Cyber security

Useful Bug Bounty And Security Related Write-ups : A Comprehensive Guide For Enthusiasts

This repo contains all variants of information security & Bug bounty & Penetration Testing write-up design for beginners or newcomers who are confused or don’t know which keyword to search.

All these articles’ links are fetched from medium.com (A popular blog sharing site for a variety of different interest people)

Note: All of them were generated by an automation tool so maybe inappropriate articles are also included (feel free to avoid them) This repo is still in a development state, so any help or Idea would be appreciated

Contents

Android Application & Related ArticlesAPI Related ArticlesApplication Security Related ArticlesAccount Takeover ArticlesAuthentication & Authorization ArticlesHost Header Injection AttackBlockchain Security Related ArticlesArticles Contains Keyword ‘bounty’Cache Poisoning Related ArticlesClickjacking Related ArticlesCloud Security Related ArticlesCross-Site Request Forgery (CSRF)Data BreachDeserializationDenial of Service (DoS)Graphql HackingArticles Contains Keyword ‘Hacking’Articles Contains Keyword ‘How to’Insecure Direct Object Reference (IDOR) & Broken Access Control IssueArticles Contains Keyword ‘infosec’Injection Related Articles

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Modrinth – A Comprehensive Overview of Tools and Functions

Modrinth is a modern platform that’s rapidly changing the landscape of Minecraft modding, providing an…

7 hours ago

BlackSanta Malware A Stealthy Threat Targeting Recruiters and HR Teams

A new, highly sophisticated malware campaign named BlackSanta has emerged, primarily targeting HR and recruitment…

9 hours ago

Perplexity Launches Personal Computer Features

Perplexity has unveiled an exciting new feature, Personal Computer, which allows AI agents to seamlessly…

16 hours ago

Cyberattack or Smoke and Mirrors? The Truth Behind the Alleged Dimona Nuclear Breach

In a recent cyber incident, a group named CARDINAL, associated with the label Russian Legion,…

1 day ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

5 days ago

Best Linux Distros in 2026

Linux is renowned for its versatility, open-source nature, and security. Whether you're a beginner, developer,…

5 days ago