title large_stringlengths 5 121 | author large_stringlengths 3 31 | date large_stringdate 2015-09-24 00:00:00 2026-04-11 00:00:00 ⌀ | read_time_minutes int64 0 27 | claps int64 0 1.4k | responses int64 0 9 | article_snippet large_stringlengths 4 1.38k |
|---|---|---|---|---|---|---|
TryHackMe: [Day 2] Web Exploitation Elf HR Problems | Mac Leo | 2022-03-23 | 3 | 0 | 0 | ANS: No answer needed |
Web App Wednesday: Broken Access Control | Mike Smith | 2025-01-29 | 10 | 10 | 0 | Check out last weeks article here: Web App Wednesday — The Basics |
Web Application Pentests & The Basics | Mike Smith | 2025-01-22 | 7 | 68 | 3 | Hello Everyone! |
How I Built the Ultimate Web Hacking Checklist — And Why It’s Helping Bug Bounty Hunters Win More | ZishanAdThandar | 2025-05-02 | 0 | 0 | 0 | The checklist is a professionally structured PDF — designed for clarity, speed, and real-world use. |
Hacking With Cookies | Teri Radichel | 2025-03-18 | 19 | 6 | 0 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
The Red Teaming: 30-Day Challenge[9] | InfosecPandey | 2025-04-22 | 5 | 0 | 0 | Welcome to Day 9! Today’s focus is one of the most visible and targeted layers in the attack surface: web applications. These are often your first line into a target’s environment — whether it’s via login bypasses, insecure APIs, or outdated CMS components. |
🔍 How I discovered a hidden user thanks to server responses ? | phoenixcatalan | 2025-04-16 | 5 | 5 | 0 | My first real step into web hacking and it wasn’t what i thought it would be. |
Custom Headers: The Sneaky Trick Every Hacker Should Know | Rohit Suresh Borate | 2025-04-11 | 7 | 113 | 1 | Hey everyone! 👋 |
Tackling Conditional Blind SQLi Like a Pro: OSWE Prep Powered by Burp Suite | Anezaneo | 2025-05-04 | 9 | 17 | 1 | On the path to OSWE or chasing PortSwigger’s Web Security Academy certification? Imagine wielding your Burp Suite like Luke Skywalker wielded his lightsaber: |
Gourlex: A must-needed tool for bug hunters | loyalonlytoday | 2025-06-14 | 3 | 10 | 0 | This tool requires GoLang to run. Read the article below on how to install Go on your machine |
10 Tricks to Elevate Pentest Findings | Vijay Kumar Gupta | 2025-07-19 | 5 | 51 | 0 | Pentesting is more than just running scanners and submitting raw vulnerability reports. To stand out as a penetration tester, you must go beyond what automated tools reveal. You need to think like an attacker, chain vulnerabilities together, and extract maximum impact from seemingly low-risk issues. Here’s a deep dive ... |
Cariddi: Point It at Domains, Pull Out the Good Stuff | Javier Calderon Jr | 2025-08-29 | 6 | 0 | 0 | When you’re hunting for attack surface or doing housekeeping on your own web estate, two questions matter most: what’s out there and what secrets did we accidentally ship. Cariddi answers both. Feed it a list of domains and it will crawl, collect URLs, and flag anything interesting — API endpoints, tokens, API keys, se... |
Race Condition: a falha que pode comprometer seus sistemas | Rafael dos Santos | 2025-08-19 | 2 | 0 | 0 | Quando falamos em segurança de aplicações Web, normalmente pensamos em vulnerabilidades como SQL Injection, XSS ou problemas de autenticação. Mas existe uma falha menos comentada, que muitas vezes passa despercebida: o Race Condition. |
Intercepting LDAP With InterceptSuite | Sourav Kalal | 2025-08-28 | 6 | 6 | 1 | LDAP authentication is everywhere in networks, but intercepting encrypted LDAP traffic can be challenging. LDAP authentication in the web is generally handled by the backend, and from the frontend, we have HTTP, which is easy to intercept. |
Veritabanları (Databases) | Songül Kızılay Özügürler | 2026-02-14 | 4 | 0 | 0 | Web uygulamaları, web uygulamasıyla ilgili çeşitli içerik ve bilgileri saklamak için back-end veritabanlarını kullanır. Bu; resimler ve dosyalar gibi temel web uygulaması varlıkları (assets), postlar ve güncellemeler gibi web uygulaması içerikleri veya kullanıcı adı ve şifreler gibi kullanıcı verileri olabilir. Bu saye... |
A Deep Dive into CORS Misconfigurations | Cyb3r M!nds | 2026-02-18 | 4 | 70 | 2 | Hello👋 and welcome, fellow cyber explorers! Today, we’re diving into a common but dangerous flaw in modern web security: CORS (Cross-Origin Resource Sharing) misconfiguration. If you’ve ever wondered how an attacker can steal your private profile data just by getting you to click a link, this is how they do it. |
Lab: SQL injection UNION attack, finding a column containing text | Songül Kızılay Özügürler | 2026-03-09 | 3 | 1 | 0 | Geçen gün PortSwigger Web Security Academy’de çalışırken takıldım. Lab basit görünüyordu ama düşündüğümden biraz daha zekiceydi. Çözdükten sonra “bunu yazmam lazım” dedim, çünkü kafamda oturması biraz zaman aldı. |
When Login Features Become OSINT Signals: Leveraging Authentication Flows for Data Enrichment | Horus | 2026-04-10 | 3 | 0 | 0 | During a routine analysis of a web application’s authentication flow, I identified an interesting behaviour related to log in UX design. |
Lab: Method-based access control can be circumvented | Songül Kızılay Özügürler | 2025-12-12 | 4 | 51 | 0 | Bu yazıda PortSwigger Web Security Academy’deki bir laboratuvarın çözümünü ele alıyorum. Laboratuvarın temel konusu, uygulamanın erişim kontrolünü yalnızca belirli HTTP metodlarına göre kısıtlaması ve bunun nasıl kötüye kullanılabileceği. |
Lab: URL-based access control can be circumvented | Songül Kızılay Özügürler | 2025-12-11 | 2 | 55 | 0 | Bu web uygulamasında /admin altında korumasız bir yönetici paneli bulunuyor. Ancak front-end tarafında, dışarıdan gelen isteklerin /admin yoluna erişmesi engellenmiş durumda. Buna rağmen, arka plana güç veren framework X-Original-URL header’ını destekliyor. Bu da URL’nin header üzerinden override edilmesine ve erişim k... |
🔧 Top 5 Practical Uses of curl Every Engineer Should Know | Taha Ex | 2026-01-23 | 3 | 2 | 0 | One of the most common uses of curl is checking whether a service is alive, reachable, and responding correctly. |
BEGINEER’S CRASH COURSE FOR FINDING ACCESS CONTROL VULNERABILITIES IN THE WEB APPS:PART 2 | Cyber Defecers | 2020-05-29 | 20 | 107 | 0 | Some applications enforce access controls at the platform layer by restricting access to specific URLs and HTTP methods based on the user’s role. For example an application might configure rules like the following: |
BEGINEER’S CRASH COURSE FOR FINDING ACCESS CONTROL VULNERABILITIES IN THE WEB APPS:PART 1 | Cyber Defecers | 2020-05-29 | 17 | 300 | 0 | THIS BLOG POST WILL ASSIST PENTESTERS AND BUG BOUNTY HUNTERS TO COMPLETELY FAMILIARIZE THEMSELVES WITH THESE VULNERABILITES AND TO FIND THEM IN WEB APPS. |
TryHackMe: Basic Pentesting | ratiros01 | 2020-06-13 | 6 | 0 | 0 | [Task 1] Web App Testing and Privilege Escalation |
Basic Pentesting Writeup | Hacktivities | 2020-06-05 | 10 | 5 | 0 | This article outlines my approach to solving the “Basic Pentesting” room available on the TryHackMe platform for free to members. I have provided a link to TryHackMe in the References below, where you can signup and try hacking this virtual machine yourself. Without any further delay, lets jump in! |
Offensive Security Advanced Web Attacks and Exploitations (AWAE): What You Need To Know | Samuel Whang | 2020-06-06 | 4 | 16 | 0 | After obtaining my Offensive Security Certified Professional (OSCP) status, I started searching for a direction. The most common advice that I’ve received from many professionals, who are far more experienced than I am, was to specialize in something because it’s difficult to be an expert at everything. The difficult p... |
RapidScan Web Pestest Aracı Kurulumu ve Kullanımı | Erdinç Tandoğan | 2020-07-12 | 2 | 2 | 0 | RapidScan, Web Pentest için kullanılan ücretsiz bir araçtır. İçesinde 80'den fazla araç bulundurur ve bunların hepsini sizin için gerçekleştirir. |
Wapiti – free web-application vulnerability scanner | Nemesida WAF | 2020-07-20 | 8 | 14 | 0 | In the previous article we talked about Nemesida WAF Free – a free web application firewall for protecting web sites and API against hacker attacks, and in this article we decided to review the popular web application vulnerability scanner – Wapiti. |
Juice Shop for Newbies | Sophie Kaelin | 2021-04-16 | 9 | 67 | 0 | Hi Everyone ! |
SSI — Server Side Include Injection | Vikas Sharma | 2021-05-18 | 4 | 140 | 0 | Let us say , we have a web application containing multiple pages , each requires a change in the specific content (like may be name of user or anything). Therefore it would be difficult to change the HTML code manually every single time. This is where Server Side Inclusion takes place which can dynamically inject the r... |
5 Ways to Test Password Reset Function | MikeChan | 2021-06-26 | 4 | 328 | 2 | Password reset is a function commonly founded in modern web app. This function normally would be the first function I tested in every web app as once a bug is founded, it is normally a critical one. In this article, I would show several ways to test this function. |
How You Can Escalate a Simple HTML Injection Into a Critical SSRF | Faizan Nehal | 2021-06-21 | 6 | 398 | 1 | SSRF or Server Side Request Forgery is a type of vulnerability where the attacker can make the request on behalf of the vulnerable web server and can fetch any internal file from the server, this is the most precise summary of the bug I can come up with. It is one of the hottest bugs to find as the number of attacks th... |
Leveraging Postman Collections for Offensive Webapp Testing | Pasquale | 2021-08-13 | 4 | 2 | 0 | I was recently in an engagement with a web application that was interconnected with about half a dozen services while offering up a few dozen API routes that had to be tested within three days. As I stared at the flow chart provided and tried to gather an understanding of what I needed to test I thought to myself: |
Creating simple middleware for easy exploitation of second-order injections like SQLi, SSTI, etc | n00🔑 | 2021-10-27 | 4 | 7 | 0 | Second order injection is code injection vulnerability in which unfiltered user input is not directly being passed to the query by web application. Sometimes unfiltered user input is first gets stored in database before going to the query. These types of injections cannot be usually detected by automated scanners, as w... |
eWPT Review | Anon Tuttu Venus | 2021-10-18 | 3 | 33 | 0 | I have successfully completed eLearnSecurity Web Application Penetration Testing (WAPT) certification. Let me share my experience with you guys. |
Information Gathering&scanning for sensitive information[ Reloaded ] | Abdur Rahman Maheer | 2021-10-02 | 15 | 652 | 9 | Testing Web-Application/Network , Information Gathering is important before we test for vulnerability on the target? |
Lab: Blind SQL injection with conditional errors 💉 | Katjah Smith👩🏽💻 | 2022-02-16 | 4 | 9 | 0 | Hey, cyber security folks! This blog will focus on Blind SQL injection with conditional errors based on the lab on Web Security Academy using Burp Suit — SQL learning path. |
TryHackMe — OWASP Top 10 — Injection | Katjah Smith👩🏽💻 | 2022-03-06 | 2 | 1 | 0 | What strange text file is in the website root directory? |
WebSocket Pen Testing | Alex Rodriguez | 2022-04-06 | 8 | 37 | 1 | Hello, 🌎 ! In this blog, I want to provide an introduction to WebSocket pen testing by explaining what WebSockets are and how they are used, and then provide a walkthrough for all WebSocket labs found in PortSwigger’s amazing Web Security Academy. |
Burp Academy Labs — Bypassing Authentication | Lsec | 2022-05-31 | 2 | 1 | 0 | SQL Injection is dangerous and should be taken seriously. Nowadays most of the web frameworks are mitigating such vulnerabilities by default but developers mistakes could lead into creating one. On my blog and my YouTube channel: Lsecqt — YouTube I am focusing on the offensive side of things, trying to teach concepts a... |
HackTheBox-Pandora | ARZ101 | 2022-05-21 | 8 | 1 | 0 | Pandora was an easy rated linux machine, starting the box with an nmap scan, there was a web server hosting a template web page, nothing really was of interest on the site, after scanning UDP ports, SNMP service running which reavled a script being ran along with username password being passed as arguments which gave a... |
What I’ve learned from studying Cybersecurity for 1 week | Rodolfo Martins | 2022-07-22 | 2 | 1 | 0 | As a Web Developer, it is important to me to know methods and types of attacks that can be performed on Web Applications. |
HackTheBox-Acute | ARZ101 | 2022-07-16 | 13 | 16 | 0 | Acute was hard rated box which involved enumerating the web site to find a word document having the link to PowerShell Web Access (PSWA) also having the hostname in meta data and the password in the document, the username was found through the about page from the site, giving us PSWA for evadies, having landed on a con... |
Server-Side Request Forgery(SSRF) demo on CYBERTALENTS | Muhammad sani Nasiru{C4L33PH4} | 2022-08-27 | 4 | 1 | 0 | Server Side Request Forgery is a web security vulnerability that allows the attacker to interact with the internal infrastructure of the target which is not accessible from outside the target network. The attacker targets an application that supports data imports from URLs or allows them to read data from URLs. |
My Journey: From Pentest to Red Team to Blue | Carrie Roberts | 2022-08-11 | 5 | 76 | 0 | I was a web application developer in 2010 when I learned about pentesting. I fell in love with the idea that I could get paid to break everyone else’s apps instead of making mine work. After three years of awesome training from the SANS Institute and a lot of CTFs, I landed my first pentest job with Black Hills Informa... |
Hacking JSON Web Token (JWT) | pwnzzzz | 2018-05-03 | 5 | 1,400 | 7 | Hey, |
Exploiting freely accessible WhatsApp data or “Why does WhatsApp web know my phone’s battery level?” | Juan Cortés | 2018-07-08 | 7 | 342 | 1 | This all started with the title's simple question. I was aware that the desktop app communicated with the phone after the initial handshake (that part where you have to scan a QrCode so that it knows it's you and not someone else trying to read your conversations) but I wanted to know exactly what information was being... |
Pentesting basics: Cookie Grabber (XSS) | Laur Telliskivi | 2018-10-25 | 6 | 212 | 0 | In 2017, injection (attack) was identified by OWASP as the most serious web application security risk for a broad array of organizations. In this tutorial I will be doing a cross-site scripting attack against a vulnerable web application using Javascript. So what is this cross-site scripting attack? |
Web App Pentest Cheat Sheet | Murat Karaöz | 2018-10-06 | 12 | 321 | 0 | Everybody has their own checklist when it comes to pen testing. If you are new to pen-testing, you can follow this list until you build your own checklist. I have extracted these steps from OWASP testing guide and I believe it is a good starting point. |
Unknown | Nemesis Contreras | 2018-11-02 | 3 | 4 | 0 | Testing for SQLi Web Vulnerabilities Application Walk-trough |
What Moving To the Bay Area Taught Me About Loving My Pentesting Tools (Burp Suite vs Fiddler) | Inon Shkedy | 2018-12-06 | 7 | 176 | 1 | Let’s talk for a moment about love, relationships and commitment… |
HTB — HDC Web Challenge Write-up | Pedro Henrique Cardoso | 2019-02-05 | 5 | 5 | 0 | Before, read this message: The objective of HTB is to improve your skills, if you have not been able to win this level, I recommend you to take a walk, a coffee or just take a break and try it later. If you have already tried enough times and don’t want to keep trying, read this write-up, see in which parts you flawed ... |
@TryHackMe — Basic Pentesting Room | Jasmine Jackson | 2019-03-11 | 5 | 13 | 0 | Another day, another challenge. |
Pentesting CORS | Teri Radichel | 2019-08-23 | 6 | 25 | 0 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
Tokopedia Web Security Workshop | Deny | 2019-08-13 | 4 | 64 | 0 | On Thursday, 11 July 2019, Tokopedia IT Security team had successfully held the first IT Security Workshop — Web Application Security. The workshop was attended by 25 selected participants out of the 350 enthusiastic registrants across Indonesia that come from various industries, including the technology industry. |
Capture The Flag (CTF) | Chandni Vaya | 2019-03-03 | 4 | 27 | 1 | As a cyber security student and a puzzle lover I am always fascinated by capture the flag challenges. As a result I signed up for various online CTF platforms including cybertalents.com. The platform has various challenges in different domains like cryptography, web security, network security, digital forensics, etc th... |
Server Side Request Forgery(SSRF){port issue hidden approch } | Deepak Holani | 2019-05-03 | 3 | 482 | 1 | Hello, |
How to Write a Better Vulnerability Report | Vickie Li | 2019-06-26 | 6 | 913 | 3 | An essential skill for a security researcher is the ability to write concise and clear vulnerability reports. A well-written vulnerability report will help the security team reproduce and fix the issue faster and minimize the possibility of exploitation. In this post, we are going to go into the components of a good vu... |
Out of Scope | Vickie Li | 2019-08-27 | 4 | 145 | 0 | Okay, I’ve got to admit, I’m not proud of it… But I’ve gotten N/As before, lots of them. And I’ve also been told that my reports were “informative”, many times over. |
The Secret step-by-step Guide to learn Hacking — Spoonfed Edition! | Eshaan Bansal | 2019-08-20 | 4 | 800 | 2 | Step 1: Get your super black hacker hoodie and guy Fawkes mask
Step 2: Go to https://hackertyper.net and start typing.
Step 3: they believe you are hacker
Step 4: you are hacker. |
Attacking Sites Using CSRF | Vickie Li | 2019-08-16 | 4 | 412 | 1 | The criticality of a CSRF vulnerability depends heavily on where the vulnerability is located. Sometimes, faulty CSRF protection mechanisms lead to inconsequential issues like unauthorized setting changes or emptying a user’s cart. Other times, they lead to much bigger issues: user information leak, XSS and even one-cl... |
Bypassing CSRF Protection | Vickie Li | 2019-08-22 | 5 | 1,200 | 3 | Psssst. Before you read on, please make sure that you understand the basic concepts of CSRF. You can read about it here: |
How to find more IDORs | Vickie Li | 2019-09-17 | 5 | 1,300 | 4 | I love IDORs. They are easy to find, simple to exploit and often carry significant business impact. They were the root causes of some of the most critical vulnerabilities that I’ve found. |
Don’t make your .git folder publicly accessible, hacker can steal your source code | David Adi Nugroho | 2020-04-15 | 2 | 16 | 0 | Have you ever realized the danger of a publicly accessible .git folder? |
The Story of My first 4 digit bounty from Facebook | Sudip Shah | 2020-07-17 | 2 | 462 | 1 | I was just trying to test each and every function that the FBLite app have and I found one suspicious behaviour which leads to Page Admin Disclosure. It is fixed currently so I’m disclosing it publicly . |
Dot-Dot-Slash And Web App Crash | Hacktory | 2020-07-13 | 3 | 27 | 1 | Directory traversal (or path traversal) is a vulnerability, the exploitation of which enables an attacker to read arbitrary files on an application’s server (source code, application data, backend credentials, OS files). In some cases, an attacker can write information to the files stored on the server, thus changing d... |
Attacking JSON Web Tokens (JWTs) | Neha Tariq | 2020-11-09 | 7 | 746 | 1 | Forge the token to gain unauthorized access! |
Web App #Penetration Testing for Beginners: | CyberBruhArmy | 2021-01-26 | 2 | 16 | 0 | 1.Testing for browser cache weaknesses // Assessing Authentication Schemes // Web App Penetration |
Web-Application Security Resources | Vikas Sharma | 2021-02-07 | 3 | 12 | 0 | Got stuck?? Want to learn web hacking…Don’t know where to start from? |
DEFEND-THE-WEB INTRO 1–7 CHALLENGES | Vikas Sharma | 2021-03-13 | 3 | 0 | 0 | Challenges |
Build your own Pentesting labs on Amazon AWS | KF dogbe | 2021-03-03 | 6 | 25 | 0 | This guide help penetration tester build pentesting Lab on amazon AWS, in case, you don’t have direct access to targets penetration testing vulnerable lab environment. My next topic will go through analyses different exploitation techniques utilizing Metasploit, scanning, vulnerability assessment using multiple tools w... |
TryHackMe - Basic Pentesting | David Varghese | 2021-03-18 | 9 | 20 | 0 | In these set of tasks you’ll learn the following: |
Get a Feel of JWT ( JSON Web Token ) | Anubhav Singh | 2021-06-18 | 7 | 459 | 4 | Hello Friends, Well, this is my first write-up, and there might be a ton of mistakes as I go along writing it out, so please give me feedback so that I can work over it. This article will give you a feel about What is JWT and How they are made? |
CBOR Web Tokens (CWTs) | SecurityGOAT | 2021-07-23 | 2 | 15 | 0 | Heard of JWT tokens? I am sure you have! If not, then please check out this introductory post from Auth0 folks. |
Attacks on JSON Web Token (JWT) | Anubhav Singh | 2021-07-30 | 9 | 463 | 3 | In part1 of the article, I introduced JSON web tokens that what is JWT and How they are made? I prefer to take a look at that before you go through this article. |
A Developer’s Guide to Web App VAPT Essentials | Dev·edium | 2023-06-25 | 8 | 0 | 0 | Navigating the Intricacies of Vulnerability Assessment and Penetration Testing in Web Applications |
Unknown | Iam_Wander | 2023-06-28 | 4 | 1 | 1 | TryHackMe | Offensive Pentesting | Vulnversity |
eLearnSecurity Web Application Penetration Tester eXtreme Certificate Review — eWPTXv2 | Omar Elshopky (3l5h0pky) | 2023-06-22 | 8 | 4 | 0 | In today’s digital landscape, where web applications play a pivotal role in both personal and professional domains, ensuring their security has become increasingly critical. |
Exploit web application’s Using Python | Imran Niaz | 2023-06-11 | 4 | 7 | 0 | Hello hope you’re having a wonderful day my name is Imran as you know me with my profile. I love to break things since the day when I born I never protect single thing. |
Basic Pentesting — TryHackMe WriteUp | Wilklins Nyatteng | 2023-07-10 | 3 | 0 | 0 | This is a machine that allows you to practise web app hacking and privilege escalation. |
Mastering Web Security with Burp Suite on Linux: A Comprehensive Guide | TechLatest.Net | 2023-08-29 | 3 | 0 | 0 | In the realm of cybersecurity, securing web applications and identifying vulnerabilities are of utmost importance. As web technology evolves, so do the tools designed to analyze and fortify these applications. Burp Suite, a powerful web vulnerability scanner and penetration testing tool, stands as a beacon in this land... |
TryHackMe — Jr Penetration Tester | Introduction to Web Hacking | Cross-site Scripting | Part-3 | Aditya Sharma | 2021-10-23 | 2 | 56 | 2 | This would be the eighth write-up for our series of TryHackMe learning Path- Jr Penetration Tester. This chapter contains 10 rooms,
For the Part-1(First 5 rooms) refer to TryHackMe — Jr Penetration Tester | Introduction to Web Hacking | Part-1
For the Part-2 (Command Injection) refer to TryHackMe — Jr Penetration Test... |
Lesson 1 : Web App Penetration Testing ( Code Review ) | Abdulrahman | 2021-10-06 | 6 | 27 | 0 | بسم الله الرحمن الرحيم |
TryHackMe — Jr Penetration Tester | Introduction to Web Hacking | SQL Injection | Part-5 | Aditya Sharma | 2021-10-23 | 3 | 27 | 1 | This would be the eleventh write-up for our series of TryHackMe learning Path- Jr Penetration Tester. This chapter contains 10 rooms, |
Basic Pentesting [TryHackMe] Writeup | sec(b)log | 2021-12-26 | 3 | 2 | 0 | This is a machine that allows you to practice web app assesment and privilege escalation. |
Day 18, Web Reconnaissance Or Information Gathering — Part 3#100DaysofHacking | Ayush Kumar | 2022-01-22 | 4 | 60 | 0 | Get all the writeups from Day 1 to 17, Click Here Or Click Here. |
Day 16, Web Reconnaissance Or Information Gathering — Part 1#100DaysofHacking | Ayush Kumar | 2022-01-20 | 5 | 17 | 0 | Get all the writeups from Day 1 to 15, Click Here Or Click Here. |
Day 17, Web Reconnaissance Or Information Gathering — Part 2#100DaysofHacking | Ayush Kumar | 2022-01-21 | 5 | 34 | 1 | Get all the writeups from Day 1 to 16, Click Here Or Click Here. |
How to access Dark Web using a computer | Ahmet Göker | 2022-01-09 | 4 | 131 | 0 | Hey cyberSecDev, |
Bug Bounty Methodology - Web Vulnerabilities Checklist | apex | 2022-01-11 | 4 | 354 | 2 | Hello guys, it’s me again. I know malware analysis might be boring because of debugging and code analysis especially for the people who are just getting started. So, I decided to change the topics specifically to bug bounty and pentesting. Today, I will be discussing about the methodology one should follow before perfo... |
OWASP-LPU CTF: Web Challenges- Crawler and Stoppp Peeking! | Ansh Vaid | 2022-02-21 | 3 | 0 | 0 | Challenge Description |
Portswigger Web Security Academy Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft | Jaebarnett | 2023-12-21 | 2 | 0 | 0 | “This lab contains a SQL injection vulnerability in the product category filter. You can use a UNION attack to retrieve the results from an injected query.” |
Wireless Fortification: Pentesting Mastery with WebApp Pentesting | TechLatest.Net | 2023-12-28 | 5 | 4 | 0 | This blogpost is part of the course series on Cybersecurity and Kali Linux by Techlatest.net . For more details on other topics covered in the course, please refer to the course blogpost. |
HACKBAR: A BROWSER EXTENSION FOR WEB SECURITY TESTING | Progsky | 2024-07-04 | 2 | 0 | 0 | If you are a web developer or a security enthusiast, you might want to test the security of your own or other websites. You might want to check for common vulnerabilities, such as SQL injection, XSS, CSRF, or broken authentication. You might also want to manipulate the HTTP requests and responses, such as changing the ... |
Intro to Debugging Java Web Servers Without Source Code For Security Researchers | Jayateertha Guruprasad | 2024-07-16 | 4 | 0 | 0 | Debugging Java web servers in an on-premise environment is crucial for pentesting and source code reviews. It’s possible to easily decompile java based apps using tools like JD-GUI. |
Scan the entire web in 45 minutes with Zmap! | Vasileiadis A. (Cyberkid) | 2024-07-29 | 6 | 314 | 5 | Most of you know the power of nmap and nmap scripts to identify a target and networks in general. These tools can be used for numerous tasks, from simple port scanning to service and version detection. Despite nmap’s power and simplicity, it can be tediously slow for scanning very large networks. This is where the inno... |
Web Application Hacking and Security (WAHS) Certification Review | Kamal S | 2023-11-11 | 3 | 2 | 4 | Hello Everyone !! |
Portswigger Web Security Academy Lab: SQL injection UNION attack, retrieving multiple values in a single column | Jaebarnett | 2023-12-21 | 3 | 0 | 0 | “This lab contains a SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response so you can use a UNION attack to retrieve data from other tables. |
Part 1 -6.Web Services & APIs Overview | Saumya Kasthuri | 2024-08-21 | 5 | 0 | 0 | SOAP is a protocol for exchanging structured information in the implementation of web services. It relies on XML and is known for its rigidity and strict standards. |
Part 1- 4.Web Application Security Fundamentals | Saumya Kasthuri | 2024-08-21 | 6 | 0 | 0 | 4.1 Introduction to OWASP |
Medium Web Pentesting Articles
Dataset Description
A curated collection of 357 Medium articles focused on web penetration testing, scraped from Medium's search results for the query web pentesting. Each record includes article metadata and the opening snippet of the article body.
This dataset is useful for NLP tasks such as topic modeling, text classification, content recommendation, and summarization within the cybersecurity domain.
Dataset Details
Dataset Summary
| Property | Value |
|---|---|
| Source | Medium.com (search?q=web+pentesting) |
| Total Records | 357 |
| Date Range | 2015-09-24 to 2026-04-11 |
| Language | Multilingual (predominantly English) |
| License | CC BY 4.0 |
Supported Tasks
- Text Classification — classify articles by topic, difficulty, or tool type
- Text Generation — generate article intros in the pentesting domain
- Feature Extraction — extract embeddings for semantic search or clustering
- Information Retrieval — build search indexes over pentesting content
Dataset Structure
Data Fields
| Column | Type | Description |
|---|---|---|
title |
string |
Title of the Medium article |
author |
string |
Username/display name of the article author |
date |
string |
Publication date in YYYY-MM-DD format |
read_time_minutes |
int |
Estimated reading time in minutes (0 if not available) |
claps |
int |
Number of claps (Medium's engagement metric); values like 1.4K have been converted to integers (e.g. 1400) |
responses |
int |
Number of reader responses/comments |
article_snippet |
string |
Opening paragraph or intro snippet scraped from the article body |
Data Splits
This dataset is provided as a single split:
| Split | Records |
|---|---|
train |
357 |
Data Preprocessing
The raw scraped data underwent the following cleaning steps before upload:
- Dropped scraper metadata columns —
web_scraper_order,web_scraper_start_url, andgo towere removed as they contain no semantic value. - Dropped 3 null-blog rows — Articles with no extractable body text (likely paywalled or member-only) were removed.
- Filled
clapsandresponsesnulls with0— Missing engagement metrics are treated as zero engagement. - Normalized
clapsnotation — Values like1.4Kwere converted to integers (1400). - Parsed
read_time_minutes— Extracted the numeric minute value from strings like"7 min read". - Standardized
date— Converted from"Jan 29, 2025"format to ISO"2025-01-29". - Renamed
blog→article_snippet— To accurately reflect that this is the article's opening snippet, not the full text.
Note on
article_snippet: This field contains only the opening paragraph of each article as captured by the scraper. Some entries are very short greetings (e.g., "Hello Everyone!", "Hey guys!") which reflect the actual article openings. The field is kept as-is to preserve fidelity to the source. Some articles are in languages other than English (Turkish, Portuguese, Arabic, etc.).
Dataset Statistics
| Metric | Value |
|---|---|
| Articles with 0 claps | ~21% |
| Median claps | 12 |
| Max claps | 1,400 |
| Median read time | 4 min |
| Max read time | 27 min |
| Articles with responses | ~17% |
Example Records
{
"title": "Web Application Pentests & The Basics",
"author": "Mike Smith",
"date": "2025-01-22",
"read_time_minutes": 7,
"claps": 68,
"responses": 3,
"article_snippet": "Hello Everyone!"
}
{
"title": "Hacking With Cookies",
"author": "Teri Radichel",
"date": "2025-03-18",
"read_time_minutes": 19,
"claps": 6,
"responses": 0,
"article_snippet": "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~"
}
Source Data
Data Collection
Data was collected using a web scraper targeting Medium's public search endpoint:
https://medium.com/search?q=web+pentesting
The scraper captured article cards including title, author, date, read time, engagement counts, and the opening body snippet.
Who are the source data producers?
The articles are authored by individual Medium writers sharing knowledge about web penetration testing, bug bounty hunting, CTF writeups, and cybersecurity tooling.
Considerations for Using the Data
Social Impact
This dataset is intended for educational and research purposes in the cybersecurity NLP domain. It may help researchers build tools that assist security professionals in finding relevant literature and knowledge.
Bias and Limitations
- Snippet-only content: The
article_snippetis not the full article; full content is behind Medium's paywall for many posts. - English-dominant but multilingual: Most articles are in English, but Turkish, Portuguese, and Arabic articles are present without language labels.
- Engagement bias: Articles with more claps may represent more popular or sensationalist content rather than higher quality.
- Scraper limitations:
read_time_minutes = 0indicates the read time was not available, not that the article has no content.
Citation
If you use this dataset in your work, please cite:
@dataset{medium_web_pentesting_2026,
title = {Medium Web Pentesting Articles},
year = {2026},
note = {Scraped from Medium.com search results for "web pentesting"},
license = {CC BY 4.0}
}
Dataset Card Contact
For issues, corrections, or contributions, please open a discussion on the dataset repository.
- Downloads last month
- 32