Blog : TryHackMe
Burp Suite: Intruder : TryHackMe
Hacker of the Hill #1 : TryHackMe
Reverse Engineering : 0xinfection
Shakabrah : Offensive Security Proving Grounds (Play)
PicoCTF : Carnegie Mellon University
Security+
An easy bug: The Twitter story : Shriyans Sudhi
The Password Bypass Leads to Full-Account-Takeover : Saransh Saraf
1000$ for Open redirect via unknown technique [BugBounty writeup] : ruvlol
20 Hours, $18, and 11 Million Passwords Cracked : Alice Henshaw
Reset password Token lead to account takeover : Anurag__Verma
Hakluke’s Ultimate OSCP Guide: Part 3 — Practical hacking tips and tricks : Luke Stephens (@hakluke)
How to Get Your First Job as a Hacker : Luke Stephens (@hakluke)
How i was able to steal private files of any user on Larksuite : Imran Nissar
Simple Recon Methodology : Abhinav Pathak
Hunting for Bugs in File Upload Feature Sm4rty
Burp Suite: Other Modules : TryHackMe
Hacker of the Hill #1 : TryHackMe
Reverse Engineering : 0xinfection
Sar : Offensive Security Proving Grounds (Play)
PicoCTF : Carnegie Mellon University
Security+
A tale of zero click account takeover : Veshraj Ghimire
Hacking Android Mobile using Meterpreter : Kapil Verma
My first Google HOF : RV Sharma
Part 2: Easy XSS On Mostly Educational Websites Via Moodle : DarkLotus
Learn365 Challenge Review & Year 2021 in a Nutshell : Harsh Bothra
Open Redirect Vulnerability On Zapier: An Accidental Find : Monish Basaniwal
Bounty Evaluation GitHub = $15,000 US Dollars | Rate Limit : Taniya Agarwal
HOW I GOT MY FIRST RCE WHILE LEARNING PYTHON : Sam
Burp Suite: Extender : TryHackMe
Hacker of the Hill #1 : TryHackMe
Reverse Engineering : 0xinfection
FunBoxEasy : Offensive Security Proving Grounds (Play)
PicoCTF : Carnegie Mellon University
Security+
Python Programming Language : GeeksforGeeks
Perform Information Gathering using Following Tools on the Given Targets-Cyber Sapiens Internship Task-3 : Prajit Sindhkar
IDOR leads to leak Private Details : annonymous
One Click To Account Takeover : M7.Arman
How i was able to bypass Cloudflare for XSS! : hosein vita
Bug Bounty Recon: Horizontal Correlation. : Sm9l
Bug Bounty Recon: Vertical Correlation (and the secret to succeeding). : Sm9l
P1: Easy Access to Grafana Dashboard : Mahendra Purbia (Mah3Sec_)
How a simple manipulation let me buy anything for free? : Mayank Garg
How I bypassed the OTP verification process? Part 1 : Sentinel Recovery
A Web Server For Bug Bounty Hunters (Part 1) : FulPlan Mutasim
This is How I built a Drone with Hacking Machine installed in it : Harjot Singh
Nmap Live Host Discovery : TryHackMe
Nmap Basic Port Scans : TryHackMe
Super-Spam : TryHackMe
Reverse Engineering
Solstice : Offensive Security Proving Grounds (Play)
PicoCTF : Carnegie Mellon University
Security+
Some Tools for Subdomain Enumeration-Cyber Sapiens Internship Task-5 : Prajit Sindhkar
Favorite Hackers and Hacking Groups-Cyber Sapiens Internship Task-1 : Prajit Sindhkar
Oversimplified — Bug Bounty : Ashikka Gupta
Exploiting XSS with Cool Tricks : Ethical Kaps
All your files belongs to Me (An IDOR Story) : Prayas Kulshrestha
P5 to P1: Interesting Account Takeover : Tushar Sharma
Nmap Advanced Port Scans : TryHackMe
ContainMe : TryHackMe
Reverse Engineering
Sumo : Offensive Security Proving Grounds (Play)
PicoCTF : Carnegie Mellon University
100 Days of Code: The Complete Python Por Bootcamp for 2022 : Udemy
Security+
Using Nested Traversal Sequences to Bypass File Path Traversal Defense : Kadalon Security & Intelligence
CRLF (Carriage return Line feed) injection : gokul GV
CVE-2021–3817: From SQLi to plaintext admin password recovery : citril
How I found Reflected XSS on a WebGIS : KhanhCM
UNAUTHORIZED ACCESS LEADS TO PII DATA LEAKAGE : @pullakarthik
SSRF Internal resource accessing & Bypassing Filter (CTF) : Basavaraj Banakar
Automated Scanner Tools-Cyber Sapiens Task-6 : Prajit Sindhkar
OTP Bypass via response manipulation : Hemdeep Gamit
SSRF External Service Interaction for Find Real IP CloudFlare and Leads to SQL Injection : Caesar Evan Santoso
How to Find XSS in Wide Scope : Sahand
External SSRF detected ⚠️ : Shreya Talukdar
The Complete Python Hacking Course: Beginner to Advanced! : Udemy
Reverse Engineering
FunBoxEasyEnum : Offensive Security Proving Grounds (Play)
Nmap Post Port Scans : TryHackMe
PicoCTF : Carnegie Mellon University
Security+
KoTH Hackers : TryHackMe
Research on Log4JShell-CVE-2021–44228-Cyber Sapiens Internship Task-7 : Prajit Sindhkar
Bug Chain leads to Mass Account Takeover! : Shubhayu Majumdar
Bypassed! and uploaded a sweet reverse shell : Ajay Sharma
How to use Burp Suite Rest API? : Siddhanth Dwivedi
Cross-site request forgery (CSRF) : Shubham kumar`
What is Server-Side Template Injection (SSTI)? And its basic deployment. : Tanzil Rehman
The Complete Python Hacking Course: Beginner to Advanced! : Udemy
Reverse Engineering
Geisha : Offensive Security Proving Grounds (Play)
JR Penetration Tester Path : TryHackMe
The Blob Blog : TryHackMe
OverTheWire: Wargames
Security+
Linux Distros used by Security Professionals and Kali Linux Commands-Cyber Sapiens Internship Task -2 : Prajit Sindhkar
My First Bug Bounty Report | POST-based XSS : vFlexo
Accessing Grofers Grafana Instance Using Shodan : Lohith Gowda M
The Story Of How I Bypass SSO Login : zer0d
Accessing GoDaddy internal instance through an email logic bug. : Mostafa Mamdoh
The Complete Python Hacking Course: Beginner to Advanced! : Udemy
Reverse Engineering
Gaara : Offensive Security Proving Grounds (Play)
JR Penetration Tester Path : TryHackMe
Sustah : TryHackMe
OverTheWire: Wargames
Security+
Introduction to Game Hacking! muffin
[IDOR] add or remove the linked publications from Author Publisher settings — Facebook Bug Bounty : Rahul Kankrale
From .git directory to AWS EC2 network takeover : Abdullah AlSolaiman
HTML Injection via user agent leads to website distortion revealing backend code. : Anurag__Verma
SQL Injection - The File Upload Playground Jerry Shah (Jerry)
SQL INJECTION : Mr Void
Bug type: Stored Cross Site Scripting (XSS) and HTML Injection — Part 2 : Vaibhav Kumar Srivastava
2FA Bypass Methodologies : Pratish Bhansali
How I Scored 1K Bounty Using Waybackurls : Sicksec
Playing With Password Reset Function : Tameem khalid
By Pass Two-Factor-Authentication : Ashkan Ebtekari
The Complete Python Hacking Course: Beginner to Advanced! : Udemy
Reverse Engineering
Monitoring : Offensive Security Proving Grounds (Play)
JR Penetration Tester Path : TryHackMe
SafeZone : TryHackMe
OverTheWire: Wargames
Security+
Research on Host Header Injection — Cyber Sapiens Internship Task-11 : Prajit Sindhkar
How I hacked into one of India’s costliest schools! : Vikaran
Email Verification Bypass : khan mamun
Nuclei — The best tool for automating Vulnerability testing. : Nitin yadav
I can change your profile pic on target.com without your knowledge : Gnana Aravind
No Rate Limiting on Forgot Password : Rohit Karande
HACKING Milburg Highschool : Neelesh Patel
OTP Verification Bypass : Nitin dubey
Bug Allowed users to enroll course for free : KumaraGurubaran
Unauthenticated Sensitive Information Disclosure at [REDACTED] : Rizaldi Wahaz
Introduction To Bash For System Administration and Bug Bounty Hunting : Daniel Hunt
The Complete Python Hacking Course: Beginner to Advanced! : Udemy
Reverse Engineering
Seppuku : Offensive Security Proving Grounds (Play)
JR Penetration Tester Path : TryHackMe
SafeZone : TryHackMe
OverTheWire: Wargames
Security+
Authorization bypass — Gmail : 7𝖍3𝖍4𝖈kv157
Research on HTML Injection- Cyber Sapiens Internship Task-9 : Prajit Sindhkar
Hacking Microsoft Forms : Nishith P
AlbusSecurity:- Penetration-list 01 Information Disclosure — Part 1 : Albus Security
IDOR: A BEGINNER’S GUIDE : Sudarshan Sangameswaran
SAP: MY FIRST CYBERSECURITY VIRUTAL INTERNSHIP EXPERIENCE : Sudarshan Sangameswaran
Introduction to IP Addresses for beginners : Sudarshan Sangameswaran
Reverse Engineering
Photographer : Offensive Security Proving Grounds (Play)
JR Penetration Tester Path : TryHackMe
One Piece : TryHackMe
OverTheWire: Wargames
Security+
Research on XML eXternal Entity Injection (XXE)-Cyber Sapiens Internship Task-10 : Prajit Sindhkar
The Story Of How I Bypass MAC Filter : zer0d
My CVE that will never be — [0day write-up] : Ignatius Michael
Insecure deserialization : gokul GV
Host Header Injection Lead To Account Takeover : M7.Arman
P1 Vulnerability: How I chained Logical-Error to Account-Takeover Vulnerability 😈🧑💻that No-One said you before😁 : Gowtham_Naidu
The Implementation plan for hacking: What not to do and where : Manas Harsh
Nailing automation with Bash: Core concepts and implementations : Manas Harsh
Security+ (SY0-601) : Linkedln Learning
Reverse Engineering
SunsetDecoy : Offensive Security Proving Grounds (Play)
JR Penetration Tester Path : TryHackMe
Reverse Engineering : TryHackMe
OverTheWire: Wargames
InCTF pro finals 2021: Look deeper writeup : Yuvarajan
A TALE OF 5250$: HOW I ACCESSED MILLIONS OF USER’S DATA INCLUDING THEIR ADDRESS AND PERSONAL INFO Sam
COOKIES: AN EYE-OPENING GUIDE : Sudarshan Sangameswaran
Authentication Bypass & ATO : Karthik
How To Hack Any Website : Niveet Palan
Admin Login Bypass in a Coaching system : A.R shukla
Cross-Origin Resource Sharing (CORS) Misconfiguration leads to User’s PII leaks. : Tarikul Islam
Low-Level Hacking : muff-in
Security+ (SY0-601) : Linkedln Learning
FunBoxRookie : Offensive Security Proving Grounds (Play)
CompTIA Pentest+ Path : TryHackMe
OverTheWire: Wargames
Looking Glass : TryHackMe
My write-up in hacking IBM’s administration panel and getting SQLi on it : Momen Ali (Cyber Guy)
Params — Discovering Hidden Treasure in WebApps : Kathan Patel
Finding and Exploiting Path traversal in apache 2.4.49 http server [CVE-2021–41773] : Joy Ghosh
IDOR on Password Change Leads to Mass Account Takeover : Naufal Ardhani
Get your own Hacking VPS for free in 2022!! : Blackstorm Hacker
Account Takeover with the Ability to Bypass Email Verification : RtwoGatelie
Hacking the Dutch Government : Vedant Shinde
Low-Level Hacking : muff-in
Security+ (SY0-601) : Linkedln Learning
Vegeta1 : Offensive Security Proving Grounds (Play)
CyberSploit1 : Offensive Security Proving Grounds (Play)
CompTIA Pentest+ Path : TryHackMe
MetaCTF
Python for Pentesters : TryHackMe
Inferno : TryHackMe
STORED XSS : @pullakarthik
Bug Bounty Recon: Fingerprinting : Sm9l
Hunting for Bugs : Mridulkakkar
Bypassed! and uploaded a sweet reverse shell : Ajay Sharma
XSS via Exif Data - The P2 Elevator : Jerry Shah (Jerry)
Low-Level Hacking : muff-in
Security+ (SY0-601) : Linkedln Learning
PyExp : Offensive Security Proving Grounds (Play)
CompTIA Pentest+ Path : TryHackMe
MetaCTF
Road : TryHackMe
EscapeRoom — PCAP Analysis with Wireshark : Hacktivities
Unauthenticated Access To MongoDB Database of Oracle Corporation : Pratikkhalane
How to use grep with regex like a Pro! : Rahul Bhichher
The Roadmap to become an Ethical hacker : Ahmet Göker
A strategy to land your first pentest job : PentesterLab
How to Check Subdomains are Active or Not : Ravindra
Low-Level Hacking : muff-in
Security+ (SY0-601) : Linkedln Learning
Inclusiveness : Offensive Security Proving Grounds (Play)
Undiscovered : TryHackMe
Buffer Overflows : TryHackMe
PHP Type Juggling : Shubham kumar`
Unrestricted File Upload (Cloud fare Bypass ) : KidBuU_04A0
Shuffling the codes: Reasons you must learn programming for finding great bugs : Manas Harsh
From Simple Recon to Reflected XSS : Mohamed Dhanish
I Find Reflected Xss in Javatpoint : Subhadeep Kundu
Bug Bounty Recon — Horizontal Enumeration : Aaryan
Security+ (SY0-601) : Linkedln Learning
Lampiao : Offensive Security Proving Grounds (Play)
Introduction to Honeypots : TryHackMe
HA Joker CTF : TryHackMe
CCDC Research
Windows Lockscreen Elevation of Privilege Vulnerability — CVE-2020–1398 : TutorialBoy
Bug Type: HTML injection in confirmation Email ! : Vaibhav Kumar Srivastava
Bypassing HttpOnly with phpinfo file : Aleksi Kistauri
Bypassed the subscription and got the certification : Ramalingasamy
The Absolute Beginners Guide to Cyber Security 2021 - Part 2 : Udemy
Dawn : Offensive Security Proving Grounds (Play)
CCDC Research
History of Malware : TryHackMe
NerdHerd : TryHackMe
Security+ (SY0-601) : Linkedln Learning
Bruteforce Protections Bypass : vFlexo
How I got Reflected Cross Site Scripting(RXSS) on Manchester Metropolitan University : Santosh Bobade
How I Got An Appreciation Letter From Harvard University : Santosh Bobade
How i was able to see Sensitive Information on One of the India’s best School Website. : Vikas Anand
Trusting Pre-domain Wildcard as Origin CSRF Attack — Devfolio : Monish Basaniwal
nginx merge slashes path traversal : Mohammed Amer
XSS Filter Evasion + IDOR : 0xEchidonut
The Absolute Beginners Guide to Cyber Security 2021 - Part 2 : Udemy
Ha-natraj : Offensive Security Proving Grounds (Play)
That's The Ticket : TryHackMe
Red Team Threat Intel : TryHackMe
Security+ (SY0-601) : Linkedln Learning
Bug Bounty Recon: Content Discovery (Efficiency pays $) : Sm9l
How I Scored 2K Bounty via an IDOR Sicksec
My Pentest Log -1 - : Hamit CİBO
Subdomain Enumeration — The Right way (Prerequisites) : Aaryan
LOCAL FILE INCLUSION(LFI): AN OVERVIEW : Sudarshan Sangameswaran
Ethical Hacking Roadmap and Resources : Inderjeet Singh - rashahacks
OnSystemShellDredd : Offensive Security Proving Grounds (Play)
Wpwm : Offensive Security Proving Grounds (Play)
Minotaur's Labyrinth : TryHackMe
Shodan.io : TryHackMe
Security+ (SY0-601) : Linkedln Learning
CCDC Meeting
KnightCTF
Day3, Computer Networks — 100DaysofHacking Ayush Verma
SONY Hunting I: Discovering Hidden Parameters (5x SWAG) can1337
ALL PortSwigger SSRF Labs: Server-side request forgery | WalkThrough : WraithOP
How I Scored 1K Bounty Using Waybackurls : Sicksec
How I Find Blind XSS On a Famous Platform : Amallnamd
HaskHell : TryHackMe
hackerNote : TryHackMe
Security+
Bottleneck : Offensive Security Proving Grounds (Play)
KnightCTF
Research on Clickjacking & Network Sniffing- Cyber Sapiens Internship Task-13 : Prajit Sindhkar
TCAPT: DLL Hijacking : Pranay Bafna
Day 4, CN-Network Topologies #100DaysofHacking Ayush Verma
Three different types of SQL injection in one POST parameter : Sarathlal Srl 🇮🇳
Static website Black-Box testing to admin authentication bypass!!! : Un9nplayer
Misconfigured Social Login(OAuth) Leads to Permanent account access : Hemdeep Gamit
Account takeover via stored XSS with arbitrary file upload : 0xbadb00da
Born2Root : Offensive Security Proving Grounds (Play)
ffuf : TryHackMe
Madeye's Castle : TryHackMe
Research on CORS Misconfiguration- Cyber Sapiens Internship Task-12 : Prajit Sindhkar
XYZ of XSS : vFlexo
My Bug Bounty Adventure -1- : Hamit CİBO
[CVE-2021–44855] Blind Stored XSS in VisualEditor media dialog at Wikipedia : Aidil Arief
Finding CSRF Vulnerabilities with BurpSuite : Kaorrosi
How I found High-Priority PII leak through web archive : Aditya Singh
Day5 CN-Subnetting #100DaysofHacking : Ayush Verma
Deception : Offensive Security Proving Grounds (Play)
Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019) : freeCodeCamp.ord
Multi XSS Exploit in Upload File : M7.Arman
Malicious file upload leads to off-domain XSS : @pullakarthik
\\ Reflected+Self XSS to Stored XSS // : Abde Ouabala
Exploiting basic SQL vulnerability. : Sanduni Fernando
Building an exploit for CVE-2018-19410 : Quan Doan
My First Blind XSS : Mohit Ahir
The New King “Broken Access Control” : Aravind_a2d
Password Attacks : TryHackMe
KnightCTF
Ghizer : TryHackMe
FunBox : Offensive Security Proving Grounds (Play)
Discovering File Inclusion Vulnerabilities : Kaorrosi
Time-Based SQL Injection to Dumping the Database : Sarathlal Srl 🇮🇳
Bypassed the subscription and got the certification : Ramalingasamy
Interesting Test Cases of File uploading vulnerabilities : Akash Venky
How i found reflected xss on public program : Raj Kumar S
Common Attacks : TryHackMe
KnightCTF
Willow : TryHackMe
Loly : Offensive Security Proving Grounds (Play)
Security+
National Cyber Drill 2021 : Reverse Engineering challenges writeup : 0xRobin
Powering the Lamest: Self-XSS FTW! : SecurityGOAT
Day6 CN-ARP and DHCP Protocol #100DaysofHacking Ayush Verma
Day 7 CN-OSI Model #100DaysofHacking Ayush Verma
Day 8 CN- TCP/UDP #100DaysofHacking Ayush Verma
En-pass : TryHackMe
MetaCTF
Deja Vu : TryHackMe
SoSimple : Offensive Security Proving Grounds (Play)
Horizontall : HackTheBox
Security+
What I learnt from reading 220* IDOR bug reports. : Sm9l
Fuzzing is always fun..!! : @pullakarthik
PortSwigger Lab: Web shell upload via path traversal | WalkThrough : WraithOP
My Pentest Log -4- : Hamit CİBO
Data Exfiltration with some FUN XSS Tricks : SecurityGOAT
How to hack a Web App {mini-series} Part 1: Footprinting a web infrastructure : Janero Washington
Keldagrim : Offensive Security Proving Grounds (Play)
Keldagrim : TryHackMe
CCDC Meeting
How I was able to take over accounts in websites deal with Github as an SSO provider : Khaled Mohamed
HOW I hacked thousand of subdomains : MoSec
First Valid BUG Finding At Microsoft And I Got the Acknowledgments Page Microsoft : Aidil Arief
A TALE OF 5250$: HOW I ACCESSED MILLIONS OF USER’S DATA INCLUDING THEIR ADDRESS AND PERSONAL INFO : Sam
Xiaomi Execute Arbitrary JavaScript : Neilmark Ochea
Security+ : Jason Dion
Assertion101 : Offensive Security Proving Grounds (Play)
GoldenEye : TryHackMe
PowerShell for Pentesters : TryHackMe
Previse : HackTheBox
How I was able to find multiple vulnerabilities of a Symfony Web Framework web application : Abid Ahmad
Types of Network Security Tools : Ahmet Göker
Vulnhub: XSS AND MYSQL FILE (Walkthrough) : Shay her
My way to Recon strategy : Arun Nagath
Day 9 CN- Network Security Devices #100DaysofHacking : Ayush Verma
Day 10: All About DNS #100DaysofHacking : Ayush Verma
Chronicle : TryHackMe
Cicada-3301 Vol:1 : TryHackMe
Granny : HackTheBox
Day 16, Web Reconnaissance Or Information Gathering — Part 1#100DaysofHacking : Ayush Verma
Exploring Ghidra with Baby ELF : Ax1al
Introduction to the x86 architecture : Gaurav yadav
1st Bug Bounty WriteUp: Open Redirect To XSS on Login Page : Nassim Chami
500$ Bug: Sensitive Data Exposure to Broken Access Control leads, How I able to take over any account of India’s Biggest College Ever.👨💻 : Gowtham_Naidu
Security+
Stapler : Offensive Security Proving Grounds (Play)
Lunizz CTF : TryHackMe
Intro to Pwntools : TryHackMe
ScriptKiddie : HackTheBox
A Summary of OAuth 2.0 Attack Methods : TutorialBoy
Setting up a Free VPS for Bug Bounty & More : Nafish Alam
SQL INJECTION: IMPORTANT THINGS YOU NEED TO KNOW RIGHT NOW! : Sudarshan Sangameswaran
How To Hack Any Website [ Part — 1] : Niveet Palan
Bug Bounty Methodology - Web Vulnerabilities Checklist : Aaryan
Security+
Revenge : Offensive Security Proving Grounds (Play)
Revenge : TryHackMe
ScriptKiddie : HackTheBox
Horizontall : HackTheBox
BASICS OF WEB SECURITY/HACKING : Sudarshan S
Beginner Bug Bounty Guide - Part 1 : Takshil Patil
HOW HACKERS ARE CHANGING LIVES : Dheeraj Madhukar
Unauthenticated Cache Purge : Priyansh Bansal
Bug Bounty Bootcamp — Ch07: Open Redirects : SecurityGOAT
Writeup : HackTheBox
Tre : Offensive Security Proving Grounds (Play)
battery : TryHackMe
CCDC Meeting
Rig Exploitation Kit Infection — Malware Traffic Analysis : Hacktivities
Understanding Steganography for Capture The Flag Challenges : hac#
2fa Bypass by changing Request method : Arth Bajpai
Unauthenticated Access To MongoDB Database of Oracle Corporation : Pratikkhalane
Everything about my 1st Bounty. : Akash Gaikwad
Cooctus Stories : TryHackMe
Arctic : HackTheBox
Shocker : HackTheBox
Tre : Offensive Security Proving Grounds (Play)
How I exposed the teacher’s Aadhaar card, bank details on the college website. : Ramalingasamy
The Story of an RCE on a Java Web Application : LIL NIX
Beginner Bug Bounty Guide - Part 3 : Takshil Patil
SSL Enumeration Raghav
How I Hacked Kerala Road Transport Corporation(KSRTC)? : Krishnadev P Melevila
Security+ : Jason Dion
Metamorphosis : TryHackMe
Forest : HackTheBox
HAWordy : Offensive Security Proving Grounds (Play)
My Experience of Hacking Dutch Government : Mehedi Hasan Remon
My experience of Hacking The Dutch Government : Sanyam Chawla (Phenomenal)
Password Spraying Attack 🚿 : Darshan Jogi
OSINT Tips for Penetration Testing : Cristian Cornea
Day 15, All About Burp Suite #100DaysofHacking Ayush Verma
Security+
Zeno : TryHackMe
Forest : HackTheBox
Netmon : HackTheBox
Y0usef : Offensive Security Proving Grounds (Play)
What is Google Dorks? Use google Search Like A PRO IN 2022. : Hackfreaksofficial
IDOR vulnerability on invoice and weak password reset leads to account take over : Damaidec
DVWA : HIGH XSS’s VULNERABILITY TESTING : clonewriter
Testing for Local File Inclusion Vulnerability-Part 1 : Mysticscripter
Stored XSS by bypassing signature : Abdulrahman Makki | عبدالرحمن مكي
Windows Poisoning(hacking and preventing) : Ahmet Göker
Security+
0day : TryHackMe
Dear QA : TryHackMe
Netmon : HackTheBox
Y0usef : Offensive Security Proving Grounds (Play)
Day 17, Web Reconnaissance Or Information Gathering — Part 2#100DaysofHacking : Ayush Verma
Bypassing 2FA With Cookies! : Xstag0
Pass the Hash Attack : Security Lit Limited
All About CSRF Flaw : Xcheater
How to Exploit Pwnkit: CVE-2021–4034? : Siddhanth Dwivedi
Break Day
Security+
Beginner Track : HackTheBox
Hamlet : TryHackMe
Pwned1 : Offensive Security Proving Grounds (Play)
Heist : HackTheBox
The Time Machine — Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not : Anmol K Sachan
So You Want To Be A Hacker: 2022 Edition : TCM Security
SONY Hunting I: Discovering Hidden Parameters (5x SWAG) : can1337
I Hacked Every Single Staff Account on AirIndia within 1.5 Minutes :) : Saransh Saraf aka (MR23R0)
First Time Hacking The Cloud : Shellbr3ak
How I was able to buy a product for free — $$$ : Radian ID
OTP bypass via response manipulation : Jan Jeffrie Salloman
Red Team Fundamentals : TryHackMe
BTRSys2.1 : Offensive Security Proving Grounds (Play)
OpenAdmin : HackTheBox
Mutation XSS : Anmol Bagul
Unvalidated Redirects and Forwards : Security Lit Limited
Microsoft Teams Information Disclosure Satyam Singh
How I find My first Critical Bug Worth $2500–5000 : Saransh Saraf aka (MR23R0)
IDOR with Autorize! : Vivek Ghinaiya
Security+
Investiation Windows : TryHackMe
My-CMSMS : Offensive Security Proving Grounds (Play)
Mirai : HackTheBox
What I’ve learned from hunting bugs for 2 months? : Debprasad Banerjee
Why do you suck at hacking? (Underrated) : Debprasad Banerjee
How I hacked IIT(K) : Debprasad Banerjee
How I Found A Simple Stored XSS : How I Found A Simple Stored XSS
Bypass File Upload Restrictions : Surendra Choudhury
Day 20, Web Reconnaissance Or Information Gathering — Part 5#100DaysofHacking Ayush Verma
Security+
Linux Server Forensics : TryHackMe
Assertion 101 : Offensive Security Proving Grounds (Play)
Paper : HackTheBox
Everything you need to know about clickjacking : Andrea
Full Account takeover (ATO) — a tale of two bugs : Kwadwo Amoako
Rce via Image (jpg,png) File Upload..! : Un9nplayer
Server-Side Request Forgery to Internal SMTP Access : Muh. Fani Akbar
Traps for Hackers : Hackfreaksofficial
My Pentest Log -5- : Hamit CİBO
Develpy : TryHackMe
Powergrid : Offensive Security Proving Grounds (Play)
First Bug Bounty Program found CORS (Cross Origin Resource Sharing ) Misconfiguration : Pritesh Gurjar
Price Tampering | Buying T-Shirts at 2 INR : vFlexo
Hacking into school management systems. Reflected XSS To RCE : Brandon Roldan
100 Days of Hacking — DAY 1 : Balaji Anbalagan
2FA Bypass Techniques : Aaryan
SQL Injection, Reflected XSS and Information Disclosure in one subdomain in just 10 minutes : Mahmoud Hamed
Security+ : University Security+ Study Group Session
SQLMAP : TryHackMe
Massive Users Account Takeovers(Chaining Vulnerabilities to IDOR) : Anurag__Verma
Subdomain Takeover : TECHNOXI
Let’s do a peek inside the admin’s dashboard: Abuse API endpoint : Bhavik kanejiya
Day 22 Cross-Site Scripting — Part 1 #100DaysofHacking : Ayush Verma
Windows Fundaments 2 : TryHackMe
Windows Forensics 1 : TryHackMe
Beginner Track : HackTheBox
Security+ : Jason Dion
vulnerable API(vAPI) writeup : Jyotiagarwal
How to manually exploit SQL Injection? : Anmol Bagul
Sensitive Data Exposure : My First Bug in H1 : RajKumar
100 Days of Hacking — Day 8 : Balaji Anbalagan
Day 23 Cross-Site Scripting - Part 2#100DaysofHacking : Ayush Verma
Windows Fundamentals 3 : TryHackMe
Nest : HackTheBox
Gitroot : Offensive Security Proving Grounds (Play)
Security+
MOST POPULAR PENETRATION TESTING TOOLS IN KALI UNIX : rootissh
Hacking the Margheriti-Server — PwntillDawn CTF : Kwadwo Amoako
Dear QA TryHackMe Walkthrough : Musyoka Ian
100 Days of Hacking - Day 9 : Balaji Anbalagan
Splunk : TryHackMe
Beginner Track : HackTheBox
GlagowSmile : Offensive Security Proving Grounds (Play)
The devil is in the details — Authentication Bypass : Taha
Broken Link Hijacking - Mr. User-Agent : Jerry Shah (Jerry)
A tale of 0-Click Account Takeover and 2FA Bypass. : Firas Fatnassi
100 Days of Hacking - Day 11 : Balaji Anbalgan
Red Teaming - My first physical assessment : chrismeistre
baby todo or not todo : HackTheBox
Splunk : TryHackMe
GlagowSmile : Offensive Security Proving Grounds (Play)
PortSwigger Lab: Web shell upload via Content-Type restriction bypass | WalkThrough : WraithOP
Wireless Hacking : Ahmet Göker
How to access Ransomware sites? Aaryan
MY FIRST VALID BUG BOUNTY IN HACKERONE PROGRAM AND MY FIRST $500 BOUNTY Blublue
Break Day
NCAE Cyber Games Training
CMSpit : TryHackMe
Bug Bounty — Bypassing Endpoints Aaryan
Directory Listing Vulnerability - Cyber Sapiens Internship Task-16 : Prajit Sindhkar
Top 10 API Bugs — Where To Find Them Aaryan
No Rate Limiting Vulnerability & Bypasses - Cyber Sapiens Internship Task-17 : Prajit Sindhkar
NCAE Cyber Games Training
Security+ : University Security+ Study Group Session
CCDC Training
CMSpit : TryHackMe
File Inclusion Vulnerabilities - Cyber Sapiens Internship Task-19 : Prajit Sindhkar
Bug Bounty: My First Five Figure Payout : Anton Subbotin (skavans)
How I earned $9000 with Privilege escalations : JunoonBro
Remote Code Execution via Exif Data. : Surendra Choudhury
403 forbidden bypass & Accessing config files using a header : ᴠɪꜱʜɴᴜʀᴀᴊʀ
NCAE Cyber Games Training
Security+
Plotted-TMS : TryHackMe
Looking Glass : HackTheBox
Baby Auth : HackTheBox
How I took over the Manager’s account in Bus Booking website. : Ramalingasamy
Insecure Direct Object Reference- Cyber Sapiens Internship Task-18 : Prajit Sindhkar
Hacked Dutch Government Website. All I got was this l̶o̶u̶s̶y̶ cool T-Shirt. : Romesh chander
Bug Bounty: Low Hanging Fruit : Anton Subbotin (skavans)
Content Discovery: Automated and Manual : Kaorrosi
NCAE Cyber Games Training
Paper : HackTheBox
Debug : TryHackMe
Walkthrough — Hacktoria: Geolocation 12 : Sofia Santos
Everything about my 1st Bounty : Akash Gaikwad
[WRITE-UP] Missing rate-limiting. How I was able to add any unowned phone number to my Facebook account? : Shubham Bhamare
HOW TO MANIPULATE COOKIES: AN INFORGRAPHIC FOR HACKERS : Sudarshan S
Subdomain Enumeration and techniques i’ve learned about : Arbaaz Jamadar
CCDC Meeting
Jr Security Analyst Intro : TryHackMe
Binary Heaven : TryHackMe
Security+
10 BEST Ethical Hacking Books [2022 Edition] Jason Willer
How to start a career in Cyber Security with no experience in 2022 : Kashish Charaya
#8 Insecure Deserialization — Security Basics : Fazal
Stored XSS & Blind XSS & HTML Injection on NASA : Harsh Banshpal
Interesting Stored XSS : Faizan Elahi
NCAE Cyber Games Training
harder : TryHackMe
Sense : HackTheBox
Security+
Bypassing Cloudflare's WAF! : Friendly
XSS in hidden input field Faizan Elahi
The Methodology of System Hacking : Janero Washington
The most underrated tool in bug bounty. (and the filthiest one liner possible) Sm9l
You Cant C Me : HackTheBox
Reg : HackTheBox
harder : TryHackMe
NCAE Cyber Games Training
CCDC Meeting
Full account takeover(AT0)-A tale of two bugs : rei_hunt
Day3, Computer Networks - 100DaysofHacking : Ayush Verma
My First Bounty and How Did I Get It? : Aneesha D
MAL: Malware Introductory : TryHackMNe
NCAE Cyber Games Training
Broken Access Control Overview : Gathereisaac
Beginner Bug Bounty Guide - Part 4 : Takshil Patil
Finding someone else’s passwords on Google : Hackfreaksofficial
Cobalt Strike. Beginner’s Guide | 1 part : Hackfreaksofficial
Chase : HackTheBox
CCDC Meeting
Flatline : TryHackMe
Python Programming
Reverse Engineering 101 - Introduction to IDA PRO: Reversing/Patching a Binary from crackmes.one : Busra Demir
1: Overwriting Variables on the Stack (pt 1) - Buffer Overflows - Intro to Binary Exploitation (Pwn) : CryptoCat
Zero XP to OSCP: 6 Month Challenge. : HackTheBridge
My story : How I get started in Cyber Security & How can you… : Akshat Gupta
My Journey of eJPT : Akshat Gupta
My Top Books to Learn Malware Analysis and Reverse Engineering : Thomas Roccia
Security+
Reading HackTheBox Solved Boxes Notes : HackTheBox
MAL: Malware Introductory : TryHackMe
NCAE Cyber Games Training
How to become a Pentester Kiran Sethu
(Free) Certifications Available for Security Analyst (SOC) : Gowtham Vishwanath
What Are The Top 5 Hacking Groups? BruteHack
$$$ Bank 🏦Verification Bypass(Broken Object Level Authorisation) : Anurag__Verma
sanitize : HackTheBox
ServMon : HackTheBox
MAL: Malware Introductory : TryHackMe
NCAE Cyber Games Training
Volatility — Memory Image Forensics : Hacktivities
Cobalt Strike. Beginner’s Guide | part 2 : Hackfreaksofficial
How to disable security cameras on any Wi-Fi network Hackfreaksofficial
How I Made $16,500 Hacking CDN Caching Servers — Part 2 : Kevin
Blocky : HackTheBox
OhSINT : TryHackMe
Classic Passwd : TryHackMe
CCDC Meeting
Knowledge of Malware : Abhinav Pathak
Security Misconfiguration☝️ — What you need to know : Ivan Novikov
eCPTX Exam Review by 0xJin : 0xJin
Crackme Challenge: PleaseCrackMe : Avidutt Khantwal
Geolocating Images : TryHackMe
Gallery : TryHackMe
NCAE Cyber Games Training
Bank : HackTheBox
A Weird Price Tampering Vulnerability : vFlexo
Methods to Bypass two factor Authentication : Surendra Choudhury
Introduction to SQL Server Injection : TutorialBoy
Reconnaissance tools for hacking : Ayrat Murtazin
Armageddon : HackTheBox
Vulnet: dotpy : TryHackMe
NCAE Cyber Games Training
How to create a Vulnerable Box : 0xJin
OSINT Series ... Part-1 : mrpentestguy
Wanna Cry Ransomware — A Hacker’s Perspective (Part 1) : apex
How I could’ve bypassed the 2FA security of Instagram once again? : Samip Aryal
Vulnet: dotpy : TryHackMe
NCAE Cyber Games Training
The biggest regret of professional hackers when they were beginners and their advice. 0xdom
How To Start Information Gathering? : Hoax
Is Google A Hacking Database(7 Free Tips)? : Hoax
Qbot Likes to Move It, Move It : THE DFIR REPORT
Exploring Ghidra with Baby ELF : Ax1al
CVE-2021-41773/42013 : TryHackMe
CCDC Meeting
C Programming
Oh My WebServer : TryHackMe
Academy : Hackers Arcade
Oh My WebServer TryHackMe Walkthrough Musyoka Ian
HTTP Request Smuggling: A Primer Katie Horne
[ Directory Traversal attack ] How did I find it using GitHub Fenrir
How Hackers Switch Multiple Locations Every Second? : Stefin Franklin
My First Bug Bounty Reward : Surendra Choudhury
NCAE Cyber Games Training
The Marketplace : TryHackMe
Bike : HackTheBox Starting Point
Security+
Dark Side 126: Using Metasploit to Exploit SMB : Katlyn Gallo
Exposing Millions of IRCTC Passengers' ticket details. : Renganathan
SSRF to a Full Account Takeover (ATO) : Kwadwo Amoako
The best programming languages that you MUST learn for cybersecurity in 2022! : Future Cyber Analyst
No Rate Limiting on Forget Password Page (Email Triggering) Awez Kagdi
Malware Analysis- The art of understanding malware : Krishna Sai Merella
OSCP — Cracking The New Pattern : Jai Gupta
Security+
Basic Malware RE : TryHackMe
Buff : HackTheBox
CCDC Meeting
Information Gathering — First Step towards Website Hacking : Gourav Dhar
Learning Resource for Hackers : Abhinav Pathak
CEH-PRACTICAL Exam writeup : Lakshmi Jaswanth Kellampalli
Learning C with gdb : Alan O'Donnell
Security+
Basic Malware RE : TryHackMe
What is IDOR Vulnerability, and how does it affect you? : c0d3x27
[project]Gain Access to the Target System using Trojans : Takahiro Oda
Phishing like a Hacker : Ángel Cortez
Beginner Bug Bounty Resources : Spoilyzer
Break Day
Security+ : Examcompass
dvCTF
Love : HackTheBox
Host Header Injection Leads To Pre-Account Takeover Worth 100$ : Rupachandrans
Admin access !! : th3.d1p4k
WhatsApp Bug Bounty: Bypassing biometric authentication using voip : Arvind
How to Make Ransomware with Python : Febi Mudiyanto
Securing your Linux server with these best practices : Security Lit Limited
Response Manipulation leads to Account Takeover : MikeChan
Empline : TryHackMe
Security+ : Examcompass
UTCTF
Website hacking with Google : Hackfreaksofficial
How to get started into CTF for beginners : Mukilan Baskaran
Top 6 books to learn Cybersecurity for Beginners in 2022 : Future Cyber Analyst
How to become an amazing hacker : Thexssrat
4300$ Instagram IDOR Bug (2022) : Nawaf Alkhaldi
eJPT-eLearnSecurity Junior Penetration Testing Exam Guide. : Tarun Garg
Unstable Twin : TryHackMe
Security+
CyberStart: America
Validation : HackTheBox
A Tale of Open Redirection to Stored XSS : Tushar Sharma
OTP bypass via response manipulation and brute forcing. : Rudram Saraf
Gold Bug Bounty Resources | Web Application, Android & iOS Security : Subh
Information Gathering in Penetration Testing : Ayush Verma
Abusing Forgot Password Functionality : Gupta Bless
Nunchucks : HackTheBox
Dirty Pipe: CVE-2022-0847 : TryHackMe
Academy : Hackers Arcade
PicoCTF
Security+
Shocker From Hackthebox : hac#
How Did I Leak 5.2k Customer Data From a Large Company? (via Broken Access Control) : can1337
VulnHub: Kioptrix Level 1 : 0xNirvana
Cybersecurity Bible: The 5 rules for every beginner. : Debprasad Banerjee
Security+
Nunchucks : HackTheBox
>Dirty Pipe: CVE-2022-0847 : TryHackMe
Dirty Pipe: CVE-2022-0847 : TryHackMe
PicoCTF
How I bypassed disable_functions in php to get a remote shell : Asem Eleraky
Rate Limit Bypass at Readme.com : Girishbo
Open Redirect in Starbucks : Jagannathrajput
Pentesting Tools to Know : Abhinav Pathak
My OSCP Journey: Passing the New Pattern of the Exam in the First Ever Attempt : Ratnakar Singh
How I Passed OSCP with 100 points in 12 hours without Metasploit in my first attempt : Adithyan AK
OTP Bypass and Account Takeover at Rajagiri Hospital : Krishnadev P Melevila
Security+
Active : HackTheBox
Mindgames : TryHackMe
PicoCTF
Intro to Binary Exploitation (Pwn) - Practical Buffer Overflow Challenges (for beginners) : CryptoCat
SQL Injection at Spotify : Eslam Aki
How I Hacked NASA to execute arbitrary commands in their server! : Harish SG
All about Account Takeover : Xcheater
Exploiting weak 2FA : Gupta Bless
Introduction To Buffer Overflows from absolute beginning : Rishiraj Singh
Attacking Active Directory: 0 to 0.9 : Eloy Pérez González
Security+
Academy : Hackers Arcade
VulnNet: Active : TryHackMe
Valentine : HackTheBox
Ngrok for Penetration Tester’s : Alexis Rodriguez
Merlin C2: The Basics : Alexis Rodriguez
Beginner Bug Bounty Journey : Cyb3rWulfengrav
How I Made The BBC Hall Of Fame 3 Times : Tobydavenn
Hack WiFi Router Passwords using Brute-Force Attacks : Gourav Dhar
Security+
Scanning All The Things with ProjectDiscovery’s Nuclei : Alexis Rodriguez
Pentesting: The Relevance, Top 10 Tools, And More : Varsha Paul
How to Learn Hacking? My Path! : ZeusCybersec
Yamagata XSS journey : Pragya Gupta
Attacking Active Directory & Kerberoasting : ZeusCybersec
Break Day
VulnNet: Active : TryHackMe
Security+
BountyHunter : HackTheBox
NCAE Cyber Games Training
How To Pass the OSCP – a Beginner Friendly Guide : KentoSec
How to start information gathering? : Haox
My journey so far and how I got into hacking : ShreKy
Everyday-Cyber : Thirukrishnan
Active Directory penetration testing cheatsheet : John Snow
Security+
BountyHunter : HackTheBox
Top Ethical Hacking Tools and Software for 2022 : Surendra Choudhury
For the first Bounty, it takes a few challenging months, but only a few days for the second. : Aneesha D
My First Blind SQL Injection : T VAMSHI
The Basics of Pentesting : Ryan
Bypassing Passwords Through Reverse Engineering : Mehmet Yavuz Yağış
BountyHunter : HackTheBox
Introduction to Active Directory : HackTheBox Academy
Security+
OSCP Preparation : YevhSec1
Sensitive Information disclosure through unrestricted Directories : T VAMSHI
How to not be a script kiddie in 2022 : Falken Smaze
How I created an undetectable Backdoor for Windows — Ethical Hacking : Gourav Dhar
Pivoting OSCP: Chisel & Proxychains : YevhSec1
Introduction to Active Directory : HackTheBox Academy
Antique : HackTheBox
Security Awareness : TryHackMe
Security+
A Brief Analysis of Saas, PaaS, and IaaS of Enterprise Cloud Services : TutorialBoy
Cyber Security Career Roadmap 2021 : Abhinav Pathak
($$$) Broken Authentication and IDOR at [REDACTED] : Rizaldi Wahaz
Hackers find a new way to make Malware Undetected on Windows : rootissh
Buffer Overflow Preparation for OSCP : YevhSec1
Introduction to Active Directory : HackTheBox Academy
NCAE Cyber Games
Authentication bypass using root array : Eslam Akl
Cybersecurity in 2022: What to Focus on : Rishi on Security
Beginner’s Guide To Netcat for Hackers HackTheBridge
Structuring a Penetration Test Report : Ángel Cortez
Planning Your First Ethical Hack on a Corporate Network : Ángel Cortez
NCAE Cyber Games Competition
eJPT Journey : Naman Jain
How I Beat The New OSCP Exam (But Nearly Failed) : Daan Storm van Leeuwen
An Introduction to Networking for Hackers. : HackTheBridge
What I learnt from ranking in the top 11% of hackers : Skanda Vivek
Embedding backdoor into PDF files : David Artykov
Getting Started : HackTheBox Academy
The National Cyber League
Laboratory : HackTheBox
Security+
eJPT Experience [sys41x4] : Arijit Bhowmick
Less than 6 months!?! : Alexander Plog 🕵🏻💻🥷🏻
UTCTF 2022 - Writeup : Vishnuram Rajkumar
Why I recommend Hackthebox : Kavishka Gihan
How I Become a Government Official Using a Vulnerability. : Krishnadev P Melevila
Getting Started : HackTheBox Academy
Security+
Access : HackTheBox
Top 5 projects to do on a Raspberry Pi : Nuno Bispo
XSS using response manipulation. : Jaspreet Singh 0xInfected
Fastest Free Blue-Team Home Lab Set-Up : Jeramiah Poff
How i exploited SQL Injection to SQL Shell within 15 minutes. : Sahil Ojha🇳🇵
UTSA Cyber Range Session
Computer Security Association Meeting
Nettitude CTF
Introduction To Penetration-List : Albus Security
One Month Bug Bounty Journey Update : lostsoulofawolf
AfricaHackon 2021 CTF Finals : Trevor saudi
What is Zero-Knowledge Proof? : Bahuguna
Getting Started : HackTheBox Academy
Access : HackTheBox
The National Cyber League
VEIL FRAMEWORK(creating RAT) : Ahmet Göker
The World’s First Digital War has just begun! — must read. : J Sai Samarth
Browser-in-the Browser (BITB) — A New Born Phishing Methodology : WeSecureApp
How I got my First Bounty (Open Redirect) : Vamshi Vemula
Buffer Overflow 2 : picoCTF 2022 : Musyoka Ian
Getting Started : HackTheBox Academy
Access : HackTheBox
Introduction to Active Directory : HackTheBox Academy
How I bypassed 403 forbidden domain using a simple trick : Jan Muhammad Zaidi
Google Dork for instant bounties : Debprasad Banerjee
Cybersecurity Bible: The 5 rules for every beginner. : Debprasad Banerjee
My OSCP Journey! : Imtodess
Introduction to Active Directory : HackTheBox Academy
Security+
Teacher : HackTheBox
OTP Bypass and Account Takeover at
Cybersecurity Basics You Need to Know : Raj Bains
What is XXE vulnerability? : kemalfurkanaraci
I scanned the whole country of Israel for git exposed repositories : Ranel Zipor סקיד
The National Cyber League
Security+
Network Enumeration With Nmap : HackTheBox Academy
Bounty : HackTheBox
(Free) Certifications Available for Security Analyst (SOC)- Part 2 : Gowtham Vishwanath
How to be a Hacker? : Octavian Mihail Romanescu
How I created a Trojan Malware — Ethical Hacking : Gourav Dhar
Bounty Hacker Tryhackme : Mukilan Baskaran
My journey reaching #1 on Hack The Box Belgium – 10 tips, tricks and lessons learned. : NVISO Labs
Bounty : HackTheBox
The National Cyber League
Introduction to Networking : HackTheBox Academy
My First Year As a Pentester : DPrice_TheBlogger
How I Got Into Cybersecurity & How You Can Too : DPrice_TheBlogger
I’m A Web Application Penetration Testing- Intern : THE NEURO DIVERGENT HACKER
Cross-Site Scripting (XSS) via image rendering application : Mr Empy
Finding Vulnerable Info Using Google Dorks — Ethical Hacking : Gourav Dhar
What is Distributed Tracing and How does it work? : Securing Lit Limited
How I was able collect PII of all users : Parth Shukla
NSA NCX Cyber Exercise
Setting Up : HackTheBox Academy
Haystack : HackTheBox
Security+
Reconnaissance is the key to success ! : Yash Vardhan Tripathi
[CTF] 1337up CTF writeup- Mirage : Vyshakhari
Response Manipulation leads to Account Takeover : MikeChan
Setup Armitage as a Command & Control (C2) Framework for Free : Febi Mudiyanto
NSA NCX Cyber Exercise
Setting Up : HackTheBox Academy
Computer Security Association Meeting
Cyber Defenders Meeting
Spring4Shell Exploit Walkthrough : Alexis Rodriguez
Subdomain Enumeration Tool -Dome-Cyber Sapiens Internship Task-22 : Prajit Sindhkar
Pyramid Of Pain Security Lit Limited
Exploit Development(Writing a Simple Buffer script) : Ahmet Göker
Another Admin panel : Rizwan_siddiqui
Linux Fundamentals : HTB Academy
Security+
CCDC Meeting
picoCTF 2022- Writeup : Vishnuram Rajkumar
PNPT: Practical Network Penetration Tester — Review : Shaun Whorton
A deep dive into Vulnerability Analysis : Josué Carvajal
Attacking ARP Tables: A Fundamental Networking Attack for Bug Bounty Hunters & Penetration Testers : Daniel Hunt
The National Cyber League
Linux Fundamentals : HTB Academy
OAuth Pen Testing: Part 1 : Alexis Rodriguez
Series of Network Fundamentals #5 (Ports & Protocols),to get started in Cyber Security. : C M UPPIN
An Interesting Rate Limit Bypass.. : CyberXprite
How I Hacked the IRCTC database in 5 mins! : Harish SG
How I Hacked NASA to execute arbitrary commands in their server! : Harish SG
HTTP Request Smuggling on business.apple.com and Others. : Stealthy
Picoctf2022 Forensics Writeups : P4ul Jeremi4h
The National Cyber League
Security+
Starting Point: Responder : HackTheBox
Introduction To Python3 : HackTheBox Academy
Understanding Python 2 Vulnerabilities : Security Lit Limited
OAuth Pen Testing: Part 2 : Alexis Rodriguez
Catching a bug in under 12 minutes : Dasha Korotkykh
How to enumerate SMB (for ethical hackers and pentesters) : Falken Smaze
Beginner Bug Bounty Guide — Part 4 : Takshil Patil
An introduction to RFID hacking : Asutosh Kumar
Break Day
Security+
NSA NCX Cyber Exercise
Starting Point: Responder : HackTheBox
King Of The Hill : TryHackMe
THM: Attacktive Directory : Hacktivities
How a YouTube Video lead to pwning a web application via SQL Injection worth $4324 bounty : Vishal Saini
Beginner Bug Bounty Guide - Part 7 : Takshil Patil
My Own Website Hacking Guide (Active Reconnaissance) : Billy Andrew Amurao
How i got access to 1600k Users PII Data $$$$ : Gokul AP
OSCP Journey: How I Passed OSCP with 100 points in 10 hours : John Chakauya
Introduction To Python3 : HackTheBox Academy
Frolic : HackTheBox
How my Instagram account got hacked: Lessons Learned : AbdulRahman AlHamali
Active Directory Attacks : David Oneill
Enumeration : Ansh Vaid
Must read books for cybersecurity professionals : Vicente Aceituno Canal
Dark Side 122: Intro to Shells & Netcat : Katlyn Gallo
Broken Access Control Logic`s : Akash Venky
NSA NCX Cyber Combat Exercise
Computer Security Association Meeting
The National Cyber League
Web Requests : HTB Academy
Security+
How hackers impersonate email-id’s : Email Spoofing and Phishing Attacks : Gourav Dhar
Basics of API -Cyber Sapiens Internship Task-24 : Prajit Sindhkar
DLithe Cyber Security Internship : Charan Reddy
Get familiar with DNS Hijacking : Akshat Gupta
Hacker Interview #2: Alvin “Steiner254” : Dasha Korotkykh
DCTF
Introduction to Web Applications : HTB Academy
My eJPT Journey : Siddharth Johri
OSCP-JOURNAL : Siddharth Johri
Bypass Rate Limit — A blank space leads to this random encounter! : Roxst4r
BITB (browser in the browser)Attack : Surya Dev Singh
Break Days
Introduction to Web Applications : HTB Academy
OSCP Prep
Lame : HackTheBox
Security+
A blueprint for evading industry leading endpoint protection in 2022 : Vincent Van Mieghem
Intro to Reverse Engineering : Vickie Li
Crazy Simple Insecure Design & 300$ Bounty! : Saransh Saraf aka (MR23R0)
United Nations bug bounty[writeup] : Debprasad Banerjee
Lame : HackTheBox
OSCP Prep
Web Attacks : HackTheBox Academy
Operation Tourniquet : Alexis Rodriguez
Change Any User Profile Details on Disney : Inderjeet Singh - rashahacks
Open Redirection & Broken Link Hijacking : Sathvika
What is ARP in Networking? Figen Adana
PIVOTING & PORT FORWADING : Clement 'Tino
OSCP Prep
Web Attacks : HackTheBox Academy
Frolic : HackTheBox
Python Wireless Network Listener — Where has your devices been? : Vinsloev
SQL Injection in Harvard’s Subdomain : Bibek Neupane
My First Bug Bounty Reward $$$ : Huntsman
Privilege Escalation (Linux) — Part 1 : LumberJohn
Day 12 Internet Security Controls #100DaysofHacking : Ayush Verma
Web Attacks : HackTheBox Academy
OSCP Prep
Full Account Takeover via Open Redirection : vFlexo
OpenCTI Cyber Threat Intelligence Platform Intro : Chad Warner
$1000: How I could have Hack any account and become a billionaire overnight👑Top Crypto-Trading Platform : Gowtham_Naidu
First Bug in Bugcrowd Using Github Dork : abdallah abdelrahman
The First Big Thing in Web Hacking: Authentication : Haox
Account Takeover By Password Reset Function. : RBspider
Beginner's Guide to Becoming a Professional Bug Bounty Hunter : Aravind Akuthota
Learning more about DLL Hijacking : Security Lit Limited
ARP-CACHE-POİSONİNG : Ahmet Göker
DNS over HTTPS Vs DNS over TLS : R. Gupta
Learning Process : HackTheBox Academy
Web Attacks : HackTheBox Academy
Blunder : HackTheBox
Late : HackTheBox
How I Bypassed 2FA while Resetting Password : Sufiyan Gouri
How to prepare Offensive Security Certified Professional (OSCP) Exam : passyourcert
Attacking Service Accounts with Kerberoasting : Nairuz Abulhul
Exploiting Password Reset Poisoning : m8r0wn
Subdomain Takeover and How the things evolved with Domain Verification : Gupta Bless
Blunder : HackTheBox
Late : HackTheBox
National Cyber League
Introduction to Bash Scripting : HackTheBox Academy
AlbusSec:- Penetration-list 02 File Upload Vulnerability — Part-1 : Albus Security
Serialization&Deserialization Attacks : zer0d
How To Hack With Google Dorks : Xstag0
Linux Privilege Escalation in Four Ways : Vickie Li
Timelapse : HackTheBox
Late : HackTheBox
Pwn Zero to Hero : PinkDraconian
University Cyber Security Talk
Generating Username Wordlists : Alexis Rodriguez
How to perform a basic SQL Injection Attack? — Ethical Hacking : Gourav Dhar
Hacking the University in a Few Steps : FHantke
How I could’ve bypassed the 2FA security of Instagram once again? : Samip Aryal
Timelapse : HackTheBox
Joy : VulnHub
PicoCTF
NahamCon CTF 2022
Retired : HackTheBox
Break Day
CompTIA Student Chapter UTSA CTF
NahamCon2022
Meta : HackTheBox
Remote : HackTheBox
Active Directory Enumeration & Attacks : HTB Academy
Domain Takeover with PetitPotam Exploit : Nairuz Abulhul
How to master Google Hacking (Dorking) : Abhinav Pathak
Ethical Hacking Lessons — Building Free Active Directory Lab in Azure : Kamran Bilgrami
Leveraging MITRE tools for effective Threat Informed Architecture : Andre Camillo
Beginner’s Guide of Bug Bounty By Arth Bajpai : Arth Bajpai
Break Day
Remote : HackTheBox
Active Directory Enumeration & Attacks : HTB Academy
How to Build an Active Directory Hacking Lab : The Cyber Mentor
Account Takeover [Using Forgot Password Functionality] : Mohammad Mohsin
LAYER 2 ATTACK : Ahmet Göker
Account Takeover [Via Broken Access Control] : Mohammad Mohsin
KnightCTF-2022 Write-up : Raj Upadhyay
University Finals
Break Day
Intro to Offensive Security : TryHackMe
Intro to Defensive Security : TryHackMe
Tech_Supp0rt: 1 : TryHackMe
Web Application Security : TryHackMe
0x41haz : TryHackMe
Pandora : HackTheBox
Active Directory Enumeration & Attacks : HTB Academy
Bypassing WAF for $2222 : Divyansh Sharma
Passive Reconnaissance Using Only Kali Terminal | Infosec | : Medusa
How I got Apple Hall Of Fame ! : shubhdeep
Baby Ninja Jinja — HackTheBox — Writeup — Web Exploitation : rootjkqsta
My OSCP journey in new exam format : Erictee
Fuzzing and credentials leakage..awesome bug hunting writeup : Abdalrahman Alshammas
PWN101 : TryHackMe
Pandora : HackTheBox
Active Directory Enumeration & Attacks : HTB Academy
Bought the PWK Course
HOW I Found 17 Critical and Medium Security Bug on INDUSIND Bank : Santosh Kumar Sha (@killmongar1996)
Active Directory Enumeration with Powerview script : Prajwal Patil
Authentication Bypass using OTP : karandarjishack
The ABCs of Kerberoasting : Security Lit Limited
WordPress Users Disclosure [500$ Bounty] : Mohammad Mohsin
How I passed the OSCP certification in my first attempt, and hacked the 5/5 targets of the exam : jedus0r
Active Directory Enumeration & Attacks : HTB Academy
PWK Course
Networked : HackTheBox
Careers in Cyber : TryHackMe
Resources to help make you a better hacker : Thexssrat
Wolverine Security CTF : whois_sin
How to access the Dark Web : StarDust
Pwn2Own Miami paid $400,000 USD for 26 zero-day exploits on ICS and SCADA products : Eli Cyber Security
Why I Write Malware and You Should Too : Mitch Edwards
Active Directory Enumeration & Attacks : HTB Academy
PWK Course
Red Team Engagements : TryHackMe
Admirer : HackTheBox
C Language for Hackers & Beyond! 0x01 : Vicky Aryan
How I got a lousyT-Shirt from the Dutch Government. : Mava
How We hacked (bypassed) Admin Panel just by JS file : Zhenwar Hawlery
OTP Bypass + PATO = 100 Dollars Bounty : Gnana Aravind
Buffer Overflows : Vivek Kumar
Just got my CRTP ! Here’s my exam experience : Chenny Ren
Active Directory Enumeration & Attacks : HTB Academy
DC-01 : Offensive Security Proving Grounds (Play)
PWN101 Walkthrough | TryHackMe : 7h3h4ckv157
MITRE D3FEND: Cyber Defense Technique Catalog : Chad Warner
How To Reverse Engineer Executable Files : 0xwan
Everything you need to know about LSASS (From Red Team Perspective) : Abhiyan Chhetri
HackTheBox Cyber Apocalypse CTF 2022
PWK Course
A Passwordless Future : Alexis Rodriguez
P1 Bug — PII information disclosure : Huntersherlock
Exploring how DNS works with DIG : Kester Griffiths
Cyber Security Projects For Students : Nafish Alam
Attacktive Directory — Pentesting | TryHackMe (THM) : Aircon
PWK Course
PWK Course
Active Directory Enumeration & Attacks : HTB Academy
Heist : Offensive Security Proving Grounds (Practice)
Backdoor : HackTheBox
My Story OF Dutch Govt......! : Yashshirke
Hacking With Powershell: Blue Team : Xstag0
Account Takeover [Via Cross Site Request Forgery] : Mohammad Mohsin
RCE via Dependency Confusion : Sm4rty
002. Test plan template : Thexssrat
Lame : HackTheBox
PWK Course
Heist : Offensive Security Proving Grounds (Practice)
Pebbles : Offensive Security Proving Grounds (Practice)
Information Gathering - Web Edition : HackTheBox Academy
Guide to the 2022 OSCP Exam on M1 (with Active Directory) : GromHacks
What I learned after hacking my first 20 boxes from Hack the Box… : v0lshebrer
PicoCTF 2022: Keygenme writeup (reverse engineering) : 0xwan
Picture Yourself Becoming an Ethical Hacker Now (Beginner’s Guide) : Champ35
Red Teaming : Abhinav Pathak
PWK Course
Information Gathering - Web Edition : HackTheBox Academy
Spectra : HackTheBox
Source Code Disclosure : Mohammad Mohsin
VulnHub Walkthrough’s : BOX 1 : Adeesh Unnikrishnan
Hunting Cobalt Strike Servers : Bank Security
SSH reverse shells : Maxime Moreillon
Attacking Kerberos | Kerberoasting | AS-REP Roasting | Active Directory | Windows | : Medusa
Internal : Offensive Security Proving Grounds (Practice)
Active Directory Overview : Hacktivities
VulnHub: DeathNote: 1 : Al1z4deh:~# echo "Welcome"
Windows Privilege Escalation : Varma_Chekuri
Deep Dive into DNS Records : Cybertix
Break Days
Break Day
Attacking Common Services : HackTheBox Academy
APT & Threat Actor Lists : Chad Warner
Incident Response Part 1: Preparation | EN : Alican Kiraz
Incident Response Part 2.1: Installation of Detection Systems | EN : Alican Kiraz
“OSINT Investigations: We know what you did that summer” Notes : Chad Warner
Attacking Common Services : HackTheBox Academy
OpenSource : HackTheBox
Hacking “Emdee five for life” : Murat Aydin
Quick guide on custom web page design — do’s don'ts get to #1 on Google (level: beginner) : DJ Substance
Reconnaissance : Gökhan Gökcen
Wireless Penetration Testing (WPA-2 Cracking) : Vamshi Vemula
TryHackMe: Biblioteca : Naman Jain
Attacking Common Services : HackTheBox Academy
PWK Course
I Obtained ADMIN access via Account Activation link [In 30 seconds] : Ignatius Michael
HACK THE BOX — LATE WALKTHROUGH : Rahul Kumar
XSS Through File Upload :: Mohammad Mohsin
Pointers in Depth : Ahmet Göker
Learning more about “Threat Hunting” : Gupta Bless
Attacking Common Services : HackTheBox Academy
Muddy : Offensive Security Proving Grounds (Practice)
Networking Overview : arshiadev
Network Types : arshiadev
Beginners Guide to Self-Learning Windows and Active Directory: Part 1 : EricaZelic
AlbusSec:- Penetration-List 06 Command Injection — Sample : Albus Security
Miniseries: XSS to the core — Pt.1 : Thexssrat
Nunchucks from HackTheBox — Detailed Walkthrough : Pencer
Active Directory Overview : Hacktivities
Kerberos Authentication in Active Directory : Hacktivities
The Hunt for the Red Team : Ross Hosman
Your 5 min guide to most useful features in Burp Suite : Samarth Srivastava
Challenges.re Linux e12 Writeup — Reverse Engineering a 64 bit Linux Binary with Ghidra : cron-swanson
TAMU CTF 2022 Writeup — Reversing: Covfefe : cron-swanson
Break Days
Biblioteca : TryHackMe
CyberHeroes : TryHackMe
Network Security : TryHackMe
Operating System Security : TryHackMe
Security Operations : TryHackMe
Redeemer : HackTheBox
Unified : HackTheBox
How an Open Redirection Leads to an Account Takeover? : Mahendra Purbia (Mah3Sec_)
The 5 Best Books for Malware Development : Mitch Edwards
Hive Ransomware Attack (Forensics, Incident Response, and Penetration Testing) : evilmango
Blunder- Hack The Box : cY83rR0H1t
CrowSec EdTech Write-Up: Hijacking : saruman
CrowSec EdTech Write-Up: Poisoning : saruman
Kevin : Offensive Security Proving Grounds (Practice)
Core Windows Processes : TryHackMe
Sysinternals : TryHackMe
CyberStarters 2022 CTF — Gunship : OTR
Introduction to x64 Linux Binary Exploitation (Part 1) : +Ch0pin🕷️
How I made it into the United Nations hall of fame as I slept : Vikaran
NetBIOS || SNMP || LDAP || Ethical hacking — Part 1.6 : VirusZWarning
Basics of Assembly language : Part 1 : A51F221B
Windows Fundamentals : HackTheBox Academy
Toolbox : HackTheBox
Website Hacking — Information Gathering, File Upload, Code Execution, File Inclusion : Chaitanya Landge
Exploitable CTF 1 Writeup : nobunaga68
SSO: A Secure way for authentication and authorization? : Security Lit Limited
DOMAIN ADMIN Compromise in 3 HOURS : Ignatius Michael
MITRE ATT&CK : The Overview : Ax1al
PWK Course
Tryhackme Erlik Machine Writeup : Anil Yelken
SQL injection to Remote Command Execution (RCE) : Kwadwo Amoako
HOW I GOT ACCESS OF A VULNERABLE SITE THROUGH SESSION HIJACKING : SheHacks_KE
rev_wide — cyber apocalypse 2022 (CTF writeup) : Nata chikhinashvili
The toddler’s introduction to Dynamic Memory Allocation : +Ch0pin🕷️
Fantastic : Offensive Security Proving Grounds (Practice)
Binary Heaven Walk-through swanandx
Reversing Binaries: CTF Edition : swanandx
Reversing Binaries: Key generators : swanandx
Walkthrough of “Insecure Deserialization”- PentesterAcademy : ViSa
Break Days
Linux Forensics : TryHackMe
OpenSource : HackTheBox
Linux Privilege Escalation part-1 : Varma_Chekuri
Cyber Kill Chain — Military approach to cyber attacks and defense : Vinsloev
Networking Protocols Explained | CyberSecurity : Shakhawat Hossain
Digital Foresnics - An Easy Guide For Beginners in 2021 : Ajay Sarangam
Chase : HackTheBox
Event Horizon : HackTheBox
Export : HackTheBox
Windows Fundamentals : HackTheBox Academy
What I learned from reading 126* Information Disclosure Writeups : Sm9l
Anatomy of Authentication Tests : Bursa Demir
Operating Systems : Lowin
What I learnt from building a homelab : Gaius Chan
Batarina : Offensive Security Proving Grounds (Practice)
PWK Course
Breaching AD : TryHackMe
My Grind to OSCP : Hackin7
Zero to almost hero to hero: My OSCP Journey 2022 : Ji Cheng
My Pentest Log -21 — (Content-Type Checks) : Hamit CİBO
Seven Things a Cyber-Security Enthusiast Should Know : Scofield O. Idehen
PWK Course
Breaching AD : TryHackMe
Behind the Bug: Password reset poisoning : Brandon Rolden
IDOR in support.mozilla.org through Code Review : Brandon Rolden
All About 403 Bypass : Pankaj
Hacking The Skynet Mainframe and Preventing Judgement Day : HaXeZ - Simplified Cybersecurity
Exploiting Buffer Overflows on : HaXeZ - Simplified Cybersecurity
Insider : HackTheBox
Pwning binaries and defeating modern mitigations using rop and ret2libc (foobar 2022 pwn writeup) : F4zi
Introduction to x64 Linux Binary Exploitation (Part 1) : +Ch0pin🕷️
Solving a simple buffer overflow with pwntools : James
My first bug submission: XSS vulnerability : Asheet Tirkey
Pwn Zero To Hero : PinkDraconian
Security+ : Jason Dion
Introduction to x64 Linux Binary Exploitation (Part 2)—return into libc : +Ch0pin🕷️
Offsec proving grounds: potato : Mostafa Elserogy
TAMU CTF 2022 Writeup — Web: Lock Out : cron-swanson
My Pentest Log -6- (Bypass Powerpoint Password + Information Disc.) : Hamit CİBO
New Symbiote malware infects all running processes on Linux systems bleepingcomputer
Logger : HackTheBox
Security+
Windows Fundamentals : HackTheBox Academy
PWK Course
Curling : HackTheBox
Mr. Phisher TryHackMe Walkthrough : Musyoka Ian
Forensics Of Windows Registry : Ansh Vaid
Getting Started With Cyber Forensics : Ansh Vaid
Kerberos Domain Username Enumeration : Lime101
We Need To Know Session Hijacking : RAJLE GOVINDA
Twiggy : Offensive Security Proving Grounds (Practice)
Breaching AD : TryHackMe
Introduction to x64 Linux Binary Exploitation (Part 2)—return into libc : +Ch0pin🕷️
Binary Exploitation : Palani
Examining Memory of Simple C Program : Palani
Breaching AD : TryHackMe
PWK Course
How I found a Critical Bug in Instagram and Got 49500$ Bounty From Facebook : Neeraj Sharma
Practical malware analysis — Lab 1 : Martin Martinez
Investigating Windows registries : Teodor Jazen Podobnik
[Malware Analysis Bootcamp] Let’s start your first malware analysis!! : Takahiro Oda
Breaching AD : TryHackMe
Digital Forensic — Most Commonly used Tools : Khalil Afridi
[VulnHub] Fristileaks: 1.3 : Fox9ix
I was awarded a $150 bounty : Aman
DC-3 - VulnHub : Abdul Wassay
Recommendations of OSCP : Burcy YARAR
Breaching AD : TryHackMe
PWK Course
Bashed : HackTheBox
A hackers guide to FINDING cybersecurity jobs : Jason Haddix
How I have identified vulnerabilities in a college website? : Saket Acharya
Implementing Application Security on your project : YevhSec1
eLearnSecurity: Digital Forensics Professional : Chris Eastwood
Break Day
Break Days
Breaching AD : TryHackMe
PWK Course
Exfiltrated : Offensive Security Proving Grounds (Practice)
LDAP in Active Directory : Hacktivities
How to bypass Captcha : Milanjain
How I found a No Rate Limit bug : Riddu Sarav
TryHackMe: Different CTF : Al1z4deh:~# echo "Welcome"
Linux Rootkits Part 1: Introduction and Workflow : TheXcellerator
HackTheBox Meetup
Telangana, Andhra Pradesh, Karnataka, Himachal Pradesh & Kerala — All Government bus services were hacked : Krishnadev P Melevila
What are supply chains and how to secure them : Security Lit Limited
Malware Analysis for Beginners : Deepu
Took Down A School’s Website : Ansh Vaid
What failing the 100 Days of Code taught me : Zac Braddy
OSCP Notes Preparation
PWK Course
Setting Up Burp Suite : Thexxsrat
A hunter’s methodology V5.0 : Thexssrat
Account Takeover by OTP bypass : Vaibhav Kumar Srivastava
Stored XSS | Cross-Site Scripting | Session Hijacking : Plaintext Passwords
PNPT Live Study Session
The Long Awaited OSCP Review : Joe Helle
Information Leak: Posted, Discovered & Misused! How easy for Criminals to get your data? : Rakesh Krishnan
Lab 3 — Basic Dynamic Analysis : Chris Eastwood
TALES OF A CYBERSEC PADAWAN : cybersecpadawan
Break Day
OSCP Notes
PWK Course
Tryhackme NetworkMiner Room Experience : Joshua Speshock
A short story of IDOR : iamdevansharya
Find SSRF , LFI , XSS using httpx , waybackurls , gf , gau , qsreplace : Don Brown
Critical Git Repository Leaked Internal Data : Dhamotharan
Reverse Engineering with GHIDRA. : Krishna
PWK Course
Enumerating Active Directory : TryHackMe
What is LLMNR Poisoning Attack? : Prajwal Patil
What is Kerberos? : Martin Martinez
ELF x86 — Stack buffer overflow basic 6 Rootme (App-System) (Introduction to Ret2libc) : Hariharan@Blog:~$
H@cktivityCon 2021 CTF : The Library (Ret2libc : ASLR bypass) : Hariharan@Blog:~$
How I was able to takeover 3 Subdomains of an Organization via Shopify? : Sahil Ojha🇳🇵
PWK Course
Enumerating Active Directory : TryHackMe
Snooping credentials through Net-NTLMv2 | HashCat Cracking : Plaintext Passwords
Enumerating Access Controls in Active Directory : Nairuz Abulhul
Cyber Security in Embedded Systems is just like a Digital Fortress : Solwit S.A.
TCMSecurity | Dev | Write-up : Hussain
Enumerating Active Directory : TryHackMe
HTML and Hyperlink Injection via Share Option In Microsoft Onenote Application : Divyanshyu Shakla
Microsoft Hall of Fame for a Small Misconfiguration. : Aman
My Journey to the Dark Web : Tamir Suliman
Basics of Assembly language : Part 3 : A51F221B
Offensive Security: Getting Your Foothold In The Industry : 0xP
How your laptop can be hacked at the Airport : CoolTechZone - Cyber Security Labs & News
An Out Of Scope domain Leads To a Critical Bug[$1500] : shakti mohanty
Impacket Deep Dives Vol. 2: Attacking Kerberos : Kyle Mistele
Break Day
Break Days
Enumerating Active Directory : TryHackMe
Let’s Understand SSRF vulnerability : Security Lit Limited
OSINT CTFs : Chad Warner
Annie TryHackMe Walkthrough : Musyoka Ian
How I ‘hacked’ Wi-Fi at Railway Station to get free internet? : Ganesh Datta
HOW I HACKED A HEALTH INSTITUTION [Domain Admin Compromise] : popalltheshells
Stack Buffer Overflow to Remote Code Execution | BOF RCE : Plaintext Passwords
DNS in Active Directory : Hacktivities
How i Found Unauthorized Bypass RCE : Yashshirke
How i passed my OSCP exam first try with no prior hacking experience : Thexxsrat
Undetected from HackTheBox — Detailed Walkthrough : Pencer
Collin College Security+ Class
CompTIA CertMaster Labs for Security+ (SY0-601)
Collin College Security+ Class
CompTIA CertMaster Labs for Security+ (SY0-601)
Lateral Movement and Pivoting : TryHackMe
Committed : TryHackMe
PWK Course
How Burpsuite-pro helped me to get a 5 digit Bounty ! : Gnana Aravind
PII Disclosure of Apple Users ($10k) : Ahmad Halabi
Building an Active Directory Lab — Part 1A: AutomatedLab : drunkrhin0
BSidesSF 2022 CTF Challenge Write-ups : its C0rg1
How I Hacked My College Server? : Krishnadev P Melevila
No Place To Hide : HackTheBox
Persistence : HackTheBox
Ransom : HackTheBox
PWK Course
Exploiting Stack Buffer Overflow| Step by Step | Reverse Engineering : Medusa
A Simple Buffer Overflow Demonstration — Part 1 : Tejas Kand
Let’s Defend DFIR Http Basic Auth — writeup. : Marcin Górski
Basic Malware Analysis 2 : Baron
Trick : HackTheBox
Lateral Movement and Pivoting : TryHackMe
PWK Course
Summary of Iranian Advanced Persistent Threat (APT) 34 : Michael Lortz
How I could have accessed all your private videos/photos saved inside your device without even unlocking it? : Samip Aryal
Open Redirect to XSS in United Nation Website : Nidhi panchal
How I hacked the JEE coaching Website and get DB access : Navjot Singh
How To Pass Your OSCP Exam (New Exam Format) : Dw3113r
CompTIA CertMaster Labs for Security+ (SY0-601)
Kerberos Attacks — AS-REP Roasting : Nairuz Abulhul
Road to OSCP — What’s Next? : prince0f4llsaiyanz
Cybonet — Unrestricted File Upload to Remote Code Execution : Moriel Harush
Find SSRF , LFI , XSS using httpx , waybackurls , gf , gau , qsreplace : Satyam Pathania
Deploying Ransomware with a Weaponized USB Device : fatman
Kerberoasting — Part 2: Discovery and attack : Manish Kumar
Rubber Ducky: Learning About the Keystroke Injection : Alejandro González
Kimsuky Analysis : somedieyoung
Volatility & WannaCry : somedieyoung
Collin College Security+ Class
CompTIA CertMaster Labs for Security+ (SY0-601)
Break Week
Break Days
Hacking OSCP ! Roadmap 2022 (AD included) : Akash Gupta
OTP Bypass via Response Manipulation : Tariq Rafiq Kehar
What is Digital Forensics? : Mahbuba Shahrin
Finding 0-days in Enterprise Application : Dhanesh Dodia - HeyDanny
Break Days
Good things takes time | Story of my first “valid” critical bug! : Kr1shna 4garwal
Active Directory Attack Cheat Sheet : Dw3113r
I Created a Ransomware!!! : VirusZsWarning
Thirukrishnan :
Quotient : TryHackMe
Security+
Let’s Understand Path Traversal Vulnerabilities : Security Lit Limited
How to NOT keep your Active Directory safe. : Roberto
Network Monitoring and Incident response : Ahmet Göker
How to Make an Amazing Programming Resume : Emmanuel Tejeda
Quotient (thm) writeup : Madfoxsec
Olympus : TryHackMe
Security+
Gauing+Nuclei for Instant Bounties : Ravaan
A Developer’s Nightmare: Story of a simple IDOR and some poor fixes worth $1125 : Marcos IAF
How I Gained Access To A Finance Company’s Accounts (Session Hijacking) : Talha Karakumru
Threat Hunting Like A Detective : Md. Abdullah Al Mamun
Olympus : TryHackMe
Security+
Why this SIMPLE mistake earned a $5000 bug bounty from Reddit : Roberto
Narnia(binary exploitation) walkthrough : Ahmet Göker
Golden Ticket Attack Explaining (From The Blue Team Perspective) : Orhan Öztaş
Kerberoasting — Part 1: Lab setup : Manish Kumar
Olympus : TryHackMe
BTLO —Malicious PowerShell Analysis : Chris Eastwood
A Simple Buffer Overflow Demonstration — Part 2 : Tejas Kand
Explaining TCP : Arth Kumar
Privilege Escalation with fail2ban nopasswd : JAY BHATT
Active Directory Basics : 0xskar
Break Days
Break Days
Security+
Break Days
Security+
Took and Passed the CompTIA Security+ SY0-601 Exam!
Break Days
First Day of Classes!
I mean, IDOR is NOT only about others ID : can1337
Pivoting Techniques with THM Wreath : Hacktivities
This SIMPLE vulnerability in Shopify earned a $2500 bug bounty : Roberto
OSCP Exam 2022: My Experience : firewitch
My OSCP Journey : Wadshah
Hacker vs. Hacker : TryHackMe
King of the Hill : TryHackMe
Break Days
Confidential : TryHackMe
Hacker vs. Hacker : TryHackMe
This is how he could hijack Reddit accounts with just ONE click: a $10,000 bug bounty : Roberto
Intro to Digital Forensics : Mukilan Baskaran
My top 10 Linux commands for debugging server issue : Rafael Zimmermann
Buffer Overflow: Understanding CPU Registers : Tejas Kand
Hacker vs. Hacker TryHackMe Walkthrough : Musyoka Ian
Enumeration : TryHackMe
Active Directory Basics : TryHackMe
Active Directory Basics : TryHackMe
Another day, Another IDOR vulnerability— $5000 Reddit Bug Bounty : Roberto
Post-Exploitation Basics In Active Directory Environment By Hashar Mujahid : Hashar Mujahid
How I earned $500 by uploading a file: write-up of one of my first bug bounty : Riccardo Malatesta
Start Your Career in Ethical Hacking: Hackaday Ghidra Exercises Walkthrough Part 1A : Haddock
Break Days
Break Days
Agent T : TryHackMe
Break Days
Brute : TryHackMe
RazorBlack: Active Directory Room From TryHackMe By Hashar Mujahid : Hasher Mujahid
From Shodan to RCE: That one time I hacked a Fortune 500 company. : vimanari_
Enterprise: Active Directory Room From TryHackMe By Hashar Mujahid : Hashar Mujahid
Phoenix Challenges — Stack Zero : Nathan Pavlovsky
Brute : TryHackMe
CPTC Meetings
Break Day
LetsDefend SOC165 — Possible SQL Injection Payload Detected Walkthrough : brian j
Domain Enumeration Methodology : Gustav Shen
Cyber Security For Hospitals & Health Care : Aditya Singh
Breaking Down A Python Reverse Shell One-Liner : Alexis Rodriguez
CPTC
Intro To CTFs Workshop
CPTC
CPTC
PWK Course
Midterms
CPTC
CPTC
PWK Course
CPTC
PWK Course
Copyright © 2023 Aditya Dindi