⤷ Title: Bandit OverTheWire writeup — Level 17 → Level 18
════════════════════════
𐀪 Author: Dawid Kowalski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:15:12 GMT
════════════════════════
⌗ Tags: #bandit_walkthrough #cybersecurity
════════════════════════
𐀪 Author: Dawid Kowalski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:15:12 GMT
════════════════════════
⌗ Tags: #bandit_walkthrough #cybersecurity
Medium
Bandit OverTheWire writeup — Level 17 → Level 18
There are 2 files in the homedirectory: passwords.old and passwords.new. The password for the next level is in passwords.new and is the…
⤷ Title: Bandit OverTheWire writeup — Level 15 → Level 16
════════════════════════
𐀪 Author: Dawid Kowalski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:13:48 GMT
════════════════════════
⌗ Tags: #bandit_walkthrough #cybersecurity
════════════════════════
𐀪 Author: Dawid Kowalski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:13:48 GMT
════════════════════════
⌗ Tags: #bandit_walkthrough #cybersecurity
Medium
Bandit OverTheWire writeup — Level 15 → Level 16
The password for the next level can be retrieved by submitting the password of the current level to port 30001 on localhost using SSL/TLS…
⤷ Title: Mastering JWT Auth in Laravel from Zero - Part 1
════════════════════════
𐀪 Author: Ali Mousavi
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:23:05 GMT
════════════════════════
⌗ Tags: #php #api_security #jwt_authentication #laravel_framework #backend_development
════════════════════════
𐀪 Author: Ali Mousavi
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:23:05 GMT
════════════════════════
⌗ Tags: #php #api_security #jwt_authentication #laravel_framework #backend_development
Medium
Mastering JWT Auth in Laravel from Zero - Part 1
Set up JWT authentication in Laravel from scratch — no third-party packages, just clean, maintainable code
⤷ Title: OAuth Authentication Bypass leading to PII disclosure
════════════════════════
𐀪 Author: janlele91
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:19:06 GMT
════════════════════════
⌗ Tags: #authentication_bypass #bug_bounty_writeup #bug_bounty_tips #oauth2
════════════════════════
𐀪 Author: janlele91
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:19:06 GMT
════════════════════════
⌗ Tags: #authentication_bypass #bug_bounty_writeup #bug_bounty_tips #oauth2
Medium
OAuth Authentication Bypass leading to PII disclosure
Hi — I’m janlele91, an ethical hacker and pentester based in Vietnam, currently working at Viettel Cyber Security (VCS). I also hunt on…
⤷ Title: From Wooden Ducks to Digital Flags: My First v1t CTF OSINT Challenge
════════════════════════
𐀪 Author: Chetan Chinchulkar
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:31:02 GMT
════════════════════════
⌗ Tags: #ctf #bug_bounty #osint #infosec #cybersecurity
════════════════════════
𐀪 Author: Chetan Chinchulkar
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:31:02 GMT
════════════════════════
⌗ Tags: #ctf #bug_bounty #osint #infosec #cybersecurity
Medium
From Wooden Ducks to Digital Flags: My First v1t CTF OSINT Challenge
When a Halloween decoration becomes your next cybersecurity puzzle
⤷ Title: How I Used AI to Become Someone Else (And Why Your Face Is No Longer Your Password)
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:29:24 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #infosec #hacking #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:29:24 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #infosec #hacking #cybersecurity #bug_bounty
Medium
How I Used AI to Become Someone Else (And Why Your Face Is No Longer Your Password) 🤖🎭
Free Link 🎈
⤷ Title: Capture: A TryHackMe CTF writeup
════════════════════════
𐀪 Author: Huzaifa Malik
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:28:53 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #hacking #bug_bounty #web_security
════════════════════════
𐀪 Author: Huzaifa Malik
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:28:53 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #hacking #bug_bounty #web_security
Medium
Capture: A TryHackMe CTF writeup
Learn how to bypass login form and automate the process using Python script
⤷ Title: The Authorization Circus: Where Security Was the Main Clown
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:22:23 GMT
════════════════════════
⌗ Tags: #infosec #bug_bounty #cybersecurity #bug_bounty_tips #hacking
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:22:23 GMT
════════════════════════
⌗ Tags: #infosec #bug_bounty #cybersecurity #bug_bounty_tips #hacking
Medium
The Authorization Circus: Where Security Was the Main Clown 🤡🎪
Free Link 🎈
⤷ Title: Time-of-check Time-of-use (TOCTOU) Race Condition Leads to Broken Authentication | Critical Finding
════════════════════════
𐀪 Author: Irsyad Muhammad Fawwaz
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:20:19 GMT
════════════════════════
⌗ Tags: #infosec #security #cybersecurity #bug_bounty #information_security
════════════════════════
𐀪 Author: Irsyad Muhammad Fawwaz
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:20:19 GMT
════════════════════════
⌗ Tags: #infosec #security #cybersecurity #bug_bounty #information_security
Medium
Time-of-check Time-of-use (TOCTOU) Race Condition Leads to Broken Authentication
Time-of-check Time-of-use (TOCTOU) Race Condition Leads to Broken Authentication How I started I was bored and started poking at random public bug bounty programs. As usual I began with subdomain …
⤷ Title: Account Takeover via IDOR: From UserID to Full Access
════════════════════════
𐀪 Author: 0xP0L73R63157
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:19:13 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #ethical_hacking #bug_bounty #bug_bounty_tips #information_security
════════════════════════
𐀪 Author: 0xP0L73R63157
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:19:13 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #ethical_hacking #bug_bounty #bug_bounty_tips #information_security
Medium
Account Takeover via IDOR: From UserID to Full Access
After discovering an unauthenticated endpoint leaking sensitive user data in the same application (see my previous writeup here), I had a…
⤷ Title: From 404 to $4,000: Real Bugs Found in Forgotten Endpoints
════════════════════════
𐀪 Author: Monika sharma
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 08:41:04 GMT
════════════════════════
⌗ Tags: #vulnerability #bug_bounty_tips #bug_bounty_writeup #technology #bug_bounty
════════════════════════
𐀪 Author: Monika sharma
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 08:41:04 GMT
════════════════════════
⌗ Tags: #vulnerability #bug_bounty_tips #bug_bounty_writeup #technology #bug_bounty
Medium
From 404 to $4,000: Real Bugs Found in Forgotten Endpoints
Most hunters scroll past a 404. I didn’t and that single dead-looking endpoint turned into a $4,000 bounty.
⤷ Title: From Wooden Ducks to Digital Flags: My First v1t CTF OSINT Challenge
════════════════════════
𐀪 Author: Chetan Chinchulkar
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:31:01 GMT
════════════════════════
⌗ Tags: #ctf #bug_bounty #osint #infosec #cybersecurity
════════════════════════
𐀪 Author: Chetan Chinchulkar
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:31:01 GMT
════════════════════════
⌗ Tags: #ctf #bug_bounty #osint #infosec #cybersecurity
Medium
From Wooden Ducks to Digital Flags: My First v1t CTF OSINT Challenge
When a Halloween decoration becomes your next cybersecurity puzzle
⤷ Title: Time-of-check Time-of-use (TOCTOU) Race Condition Leads to Broken Authentication | Critical Finding
════════════════════════
𐀪 Author: Irsyad Muhammad Fawwaz
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:20:18 GMT
════════════════════════
⌗ Tags: #infosec #security #cybersecurity #bug_bounty #information_security
════════════════════════
𐀪 Author: Irsyad Muhammad Fawwaz
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:20:18 GMT
════════════════════════
⌗ Tags: #infosec #security #cybersecurity #bug_bounty #information_security
Medium
Time-of-check Time-of-use (TOCTOU) Race Condition Leads to Broken Authentication
Time-of-check Time-of-use (TOCTOU) Race Condition Leads to Broken Authentication How I started I was bored and started poking at random public bug bounty programs. As usual I began with subdomain …
⤷ Title: From 404 to $4,000: Real Bugs Found in Forgotten Endpoints
════════════════════════
𐀪 Author: Monika sharma
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 08:41:03 GMT
════════════════════════
⌗ Tags: #vulnerability #bug_bounty_tips #bug_bounty_writeup #technology #bug_bounty
════════════════════════
𐀪 Author: Monika sharma
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 08:41:03 GMT
════════════════════════
⌗ Tags: #vulnerability #bug_bounty_tips #bug_bounty_writeup #technology #bug_bounty
Medium
From 404 to $4,000: Real Bugs Found in Forgotten Endpoints
Most hunters scroll past a 404. I didn’t and that single dead-looking endpoint turned into a $4,000 bounty.
⤷ Title: When AI Hacks AI: The Next Frontier of Cybersecurity You’re Not Ready For
════════════════════════
𐀪 Author: NidoDesigns
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:59:00 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #money #generative_ai_tools #hacking #technology
════════════════════════
𐀪 Author: NidoDesigns
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:59:00 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #money #generative_ai_tools #hacking #technology
Medium
When AI Hacks AI: The Next Frontier of Cybersecurity You’re Not Ready For
The tools meant to protect us are now being turned against us — and it’s happening faster than we realise.
⤷ Title: How I turned Membership into a Paycheck
════════════════════════
𐀪 Author: StvRoot
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:19:53 GMT
════════════════════════
⌗ Tags: #technology #penetration_testing #hacking #programming #cybersecurity
════════════════════════
𐀪 Author: StvRoot
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:19:53 GMT
════════════════════════
⌗ Tags: #technology #penetration_testing #hacking #programming #cybersecurity
Medium
How I turned Membership into a Paycheck
Hacking leaderboard on chess.com to get paid
⤷ Title: CVE-2025–63644: Stored Cross-Site Scripting (XSS) Vulnerability in pH7 Social Dating CMS
════════════════════════
𐀪 Author: Rudransh Singh Rajpurohit
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:04:06 GMT
════════════════════════
⌗ Tags: #ethical_hacking #hacking #penetration_testing #cybersecurity #cve
════════════════════════
𐀪 Author: Rudransh Singh Rajpurohit
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:04:06 GMT
════════════════════════
⌗ Tags: #ethical_hacking #hacking #penetration_testing #cybersecurity #cve
Medium
CVE-2025–63644: Stored Cross-Site Scripting (XSS) Vulnerability in pH7 Social Dating CMS
Will be published in the next 24 hours
⤷ Title: CVE-2025–63645: Stored Cross-Site Scripting (XSS) Vulnerability in pH7 Social Dating CMS
════════════════════════
𐀪 Author: Rudransh Singh Rajpurohit
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:02:05 GMT
════════════════════════
⌗ Tags: #penetration_testing #cve #cybersecurity #ethical_hacking #hacking
════════════════════════
𐀪 Author: Rudransh Singh Rajpurohit
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:02:05 GMT
════════════════════════
⌗ Tags: #penetration_testing #cve #cybersecurity #ethical_hacking #hacking
Medium
CVE-2025–63645: Stored Cross-Site Scripting (XSS) Vulnerability in pH7 Social Dating CMS
“CVE-2025–63645:” is published by Rudransh Singh Rajpurohit.
⤷ Title: I Was Rejected From Every Cyber Internship. This Is My Comeback.
════════════════════════
𐀪 Author: 4yu5h
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 08:04:07 GMT
════════════════════════
⌗ Tags: #tech_career #security_operation_center #cybersecurity #hacking #internships
════════════════════════
𐀪 Author: 4yu5h
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 08:04:07 GMT
════════════════════════
⌗ Tags: #tech_career #security_operation_center #cybersecurity #hacking #internships
Medium
I Was Rejected From Every Cyber Internship. This Is My Comeback.
I have a passion for offensive security, but I couldn’t even get an interview. Here’s my new $0 plan to break into cybersecurity, starting…
⤷ Title: Detecting Joomla Admin GUI Attacks with Wazuh: A Rule-Based Approach
════════════════════════
𐀪 Author: Oliver Roca
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:27:25 GMT
════════════════════════
⌗ Tags: #threat_detection #cybersecurity #joomla #wazuh #information_security
════════════════════════
𐀪 Author: Oliver Roca
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:27:25 GMT
════════════════════════
⌗ Tags: #threat_detection #cybersecurity #joomla #wazuh #information_security
Medium
Detecting Joomla Admin GUI Attacks with Wazuh: A Rule-Based Approach
Joomla remains one of the most popular CMS platforms for small-to-medium businesses. However, its administrator interface is a frequent…
⤷ Title: Set Up Slack Leak Alerts in 60 Seconds
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:02:02 GMT
════════════════════════
⌗ Tags: #incident_response #data_breach #slack #cybersecurity #information_security
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:02:02 GMT
════════════════════════
⌗ Tags: #incident_response #data_breach #slack #cybersecurity #information_security
Medium
Set Up Slack Leak Alerts in 60 Seconds
Get LeakRadar alerts straight into Slack in one minute.