Open in app

Sign in

Write

Sign in

Regan Temudo
Regan Temudo

143 followers

Home

About

System Weakness

Published in

System Weakness

Web Application Hacking: Where do I Even Start?

If you’re stepping into the world of bug bounty hunting, penetration testing, or just want to level up your web hacking skills, you’re…

3d ago
Web Application Hacking: Where do I Even Start?
Web Application Hacking: Where do I Even Start?
3d ago

6 Things I Learned on Reddit That Changed My Life More Than Any Self-Help Book

I was scrolling through Reddit the other night, just looking to kill time. Instead, I stumbled on a goldmine — a simple post asking, “What…

5d ago
6 Things I Learned on Reddit That Changed My Life More Than Any Self-Help Book
6 Things I Learned on Reddit That Changed My Life More Than Any Self-Help Book
5d ago

WordPress User Enumeration via author-sitemap.xml on Payapps.com

Introduction

May 4
WordPress User Enumeration via author-sitemap.xml on Payapps.com
WordPress User Enumeration via author-sitemap.xml on Payapps.com
May 4

From Anonymous SMB to SYSTEM: Hacking HTB’s “Support” Like a Boss

“Sometimes it’s the easy ones that teach you the most.”

May 1
From Anonymous SMB to SYSTEM: Hacking HTB’s “Support” Like a Boss
From Anonymous SMB to SYSTEM: Hacking HTB’s “Support” Like a Boss
May 1

The CVE Program Is Going Dark — And Cybersecurity May Never Be the Same

“This isn’t just about a database. It’s about the backbone of global cybersecurity communication.”  — A concerned security professional…

Apr 16
1
The CVE Program Is Going Dark — And Cybersecurity May Never Be the Same
The CVE Program Is Going Dark — And Cybersecurity May Never Be the Same
Apr 16
1

Unlocking Hidden Paths: Web Fuzzing with FFUF

Introduction

Apr 11
Unlocking Hidden Paths: Web Fuzzing with FFUF
Unlocking Hidden Paths: Web Fuzzing with FFUF
Apr 11
OSINT Team

Published in

OSINT Team

Using Instagram For Open-Source Intelligence

In the realm of cybersecurity and intelligence gathering, Open-Source Intelligence (OSINT) plays a crucial role. Among the various of…

Apr 8
Using Instagram For Open-Source Intelligence
Using Instagram For Open-Source Intelligence
Apr 8

Bypassing 2FA to Impersonate Users on Drugs.com

Hey Security Enthusiasts! A serious authentication flaw was recently discovered on Drugs.com, allowing attackers to bypass Two-Factor…

Mar 16
Bypassing 2FA to Impersonate Users on Drugs.com
Bypassing 2FA to Impersonate Users on Drugs.com
Mar 16

DOM-Based Reflected XSS in MTN Group’s Notification Server

Introduction

Feb 5
1
DOM-Based Reflected XSS in MTN Group’s Notification Server
DOM-Based Reflected XSS in MTN Group’s Notification Server
Feb 5
1

TryHackMe | Source | Walkthrough

Exploit a Recent Webmin Vulnerability and Take Control #Cybersecurity #Writeup #TryHackMe

Jan 4
TryHackMe | Source | Walkthrough
TryHackMe | Source | Walkthrough
Jan 4
Regan Temudo

Regan Temudo

143 followers

16 Row / 7 Column

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech