Dataset Viewer
Auto-converted to Parquet Duplicate
title
large_stringlengths
5
121
author
large_stringlengths
3
31
date
large_stringdate
2015-09-24 00:00:00
2026-04-11 00:00:00
read_time_minutes
int64
0
27
claps
int64
0
1.4k
responses
int64
0
9
article_snippet
large_stringlengths
4
1.38k
TryHackMe: [Day 2] Web Exploitation Elf HR Problems
Mac Leo
2022-03-23
3
0
0
ANS: No answer needed
Web App Wednesday: Broken Access Control
Mike Smith
2025-01-29
10
10
0
Check out last weeks article here: Web App Wednesday — The Basics
Web Application Pentests & The Basics
Mike Smith
2025-01-22
7
68
3
Hello Everyone!
How I Built the Ultimate Web Hacking Checklist — And Why It’s Helping Bug Bounty Hunters Win More
ZishanAdThandar
2025-05-02
0
0
0
The checklist is a professionally structured PDF — designed for clarity, speed, and real-world use.
Hacking With Cookies
Teri Radichel
2025-03-18
19
6
0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Red Teaming: 30-Day Challenge[9]
InfosecPandey
2025-04-22
5
0
0
Welcome to Day 9! Today’s focus is one of the most visible and targeted layers in the attack surface: web applications. These are often your first line into a target’s environment — whether it’s via login bypasses, insecure APIs, or outdated CMS components.
🔍 How I discovered a hidden user thanks to server responses ?
phoenixcatalan
2025-04-16
5
5
0
My first real step into web hacking and it wasn’t what i thought it would be.
Custom Headers: The Sneaky Trick Every Hacker Should Know
Rohit Suresh Borate
2025-04-11
7
113
1
Hey everyone! 👋
Tackling Conditional Blind SQLi Like a Pro: OSWE Prep Powered by Burp Suite
Anezaneo
2025-05-04
9
17
1
On the path to OSWE or chasing PortSwigger’s Web Security Academy certification? Imagine wielding your Burp Suite like Luke Skywalker wielded his lightsaber:
Gourlex: A must-needed tool for bug hunters
loyalonlytoday
2025-06-14
3
10
0
This tool requires GoLang to run. Read the article below on how to install Go on your machine
10 Tricks to Elevate Pentest Findings
Vijay Kumar Gupta
2025-07-19
5
51
0
Pentesting is more than just running scanners and submitting raw vulnerability reports. To stand out as a penetration tester, you must go beyond what automated tools reveal. You need to think like an attacker, chain vulnerabilities together, and extract maximum impact from seemingly low-risk issues. Here’s a deep dive ...
Cariddi: Point It at Domains, Pull Out the Good Stuff
Javier Calderon Jr
2025-08-29
6
0
0
When you’re hunting for attack surface or doing housekeeping on your own web estate, two questions matter most: what’s out there and what secrets did we accidentally ship. Cariddi answers both. Feed it a list of domains and it will crawl, collect URLs, and flag anything interesting — API endpoints, tokens, API keys, se...
Race Condition: a falha que pode comprometer seus sistemas
Rafael dos Santos
2025-08-19
2
0
0
Quando falamos em segurança de aplicações Web, normalmente pensamos em vulnerabilidades como SQL Injection, XSS ou problemas de autenticação. Mas existe uma falha menos comentada, que muitas vezes passa despercebida: o Race Condition.
Intercepting LDAP With InterceptSuite
Sourav Kalal
2025-08-28
6
6
1
LDAP authentication is everywhere in networks, but intercepting encrypted LDAP traffic can be challenging. LDAP authentication in the web is generally handled by the backend, and from the frontend, we have HTTP, which is easy to intercept.
Veritabanları (Databases)
Songül Kızılay Özügürler
2026-02-14
4
0
0
Web uygulamaları, web uygulamasıyla ilgili çeşitli içerik ve bilgileri saklamak için back-end veritabanlarını kullanır. Bu; resimler ve dosyalar gibi temel web uygulaması varlıkları (assets), postlar ve güncellemeler gibi web uygulaması içerikleri veya kullanıcı adı ve şifreler gibi kullanıcı verileri olabilir. Bu saye...
A Deep Dive into CORS Misconfigurations
Cyb3r M!nds
2026-02-18
4
70
2
Hello👋 and welcome, fellow cyber explorers! Today, we’re diving into a common but dangerous flaw in modern web security: CORS (Cross-Origin Resource Sharing) misconfiguration. If you’ve ever wondered how an attacker can steal your private profile data just by getting you to click a link, this is how they do it.
Lab: SQL injection UNION attack, finding a column containing text
Songül Kızılay Özügürler
2026-03-09
3
1
0
Geçen gün PortSwigger Web Security Academy’de çalışırken takıldım. Lab basit görünüyordu ama düşündüğümden biraz daha zekiceydi. Çözdükten sonra “bunu yazmam lazım” dedim, çünkü kafamda oturması biraz zaman aldı.
When Login Features Become OSINT Signals: Leveraging Authentication Flows for Data Enrichment
Horus
2026-04-10
3
0
0
During a routine analysis of a web application’s authentication flow, I identified an interesting behaviour related to log in UX design.
Lab: Method-based access control can be circumvented
Songül Kızılay Özügürler
2025-12-12
4
51
0
Bu yazıda PortSwigger Web Security Academy’deki bir laboratuvarın çözümünü ele alıyorum. Laboratuvarın temel konusu, uygulamanın erişim kontrolünü yalnızca belirli HTTP metodlarına göre kısıtlaması ve bunun nasıl kötüye kullanılabileceği.
Lab: URL-based access control can be circumvented
Songül Kızılay Özügürler
2025-12-11
2
55
0
Bu web uygulamasında /admin altında korumasız bir yönetici paneli bulunuyor. Ancak front-end tarafında, dışarıdan gelen isteklerin /admin yoluna erişmesi engellenmiş durumda. Buna rağmen, arka plana güç veren framework X-Original-URL header’ını destekliyor. Bu da URL’nin header üzerinden override edilmesine ve erişim k...
🔧 Top 5 Practical Uses of curl Every Engineer Should Know
Taha Ex
2026-01-23
3
2
0
One of the most common uses of curl is checking whether a service is alive, reachable, and responding correctly.
BEGINEER’S CRASH COURSE FOR FINDING ACCESS CONTROL VULNERABILITIES IN THE WEB APPS:PART 2
Cyber Defecers
2020-05-29
20
107
0
Some applications enforce access controls at the platform layer by restricting access to specific URLs and HTTP methods based on the user’s role. For example an application might configure rules like the following:
BEGINEER’S CRASH COURSE FOR FINDING ACCESS CONTROL VULNERABILITIES IN THE WEB APPS:PART 1
Cyber Defecers
2020-05-29
17
300
0
THIS BLOG POST WILL ASSIST PENTESTERS AND BUG BOUNTY HUNTERS TO COMPLETELY FAMILIARIZE THEMSELVES WITH THESE VULNERABILITES AND TO FIND THEM IN WEB APPS.
TryHackMe: Basic Pentesting
ratiros01
2020-06-13
6
0
0
[Task 1] Web App Testing and Privilege Escalation
Basic Pentesting Writeup
Hacktivities
2020-06-05
10
5
0
This article outlines my approach to solving the “Basic Pentesting” room available on the TryHackMe platform for free to members. I have provided a link to TryHackMe in the References below, where you can signup and try hacking this virtual machine yourself. Without any further delay, lets jump in!
Offensive Security Advanced Web Attacks and Exploitations (AWAE): What You Need To Know
Samuel Whang
2020-06-06
4
16
0
After obtaining my Offensive Security Certified Professional (OSCP) status, I started searching for a direction. The most common advice that I’ve received from many professionals, who are far more experienced than I am, was to specialize in something because it’s difficult to be an expert at everything. The difficult p...
RapidScan Web Pestest Aracı Kurulumu ve Kullanımı
Erdinç Tandoğan
2020-07-12
2
2
0
RapidScan, Web Pentest için kullanılan ücretsiz bir araçtır. İçesinde 80'den fazla araç bulundurur ve bunların hepsini sizin için gerçekleştirir.
Wapiti – free web-application vulnerability scanner
Nemesida WAF
2020-07-20
8
14
0
In the previous article we talked about Nemesida WAF Free – a free web application firewall for protecting web sites and API against hacker attacks, and in this article we decided to review the popular web application vulnerability scanner – Wapiti.
Juice Shop for Newbies
Sophie Kaelin
2021-04-16
9
67
0
Hi Everyone !
SSI — Server Side Include Injection
Vikas Sharma
2021-05-18
4
140
0
Let us say , we have a web application containing multiple pages , each requires a change in the specific content (like may be name of user or anything). Therefore it would be difficult to change the HTML code manually every single time. This is where Server Side Inclusion takes place which can dynamically inject the r...
5 Ways to Test Password Reset Function
MikeChan
2021-06-26
4
328
2
Password reset is a function commonly founded in modern web app. This function normally would be the first function I tested in every web app as once a bug is founded, it is normally a critical one. In this article, I would show several ways to test this function.
How You Can Escalate a Simple HTML Injection Into a Critical SSRF
Faizan Nehal
2021-06-21
6
398
1
SSRF or Server Side Request Forgery is a type of vulnerability where the attacker can make the request on behalf of the vulnerable web server and can fetch any internal file from the server, this is the most precise summary of the bug I can come up with. It is one of the hottest bugs to find as the number of attacks th...
Leveraging Postman Collections for Offensive Webapp Testing
Pasquale
2021-08-13
4
2
0
I was recently in an engagement with a web application that was interconnected with about half a dozen services while offering up a few dozen API routes that had to be tested within three days. As I stared at the flow chart provided and tried to gather an understanding of what I needed to test I thought to myself:
Creating simple middleware for easy exploitation of second-order injections like SQLi, SSTI, etc
n00🔑
2021-10-27
4
7
0
Second order injection is code injection vulnerability in which unfiltered user input is not directly being passed to the query by web application. Sometimes unfiltered user input is first gets stored in database before going to the query. These types of injections cannot be usually detected by automated scanners, as w...
eWPT Review
Anon Tuttu Venus
2021-10-18
3
33
0
I have successfully completed eLearnSecurity Web Application Penetration Testing (WAPT) certification. Let me share my experience with you guys.
Information Gathering&scanning for sensitive information[ Reloaded ]
Abdur Rahman Maheer
2021-10-02
15
652
9
Testing Web-Application/Network , Information Gathering is important before we test for vulnerability on the target?
Lab: Blind SQL injection with conditional errors 💉
Katjah Smith👩🏽‍💻
2022-02-16
4
9
0
Hey, cyber security folks! This blog will focus on Blind SQL injection with conditional errors based on the lab on Web Security Academy using Burp Suit — SQL learning path.
TryHackMe — OWASP Top 10 — Injection
Katjah Smith👩🏽‍💻
2022-03-06
2
1
0
What strange text file is in the website root directory?
WebSocket Pen Testing
Alex Rodriguez
2022-04-06
8
37
1
Hello, 🌎 ! In this blog, I want to provide an introduction to WebSocket pen testing by explaining what WebSockets are and how they are used, and then provide a walkthrough for all WebSocket labs found in PortSwigger’s amazing Web Security Academy.
Burp Academy Labs — Bypassing Authentication
Lsec
2022-05-31
2
1
0
SQL Injection is dangerous and should be taken seriously. Nowadays most of the web frameworks are mitigating such vulnerabilities by default but developers mistakes could lead into creating one. On my blog and my YouTube channel: Lsecqt — YouTube I am focusing on the offensive side of things, trying to teach concepts a...
HackTheBox-Pandora
ARZ101
2022-05-21
8
1
0
Pandora was an easy rated linux machine, starting the box with an nmap scan, there was a web server hosting a template web page, nothing really was of interest on the site, after scanning UDP ports, SNMP service running which reavled a script being ran along with username password being passed as arguments which gave a...
What I’ve learned from studying Cybersecurity for 1 week
Rodolfo Martins
2022-07-22
2
1
0
As a Web Developer, it is important to me to know methods and types of attacks that can be performed on Web Applications.
HackTheBox-Acute
ARZ101
2022-07-16
13
16
0
Acute was hard rated box which involved enumerating the web site to find a word document having the link to PowerShell Web Access (PSWA) also having the hostname in meta data and the password in the document, the username was found through the about page from the site, giving us PSWA for evadies, having landed on a con...
Server-Side Request Forgery(SSRF) demo on CYBERTALENTS
Muhammad sani Nasiru{C4L33PH4}
2022-08-27
4
1
0
Server Side Request Forgery is a web security vulnerability that allows the attacker to interact with the internal infrastructure of the target which is not accessible from outside the target network. The attacker targets an application that supports data imports from URLs or allows them to read data from URLs.
My Journey: From Pentest to Red Team to Blue
Carrie Roberts
2022-08-11
5
76
0
I was a web application developer in 2010 when I learned about pentesting. I fell in love with the idea that I could get paid to break everyone else’s apps instead of making mine work. After three years of awesome training from the SANS Institute and a lot of CTFs, I landed my first pentest job with Black Hills Informa...
Hacking JSON Web Token (JWT)
pwnzzzz
2018-05-03
5
1,400
7
Hey,
Exploiting freely accessible WhatsApp data or “Why does WhatsApp web know my phone’s battery level?”
Juan Cortés
2018-07-08
7
342
1
This all started with the title's simple question. I was aware that the desktop app communicated with the phone after the initial handshake (that part where you have to scan a QrCode so that it knows it's you and not someone else trying to read your conversations) but I wanted to know exactly what information was being...
Pentesting basics: Cookie Grabber (XSS)
Laur Telliskivi
2018-10-25
6
212
0
In 2017, injection (attack) was identified by OWASP as the most serious web application security risk for a broad array of organizations. In this tutorial I will be doing a cross-site scripting attack against a vulnerable web application using Javascript. So what is this cross-site scripting attack?
Web App Pentest Cheat Sheet
Murat Karaöz
2018-10-06
12
321
0
Everybody has their own checklist when it comes to pen testing. If you are new to pen-testing, you can follow this list until you build your own checklist. I have extracted these steps from OWASP testing guide and I believe it is a good starting point.
Unknown
Nemesis Contreras
2018-11-02
3
4
0
Testing for SQLi Web Vulnerabilities Application Walk-trough
What Moving To the Bay Area Taught Me About Loving My Pentesting Tools (Burp Suite vs Fiddler)
Inon Shkedy
2018-12-06
7
176
1
Let’s talk for a moment about love, relationships and commitment…
HTB — HDC Web Challenge Write-up
Pedro Henrique Cardoso
2019-02-05
5
5
0
Before, read this message: The objective of HTB is to improve your skills, if you have not been able to win this level, I recommend you to take a walk, a coffee or just take a break and try it later. If you have already tried enough times and don’t want to keep trying, read this write-up, see in which parts you flawed ...
@TryHackMe — Basic Pentesting Room
Jasmine Jackson
2019-03-11
5
13
0
Another day, another challenge.
Pentesting CORS
Teri Radichel
2019-08-23
6
25
0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Tokopedia Web Security Workshop
Deny
2019-08-13
4
64
0
On Thursday, 11 July 2019, Tokopedia IT Security team had successfully held the first IT Security Workshop — Web Application Security. The workshop was attended by 25 selected participants out of the 350 enthusiastic registrants across Indonesia that come from various industries, including the technology industry.
Capture The Flag (CTF)
Chandni Vaya
2019-03-03
4
27
1
As a cyber security student and a puzzle lover I am always fascinated by capture the flag challenges. As a result I signed up for various online CTF platforms including cybertalents.com. The platform has various challenges in different domains like cryptography, web security, network security, digital forensics, etc th...
Server Side Request Forgery(SSRF){port issue hidden approch }
Deepak Holani
2019-05-03
3
482
1
Hello,
How to Write a Better Vulnerability Report
Vickie Li
2019-06-26
6
913
3
An essential skill for a security researcher is the ability to write concise and clear vulnerability reports. A well-written vulnerability report will help the security team reproduce and fix the issue faster and minimize the possibility of exploitation. In this post, we are going to go into the components of a good vu...
Out of Scope
Vickie Li
2019-08-27
4
145
0
Okay, I’ve got to admit, I’m not proud of it… But I’ve gotten N/As before, lots of them. And I’ve also been told that my reports were “informative”, many times over.
The Secret step-by-step Guide to learn Hacking — Spoonfed Edition!
Eshaan Bansal
2019-08-20
4
800
2
Step 1: Get your super black hacker hoodie and guy Fawkes mask Step 2: Go to https://hackertyper.net and start typing. Step 3: they believe you are hacker Step 4: you are hacker.
Attacking Sites Using CSRF
Vickie Li
2019-08-16
4
412
1
The criticality of a CSRF vulnerability depends heavily on where the vulnerability is located. Sometimes, faulty CSRF protection mechanisms lead to inconsequential issues like unauthorized setting changes or emptying a user’s cart. Other times, they lead to much bigger issues: user information leak, XSS and even one-cl...
Bypassing CSRF Protection
Vickie Li
2019-08-22
5
1,200
3
Psssst. Before you read on, please make sure that you understand the basic concepts of CSRF. You can read about it here:
How to find more IDORs
Vickie Li
2019-09-17
5
1,300
4
I love IDORs. They are easy to find, simple to exploit and often carry significant business impact. They were the root causes of some of the most critical vulnerabilities that I’ve found.
Don’t make your .git folder publicly accessible, hacker can steal your source code
David Adi Nugroho
2020-04-15
2
16
0
Have you ever realized the danger of a publicly accessible .git folder?
The Story of My first 4 digit bounty from Facebook
Sudip Shah
2020-07-17
2
462
1
I was just trying to test each and every function that the FBLite app have and I found one suspicious behaviour which leads to Page Admin Disclosure. It is fixed currently so I’m disclosing it publicly .
Dot-Dot-Slash And Web App Crash
Hacktory
2020-07-13
3
27
1
Directory traversal (or path traversal) is a vulnerability, the exploitation of which enables an attacker to read arbitrary files on an application’s server (source code, application data, backend credentials, OS files). In some cases, an attacker can write information to the files stored on the server, thus changing d...
Attacking JSON Web Tokens (JWTs)
Neha Tariq
2020-11-09
7
746
1
Forge the token to gain unauthorized access!
Web App #Penetration Testing for Beginners:
CyberBruhArmy
2021-01-26
2
16
0
1.Testing for browser cache weaknesses // Assessing Authentication Schemes // Web App Penetration
Web-Application Security Resources
Vikas Sharma
2021-02-07
3
12
0
Got stuck?? Want to learn web hacking…Don’t know where to start from?
DEFEND-THE-WEB INTRO 1–7 CHALLENGES
Vikas Sharma
2021-03-13
3
0
0
Challenges
Build your own Pentesting labs on Amazon AWS
KF dogbe
2021-03-03
6
25
0
This guide help penetration tester build pentesting Lab on amazon AWS, in case, you don’t have direct access to targets penetration testing vulnerable lab environment. My next topic will go through analyses different exploitation techniques utilizing Metasploit, scanning, vulnerability assessment using multiple tools w...
TryHackMe - Basic Pentesting
David Varghese
2021-03-18
9
20
0
In these set of tasks you’ll learn the following:
Get a Feel of JWT ( JSON Web Token )
Anubhav Singh
2021-06-18
7
459
4
Hello Friends, Well, this is my first write-up, and there might be a ton of mistakes as I go along writing it out, so please give me feedback so that I can work over it. This article will give you a feel about What is JWT and How they are made?
CBOR Web Tokens (CWTs)
SecurityGOAT
2021-07-23
2
15
0
Heard of JWT tokens? I am sure you have! If not, then please check out this introductory post from Auth0 folks.
Attacks on JSON Web Token (JWT)
Anubhav Singh
2021-07-30
9
463
3
In part1 of the article, I introduced JSON web tokens that what is JWT and How they are made? I prefer to take a look at that before you go through this article.
A Developer’s Guide to Web App VAPT Essentials
Dev·edium
2023-06-25
8
0
0
Navigating the Intricacies of Vulnerability Assessment and Penetration Testing in Web Applications
Unknown
Iam_Wander
2023-06-28
4
1
1
TryHackMe | Offensive Pentesting | Vulnversity
eLearnSecurity Web Application Penetration Tester eXtreme Certificate Review — eWPTXv2
Omar Elshopky (3l5h0pky)
2023-06-22
8
4
0
In today’s digital landscape, where web applications play a pivotal role in both personal and professional domains, ensuring their security has become increasingly critical.
Exploit web application’s Using Python
Imran Niaz
2023-06-11
4
7
0
Hello hope you’re having a wonderful day my name is Imran as you know me with my profile. I love to break things since the day when I born I never protect single thing.
Basic Pentesting — TryHackMe WriteUp
Wilklins Nyatteng
2023-07-10
3
0
0
This is a machine that allows you to practise web app hacking and privilege escalation.
Mastering Web Security with Burp Suite on Linux: A Comprehensive Guide
TechLatest.Net
2023-08-29
3
0
0
In the realm of cybersecurity, securing web applications and identifying vulnerabilities are of utmost importance. As web technology evolves, so do the tools designed to analyze and fortify these applications. Burp Suite, a powerful web vulnerability scanner and penetration testing tool, stands as a beacon in this land...
TryHackMe — Jr Penetration Tester | Introduction to Web Hacking | Cross-site Scripting | Part-3
Aditya Sharma
2021-10-23
2
56
2
This would be the eighth write-up for our series of TryHackMe learning Path- Jr Penetration Tester. This chapter contains 10 rooms, For the Part-1(First 5 rooms) refer to TryHackMe — Jr Penetration Tester | Introduction to Web Hacking | Part-1 For the Part-2 (Command Injection) refer to TryHackMe — Jr Penetration Test...
Lesson 1 : Web App Penetration Testing ( Code Review )
Abdulrahman
2021-10-06
6
27
0
بسم الله الرحمن الرحيم
TryHackMe — Jr Penetration Tester | Introduction to Web Hacking | SQL Injection | Part-5
Aditya Sharma
2021-10-23
3
27
1
This would be the eleventh write-up for our series of TryHackMe learning Path- Jr Penetration Tester. This chapter contains 10 rooms,
Basic Pentesting [TryHackMe] Writeup
sec(b)log
2021-12-26
3
2
0
This is a machine that allows you to practice web app assesment and privilege escalation.
Day 18, Web Reconnaissance Or Information Gathering — Part 3#100DaysofHacking
Ayush Kumar
2022-01-22
4
60
0
Get all the writeups from Day 1 to 17, Click Here Or Click Here.
Day 16, Web Reconnaissance Or Information Gathering — Part 1#100DaysofHacking
Ayush Kumar
2022-01-20
5
17
0
Get all the writeups from Day 1 to 15, Click Here Or Click Here.
Day 17, Web Reconnaissance Or Information Gathering — Part 2#100DaysofHacking
Ayush Kumar
2022-01-21
5
34
1
Get all the writeups from Day 1 to 16, Click Here Or Click Here.
How to access Dark Web using a computer
Ahmet Göker
2022-01-09
4
131
0
Hey cyberSecDev,
Bug Bounty Methodology - Web Vulnerabilities Checklist
apex
2022-01-11
4
354
2
Hello guys, it’s me again. I know malware analysis might be boring because of debugging and code analysis especially for the people who are just getting started. So, I decided to change the topics specifically to bug bounty and pentesting. Today, I will be discussing about the methodology one should follow before perfo...
OWASP-LPU CTF: Web Challenges- Crawler and Stoppp Peeking!
Ansh Vaid
2022-02-21
3
0
0
Challenge Description
Portswigger Web Security Academy Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft
Jaebarnett
2023-12-21
2
0
0
“This lab contains a SQL injection vulnerability in the product category filter. You can use a UNION attack to retrieve the results from an injected query.”
Wireless Fortification: Pentesting Mastery with WebApp Pentesting
TechLatest.Net
2023-12-28
5
4
0
This blogpost is part of the course series on Cybersecurity and Kali Linux by Techlatest.net . For more details on other topics covered in the course, please refer to the course blogpost.
HACKBAR: A BROWSER EXTENSION FOR WEB SECURITY TESTING
Progsky
2024-07-04
2
0
0
If you are a web developer or a security enthusiast, you might want to test the security of your own or other websites. You might want to check for common vulnerabilities, such as SQL injection, XSS, CSRF, or broken authentication. You might also want to manipulate the HTTP requests and responses, such as changing the ...
Intro to Debugging Java Web Servers Without Source Code For Security Researchers
Jayateertha Guruprasad
2024-07-16
4
0
0
Debugging Java web servers in an on-premise environment is crucial for pentesting and source code reviews. It’s possible to easily decompile java based apps using tools like JD-GUI.
Scan the entire web in 45 minutes with Zmap!
Vasileiadis A. (Cyberkid)
2024-07-29
6
314
5
Most of you know the power of nmap and nmap scripts to identify a target and networks in general. These tools can be used for numerous tasks, from simple port scanning to service and version detection. Despite nmap’s power and simplicity, it can be tediously slow for scanning very large networks. This is where the inno...
Web Application Hacking and Security (WAHS) Certification Review
Kamal S
2023-11-11
3
2
4
Hello Everyone !!
Portswigger Web Security Academy Lab: SQL injection UNION attack, retrieving multiple values in a single column
Jaebarnett
2023-12-21
3
0
0
“This lab contains a SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response so you can use a UNION attack to retrieve data from other tables.
Part 1 -6.Web Services & APIs Overview
Saumya Kasthuri
2024-08-21
5
0
0
SOAP is a protocol for exchanging structured information in the implementation of web services. It relies on XML and is known for its rigidity and strict standards.
Part 1- 4.Web Application Security Fundamentals
Saumya Kasthuri
2024-08-21
6
0
0
4.1 Introduction to OWASP
End of preview. Expand in Data Studio

Medium Web Pentesting Articles

Dataset Description

A curated collection of 357 Medium articles focused on web penetration testing, scraped from Medium's search results for the query web pentesting. Each record includes article metadata and the opening snippet of the article body.

This dataset is useful for NLP tasks such as topic modeling, text classification, content recommendation, and summarization within the cybersecurity domain.


Dataset Details

Dataset Summary

Property Value
Source Medium.com (search?q=web+pentesting)
Total Records 357
Date Range 2015-09-24 to 2026-04-11
Language Multilingual (predominantly English)
License CC BY 4.0

Supported Tasks

  • Text Classification — classify articles by topic, difficulty, or tool type
  • Text Generation — generate article intros in the pentesting domain
  • Feature Extraction — extract embeddings for semantic search or clustering
  • Information Retrieval — build search indexes over pentesting content

Dataset Structure

Data Fields

Column Type Description
title string Title of the Medium article
author string Username/display name of the article author
date string Publication date in YYYY-MM-DD format
read_time_minutes int Estimated reading time in minutes (0 if not available)
claps int Number of claps (Medium's engagement metric); values like 1.4K have been converted to integers (e.g. 1400)
responses int Number of reader responses/comments
article_snippet string Opening paragraph or intro snippet scraped from the article body

Data Splits

This dataset is provided as a single split:

Split Records
train 357

Data Preprocessing

The raw scraped data underwent the following cleaning steps before upload:

  1. Dropped scraper metadata columnsweb_scraper_order, web_scraper_start_url, and go to were removed as they contain no semantic value.
  2. Dropped 3 null-blog rows — Articles with no extractable body text (likely paywalled or member-only) were removed.
  3. Filled claps and responses nulls with 0 — Missing engagement metrics are treated as zero engagement.
  4. Normalized claps notation — Values like 1.4K were converted to integers (1400).
  5. Parsed read_time_minutes — Extracted the numeric minute value from strings like "7 min read".
  6. Standardized date — Converted from "Jan 29, 2025" format to ISO "2025-01-29".
  7. Renamed blogarticle_snippet — To accurately reflect that this is the article's opening snippet, not the full text.

Note on article_snippet: This field contains only the opening paragraph of each article as captured by the scraper. Some entries are very short greetings (e.g., "Hello Everyone!", "Hey guys!") which reflect the actual article openings. The field is kept as-is to preserve fidelity to the source. Some articles are in languages other than English (Turkish, Portuguese, Arabic, etc.).


Dataset Statistics

Metric Value
Articles with 0 claps ~21%
Median claps 12
Max claps 1,400
Median read time 4 min
Max read time 27 min
Articles with responses ~17%

Example Records

{
  "title": "Web Application Pentests & The Basics",
  "author": "Mike Smith",
  "date": "2025-01-22",
  "read_time_minutes": 7,
  "claps": 68,
  "responses": 3,
  "article_snippet": "Hello Everyone!"
}
{
  "title": "Hacking With Cookies",
  "author": "Teri Radichel",
  "date": "2025-03-18",
  "read_time_minutes": 19,
  "claps": 6,
  "responses": 0,
  "article_snippet": "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~"
}

Source Data

Data Collection

Data was collected using a web scraper targeting Medium's public search endpoint:

https://medium.com/search?q=web+pentesting

The scraper captured article cards including title, author, date, read time, engagement counts, and the opening body snippet.

Who are the source data producers?

The articles are authored by individual Medium writers sharing knowledge about web penetration testing, bug bounty hunting, CTF writeups, and cybersecurity tooling.


Considerations for Using the Data

Social Impact

This dataset is intended for educational and research purposes in the cybersecurity NLP domain. It may help researchers build tools that assist security professionals in finding relevant literature and knowledge.

Bias and Limitations

  • Snippet-only content: The article_snippet is not the full article; full content is behind Medium's paywall for many posts.
  • English-dominant but multilingual: Most articles are in English, but Turkish, Portuguese, and Arabic articles are present without language labels.
  • Engagement bias: Articles with more claps may represent more popular or sensationalist content rather than higher quality.
  • Scraper limitations: read_time_minutes = 0 indicates the read time was not available, not that the article has no content.

Citation

If you use this dataset in your work, please cite:

@dataset{medium_web_pentesting_2026,
  title     = {Medium Web Pentesting Articles},
  year      = {2026},
  note      = {Scraped from Medium.com search results for "web pentesting"},
  license   = {CC BY 4.0}
}

Dataset Card Contact

For issues, corrections, or contributions, please open a discussion on the dataset repository.

Downloads last month
32