Cyber security

Useful Bug Bounty And Security Related Write-ups : A Comprehensive Guide For Enthusiasts

This repo contains all variants of information security & Bug bounty & Penetration Testing write-up design for beginners or newcomers who are confused or don’t know which keyword to search.

All these articles’ links are fetched from medium.com (A popular blog sharing site for a variety of different interest people)

Note: All of them were generated by an automation tool so maybe inappropriate articles are also included (feel free to avoid them) This repo is still in a development state, so any help or Idea would be appreciated

Contents

Android Application & Related ArticlesAPI Related ArticlesApplication Security Related ArticlesAccount Takeover ArticlesAuthentication & Authorization ArticlesHost Header Injection AttackBlockchain Security Related ArticlesArticles Contains Keyword ‘bounty’Cache Poisoning Related ArticlesClickjacking Related ArticlesCloud Security Related ArticlesCross-Site Request Forgery (CSRF)Data BreachDeserializationDenial of Service (DoS)Graphql HackingArticles Contains Keyword ‘Hacking’Articles Contains Keyword ‘How to’Insecure Direct Object Reference (IDOR) & Broken Access Control IssueArticles Contains Keyword ‘infosec’Injection Related Articles

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Admin-Panel-Dorks : Mastering Google Dorks To Uncover Hidden Admin Panels

site:*/sign-in site:*/account/login site:*/forum/ucp.php?mode=login inurl:memberlist.php?mode=viewprofile intitle:"EdgeOS" intext:"Please login" inurl:user_login.php intitle:"Web Management Login" site:*/users/login_form site:*/access/unauthenticated site:account.*.*/login site:admin.*.com/signin/…

2 minutes ago

Conduwuit : Pioneering A New Era In Matrix Homeservers

Matrix is an open network for secure and decentralized communication. Users from every Matrix homeserver…

3 minutes ago

LSMS – Linux Security And Monitoring Scripts

Linux Security And Monitoring Scripts are a collection of security and monitoring scripts you can…

3 minutes ago

Fiber – Using Fibers To Run In-Memory Code

A fiber is a unit of execution that must be manually scheduled by the application…

3 minutes ago

XSS-Exploitation-Tool : A Penetration Testing Tool

XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site…

3 minutes ago

Promptmap

Prompt injection is a type of security vulnerability that can be exploited to control the…

2 days ago