤷ Title: Jupyter Misconfiguration Lets Attackers Gain Root Access: What Organizations Need to Know
════════════════════════
𐀪 Author: Chetan Seripally
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:29:00 GMT
════════════════════════
⌗ Tags: #cybersecurity
════════════════════════
𐀪 Author: Chetan Seripally
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:29:00 GMT
════════════════════════
⌗ Tags: #cybersecurity
Medium
Jupyter Misconfiguration Lets Attackers Gain Root Access: What Organizations Need to Know
A newly reported security risk has brought attention to Jupyter environments used widely for data science, analytics and machine learning…
⤷ Title: PhantomPi: A Covert Red Team Implant (Part 1)
════════════════════════
𐀪 Author: Alessandro Tagliafierro
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:48:33 GMT
════════════════════════
⌗ Tags: #penetration_testing #offensive_security #red_team #raspberry_pi #implants
════════════════════════
𐀪 Author: Alessandro Tagliafierro
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 17:48:33 GMT
════════════════════════
⌗ Tags: #penetration_testing #offensive_security #red_team #raspberry_pi #implants
Medium
PhantomPi: A Covert Red Team Implant (Part 1)
The thinking and foundation behind a covert implant: why it exists, what it needs, and how the hardware and software are put together.
⤷ Title: MITRE Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:46:17 GMT
════════════════════════
⌗ Tags: #mitre_attack_framework #tryhackme #tryhackme_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:46:17 GMT
════════════════════════
⌗ Tags: #mitre_attack_framework #tryhackme #tryhackme_writeup #tryhackme_walkthrough
Medium
MITRE Walkthrough Notes | TryHackMe
A complete answer guide for the TryHackMe MITRE room.
⤷ Title: Basic Pentesting THM CTF solution documentation
════════════════════════
𐀪 Author: yuyu1847
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:25:31 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #ctf_walkthrough #ctf #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: yuyu1847
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:25:31 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #ctf_walkthrough #ctf #tryhackme_writeup #tryhackme
Medium
Basic Pentesting THM CTF solution documentation
I began this challenge by performing a Nmap scan to detect open ports and services:
⤷ Title: Designing Secure APIs in 2025: Beyond JWTs and OAuth
════════════════════════
𐀪 Author: Harshavardhan Mamidipaka
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:01:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #software_architecture #api_security #fastapi #backend_development
════════════════════════
𐀪 Author: Harshavardhan Mamidipaka
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 16:01:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #software_architecture #api_security #fastapi #backend_development
Medium
🔒 Designing Secure APIs in 2025: Beyond JWTs and OAuth
⚡ Hook
⤷ Title: Authentication Token Stored in localStorage
════════════════════════
𐀪 Author: Abhishek sharma
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 19:36:58 GMT
════════════════════════
⌗ Tags: #bug_bounty #bugs #bug_bounty_writeup #authentication
════════════════════════
𐀪 Author: Abhishek sharma
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 19:36:58 GMT
════════════════════════
⌗ Tags: #bug_bounty #bugs #bug_bounty_writeup #authentication
Medium
Authentication Token Stored in localStorage
Hello Everyone
⤷ Title: Midnight Bounty: How I Found a QA Portal Exposed to the Internet and Got $2,500 Overnight
════════════════════════
𐀪 Author: Vaibhav Kumar Srivastava
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 19:36:20 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #hacking #data #security
════════════════════════
𐀪 Author: Vaibhav Kumar Srivastava
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 19:36:20 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #hacking #data #security
Medium
💰 Midnight Bounty: How I Found a QA Portal Exposed to the Internet and Got $2,500 Overnight
From late-night recon to a $2.5k payout in three hours — here’s how I stumbled upon a full admin portal open to the internet, and what…
⤷ Title: Have You Ever Been Defrauded by Hackerone? You May Be Entitled To A Large Cash Settlement!
════════════════════════
𐀪 Author: Justas_b
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 18:16:51 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #programming #bug_bounty #true_crime
════════════════════════
𐀪 Author: Justas_b
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 18:16:51 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #programming #bug_bounty #true_crime
Medium
Have You Ever Been Defrauded by Hackerone? You May Be Entitled To A Large Cash Settlement!
We all know that H1 is up to some shady shit. And there are many people that have been scammed/defrauded/gaslighted by them over the last…
⤷ Title: BUG BOUNTY — ÖDÜL AVCILIĞI
════════════════════════
𐀪 Author: Ahmet ŞAHİN
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 18:08:41 GMT
════════════════════════
⌗ Tags: #türkçe_yayın #medium_türkiye #bug_bounty #türkçe #türkiye_yayını
════════════════════════
𐀪 Author: Ahmet ŞAHİN
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 18:08:41 GMT
════════════════════════
⌗ Tags: #türkçe_yayın #medium_türkiye #bug_bounty #türkçe #türkiye_yayını
Medium
BUG BOUNTY — ÖDÜL AVCILIĞI
YASAL ETİK HACKER OLMA
⤷ Title: Random digits
════════════════════════
𐀪 Author: Karl Tame
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 18:41:50 GMT
════════════════════════
⌗ Tags: #insurance #hacking #crime #cybersecurity
════════════════════════
𐀪 Author: Karl Tame
════════════════════════
ⴵ Time: Wed, 05 Nov 2025 18:41:50 GMT
════════════════════════
⌗ Tags: #insurance #hacking #crime #cybersecurity
Medium
Random digits
Digital data is more important than ever!