Go to InfoSec Write-ups
About
InfoSec Write-ups
A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. In a nutshell, we are the largest InfoSec publication on Medium. #sharingiscaring
Note from the editor

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. In a nutshell, we are the largest InfoSec publication on Medium. #sharingiscaring

Editors
Go to the profile of Sai Krishna Kothapalli
Sai Krishna Kothapalli
Founder/CEO Hackrew | Security Researcher | Indian | Student @ IIT Guwahati
Go to the profile of Anangsha Alammyan
Anangsha Alammyan
Civil engineer | Lover of fantasy fiction | Author of Stolen Reflections: Some Stories are Told in Verse (https://goo.gl/i2pd6j)
Writers
Go to the profile of Aagam shah
Aagam shah
sorting out...🐞🐞🐞
Go to the profile of Th3G3nt3lman
Go to the profile of Neeraj Sonaniya
Neeraj Sonaniya
Whitehat Security Researcher
Go to the profile of Sriram
Sriram
Security Researcher | Director, Co-Founder — PrimeFort Pvt. Ltd.
Go to the profile of Yogendra Jaiswal (Vulnholic)
Yogendra Jaiswal (Vulnholic)
Independent web application security Researcher
Go to the profile of HassanKhanYusufzai
HassanKhanYusufzai
Web Penetration Tester & Security Analyst Acknowledged by Top companies including Google,Microsoft ,Twitter, Ebay, Sony and Many others.
Go to the profile of Vipin Chaudhary
Vipin Chaudhary
Security Researcher | Bug Bounty Hunter
Go to the profile of Armaan Pathan
Go to the profile of Muhammad Khizer Javed
Muhammad Khizer Javed
Some of My Friends Think That I’m a geeky hacker, but I don’t know anything about computers. #Penetration_tester on #HackerOne & #Bugcrowd
Go to the profile of Mohammed Ali
Mohammed Ali
Security Researcher & Web Developer
Go to the profile of Luka Sikic
Luka Sikic
OSCP, OSCE — Pwning since 99'
Go to the profile of hyde
hyde
Security Researcher, Programmer, Full Stack Developer, & Businessman.
Go to the profile of Avinash Jain (https://twitter.com/logicbomb_1)
Avinash Jain (https://twitter.com/logicbomb_1)
Lead Infrastructure Security Engineer @groferseng | DevSecops | Part time BugBounty Hunter | Acknowledged by Google, NASA etc.
Go to the profile of NoGe
NoGe
researcher | #mufc
Go to the profile of Anand Prakash
Go to the profile of Waleed Ahmed
Go to the profile of Max Pasqua
Max Pasqua
18 year old Cyber Security Researcher from Canada
Go to the profile of Joshua Regio
Joshua Regio
Independent Bug Hunter
Go to the profile of Artem Moskowsky
Artem Moskowsky
Security Researcher
Go to the profile of Elber Andre
Elber Andre
Bug bonty Hunter, CTF player, Pentester freelance.
Go to the profile of Prateek Tiwari
Prateek Tiwari
Security/Vulnerability Researcher. Helping companies secure their business. AND Designer, Developer. Sometimes
Go to the profile of Rojan Rijal
Rojan Rijal
Security Analyst at HackerOne / Bug Bounty Hunter in free time: https://hackerone.com/uranium238. Test
Go to the profile of Alyssa Herrera
Alyssa Herrera
I’m an information security researcher who specializes in web application security. I work with Synack Red team and I work as a full time bug bounty hunter
Go to the profile of Gokul Chandrasekaran
Go to the profile of Minture
Minture
Student and Researcher in the area of ​​information security, #WEB #Pentester #PHP #Python #Developer Acknowledged by : Microsoft
Go to the profile of Yuval Shprinz
Yuval Shprinz
Cybersecurity hobbyist, university student, Age of Mythology pro
Go to the profile of Aneesh Dogra
Go to the profile of F3D.
F3D.
@f3d__ · security researcher · hacking · pentesting · beat-making · crypto
Go to the profile of vishnuraj
vishnuraj
Security engineer @ UST Global | OSCP |
Go to the profile of Auxy
Auxy
Update faster: www.auxy.xyz .
Go to the profile of Vishnu Prasad P G
Go to the profile of 0Katz
Go to the profile of Rick Deacon
Rick Deacon
Hacker, exec, car enthusiast.
Go to the profile of Sanjay Singh Jhala
Go to the profile of res1n
Go to the profile of theMiddle
theMiddle
Security Researcher
Go to the profile of Ronald Stoner
Ronald Stoner
Security and Infrastructure Guy | Stoner Consulting LLC | Hackmethod Team | PGP EF20BF3B | stonerconsulting.io
Go to the profile of Shivam Singh Sengar
Shivam Singh Sengar
Arr[ ] = {Blogger, Writer, Thinker, Coder, Reverser, Sketcher}; Task.perform(Arr[random.nextInt(6)]);
Go to the profile of Rahul R
Rahul R
Security NOOB :)
Go to the profile of Sangeetha Rajesh S
Sangeetha Rajesh S
In ❤ with InfoSec
Go to the profile of Defmax
Defmax
A Cyber Security Firm
Go to the profile of Inti De Ceukelaire
Go to the profile of Adam Toscher
Adam Toscher
Adam is a offensive security engineer and red team operator with over 20 years of experience in IT
Go to the profile of Sarmad Hassan (Juba Baghdad)
Sarmad Hassan (Juba Baghdad)
We work in the darkness, but serve the light
Go to the profile of Paul Dannewitz
Paul Dannewitz
Programming, Designing, Security, Music. That’s a good description.
Go to the profile of M Harsha Vardhan
M Harsha Vardhan
Certified Ethical Hacker,Security Analyst,Focused on Exploitation. VAPT & WAPT Engineer.
Go to the profile of Jake Reynolds
Jake Reynolds
https://jakereynolds.co All contents of this blog are not associated with my employer.
Go to the profile of Koen Rouwhorst
Go to the profile of Mohammad Nurnobi
Mohammad Nurnobi
don’t be so sweet that people swallow you up, nor so bitter that they spit you out. -Luqman (ah)
Go to the profile of Florian Kunushevci
Go to the profile of Emad Shanab
Emad Shanab
A lawyer & A noooob & every law has it’s own bugs 🐜 fb.com/Alra3ees — linkedin.com/in/Alra3ees
Go to the profile of Ankit pandey
Go to the profile of Mandeep Jadon
Mandeep Jadon
MusicAddict |Bathroom Singer | Meme Addict |Bug Hunter | Writer | Philosopher | Poet
Go to the profile of Xiaoyin Liu
Go to the profile of Shreyansh Singh
Shreyansh Singh
Computer Science sophomore at IIT BHU. CTF enthuiast.
Go to the profile of Mark Christian Deduyo
Go to the profile of Maxime Leblanc
Go to the profile of Kanishka
Kanishka
Netizen
Go to the profile of Arjun C Shekar
Arjun C Shekar
A Professional Hacker, Threat Analyst, Knows about Kali Linux and other penetration testing distros, Passionate Photographer, Action Movie Lover
Go to the profile of Arbaz Hussain
Arbaz Hussain
~Kiraak-Boy~
Go to the profile of AneesKhan
Go to the profile of denwilly
Go to the profile of Yeasir Arafat
Yeasir Arafat
A Penetration Tester from Bangladesh.
Go to the profile of Luke Stephens (@hakluke)
Luke Stephens (@hakluke)
Pentester | Hubby | Musician | On a mission to free my thoughts and actions from the limits which are imposed on them by society.
Go to the profile of Rohan Chavan
Rohan Chavan
CyberSecurity researcher,BugBounty Hunter, CTF junkie, computer engg student.https://p5yph3r.github.io/
Go to the profile of Muhammad Uwais
Go to the profile of Ak1T4
Ak1T4
WhiteHat Hacker Zen Monk & Bounty Hunter
Go to the profile of Vincent Yiu
Vincent Yiu
Advanced Threat Replication. Simulating real threat actors using bleeding edge techniques.
Go to the profile of Hisham Mir
Go to the profile of Ark
Ark
Lead dev —
Go to the profile of Meridian Miftari
Go to the profile of Adrien
Adrien
Cybersecurity Lover (Padawan Level) — Security Consultant the day, Bug Hunter at night - #InfoSec #BugBounty PawQPW4dWXjV
Go to the profile of Sanyam Chawla
Sanyam Chawla
Information Security Specialist || Penetration Tester || Ethical Hacker || Security Researcher || Bug Bounty Hunter
Go to the profile of Vulnerables
Vulnerables
Vulnerabilities | Responsible Disclosure | PoC | https://www.youtube.com/vulnerables
Go to the profile of Juan Caillava
Juan Caillava
Pentester at VerSprite
Go to the profile of Samuel
Go to the profile of Abhishek Bundela
Go to the profile of Max
Max
Impassioned about finding vulnerabilities in web apps. H1 http://hackerone.com/w2w. Linkedin: /in/w2w/. Telegram channel [RU only] http://t.me/vulns
Go to the profile of newp_th
newp_th
secure your computer 😊
Go to the profile of Youssef A. Mohamed
Go to the profile of Hariom Vashisth
Hariom Vashisth
Coder, Life Coach, Foosball player, entrepreneur in that order - I often rant about politics (sorry!)
Go to the profile of Daniel A. Bloom
Daniel A. Bloom
Daniel Bloom is a young, self taught, entrepreneur and the Founder of Bloom Cyber Defense, LLC — http://bcdefense.com — Twitter: @bcdannyboy
Go to the profile of andr01d
Go to the profile of Mitch Moser
Mitch Moser
digital brain | analog heart
Go to the profile of ice3man
ice3man
A hacker, programmer and bug bounty hunter.
Go to the profile of Mohammed Eldeeb
Go to the profile of Konark Modi
Konark Modi
Data Security and Privacy Advocate | Tech Lead @cliqz. Email me at modi.konark@gmail.com to discuss projects or Game of Thrones
Go to the profile of In-Depth Tech
Go to the profile of Gujjuboy10x00
Gujjuboy10x00
security analyst | Keep calm and hack the planet
Go to the profile of Vangelis Stykas
Vangelis Stykas
Father of two sons,ARIS fan,semi lunatic from time to time (lately most of the time).Mostly breaking IoT and generally internet connected devices.
Go to the profile of YoKo Kho
Go to the profile of Yasho
Go to the profile of Kedrisec
Go to the profile of Eray Mitrani
Eray Mitrani
Software Engineer and Bug Bounty Hunter hackerone.com/emitrani
Go to the profile of Aditya Anand
Aditya Anand
CyberSec | Hacker | Developer | Open Source Lover | Poet | Guitarist Let’s connect — aditya12anand.com
Go to the profile of Andrew Hilton
Andrew Hilton
Cyber Security Researcher
Go to the profile of Valeriy Shevchenko
Valeriy Shevchenko
I am a guy who passionate about testing and security researching 👨‍💻 → t.me/valyaroller
Go to the profile of SPARTaN
SPARTaN
I hack things and other stuff.
Go to the profile of Ashish Jha
Ashish Jha
Saw the purity of computers and felt in love with them. Security Researcher | Guitarist | Programmer | Love Electronics | Back-end lover
Go to the profile of SE Adams
SE Adams
I write about everything and nothing.
Go to the profile of viscido
Go to the profile of Oneeb Malik
Oneeb Malik
Full stack developer and infosec enthusiast. Dream of owning an alpaca farm one day.
Go to the profile of Tom Melo
Tom Melo
Restless, curious, coffee lover with passion for InfoSec, Cloud Computing and Software Development. https://itgorillaz.com.br/
Go to the profile of Syntax Error
Syntax Error
DwWI92mUoaxZ
Go to the profile of Sabri H.
Sabri H.
Twitter : @pwnsdx
Go to the profile of Hamada
Hamada
Cyber security analyst @canavaroxum
Go to the profile of Ashish Kunwar
Ashish Kunwar
i m a security researcher and exploit developer/ and love Fuzzing and break things |bug hunter| at |bugcrowd|&|hackerone(0x01)|130+bounties
Go to the profile of Khaled Hassan
Go to the profile of Olaf Hartong
Olaf Hartong
Photographer | InfoSec | DFIR | Threat hunter | Data Dweller | Splunk | Sysmon
Go to the profile of manisha sangwan
Go to the profile of Bharathvaj Ganesan
Bharathvaj Ganesan
Fullstack JavaScript Developer | Cybernaut | InfoSec Enthusiast | https://bharathvajganesan.me
Go to the profile of Jonathan Bouman
Jonathan Bouman
Medical doctor / Web developer / Security researcher - https://Protozoan.nl
Go to the profile of Chris House
Go to the profile of SI9INT
SI9INT
- Whitehat in own definition -
Go to the profile of dewank pant
Go to the profile of Cody Zacharias
Go to the profile of Tung Pun
Go to the profile of d0nut
d0nut
Security Engineer at Dropbox and part-time bug hunter
Go to the profile of Siva Krishna Samireddi
Siva Krishna Samireddi
Studying Btech (ECE). Hack2Learn. Hunter @ h1. Tweet@le4rner Acknowledged by Google, Sony, Microsoft, Zomato, Coursera and many more.
Go to the profile of TomNomNom
TomNomNom
Explainer, talker, coder, fixer, eater, not really a sheep.
Go to the profile of Abdelkader Belcaid
Abdelkader Belcaid
I'm Bug Bounty Hunter & CTF Player
Go to the profile of Anangsha Alammyan
Anangsha Alammyan
Civil engineer | Lover of fantasy fiction | Author of Stolen Reflections: Some Stories are Told in Verse (https://goo.gl/i2pd6j)
Go to the profile of Muhammad Abdullah
Muhammad Abdullah
Computer Engineering Student ,Pentester ,Photographer
Go to the profile of Sahil Ahamad
Sahil Ahamad
Information Security Engineer | Bug Bounty Hunter
Go to the profile of Dimaz Arno
Dimaz Arno
IT Security Enthusiast, https://ethic.ninja
Go to the profile of Wh11teW0lf
Go to the profile of Miguel
Miguel
Security Technician / Bug Bounty Hunter / EO8gBoaBmUMg
Go to the profile of Muhammad Abdullah
Go to the profile of Mohamed Sayed
Mohamed Sayed
My name is Mohamed my nickname is Flex, I’m a Bug Hunter at HackerOne.
Go to the profile of Raushan Raj
Go to the profile of h3rm4ns3c
Go to the profile of Nathan
Go to the profile of Minali Arora
Minali Arora
Security Researcher, Blogger, Orator and a Technology Enthusiast
Go to the profile of Aj Dumanhug
Aj Dumanhug
PSM in Cybersecurity Student
Go to the profile of John Troon
John Troon
Powered by Coffee, Wine and Burritos. The Bytes Bender.
Go to the profile of Sana Badhwar
Sana Badhwar
Founder of Blockchain Smart Panels. Fascinated by the potential of Blockchain technology. Author on Hacker Noon, Coinmonks, Art+Marketing & more.
Go to the profile of Efkan
Go to the profile of Ratnadip Gajbhiye
Go to the profile of n4ckhcker
n4ckhcker
Just an Alien-Hacker From Greece :D \O/
Go to the profile of Daniel Maksimovic
Daniel Maksimovic
Application Security Analyst from Belgrade, Serbia. Occasional bug bounty hunter.
Go to the profile of Adesh Kolte
Adesh Kolte
Security consultant
Go to the profile of Mark Mo
Mark Mo
@_markmo_ on twitter
Go to the profile of KatsuragiCSL
KatsuragiCSL
A security enthusiast. @ZuuitterE
Go to the profile of Plenum
Go to the profile of Japz Divino
Japz Divino
Web Application Security Researcher || Programmer/Analyst || Bug Bounty Hunter.
Go to the profile of Prial Islam Khan
Prial Islam Khan
A teenager boy with passion of Breaking Security .
Go to the profile of Elliot Alderson
Elliot Alderson
French security researcher. Worst nightmare of Oneplus, Wiko, UIDAI, Kimbho, Donald Daters and others. Not completely schizophrenic. Not related to USANetwork.
Go to the profile of Gopal Singh
Go to the profile of Vishal Shukla
Go to the profile of Zahid Ali
Go to the profile of Daniel V
Daniel V
Brazilian Security Researcher | Bug Bounty Hunter… H3ll0, Fr1end.
Go to the profile of Luan Herrera
Go to the profile of bl4de
bl4de
Full Stack Web Developer by day. HackerOne Bug Bounty Hunter, CTF player and “h4ck3R” by night :)
Go to the profile of Friendly
Friendly
I am Friendly. Your friendly mid-night exploiter.
Go to the profile of Sweetroll
Sweetroll
Hacker, Gamer, Moviegoer, Hiker, and HipHopHead. Tweets are my own.
Go to the profile of Javier Olmedo
Javier Olmedo
Cybersecurity Consultant & Web Application Security Researcher - Author blog https://hackpuntes.com
Go to the profile of Andreas Poyiatzis
Andreas Poyiatzis
☰ Masters Student @ UoG ● Passionate Entrepreneur ● Full-Stack Developer ● Curious Software Engineer
Go to the profile of Samm0uda
Go to the profile of Trevor Phillips
Go to the profile of mohit panwar
mohit panwar
Cyber Security professional, CEH, OSCP. AppSec. Secure SDLC. NIST 800-53. Infra Hardening. Threat Model. Secure Code Review.Partime CTF player. VAPT. Blue Team.
Go to the profile of inc0gnito
inc0gnito
CTF || HACKTHEBOX
Go to the profile of Yarden Shafir
Go to the profile of Pawel Rzepa
Pawel Rzepa
Interested in pentesting and cloud security | OSCP | eMAPT | AWS SAA
Go to the profile of Mike Bond
Mike Bond
Cyber Security Enthusiast
Go to the profile of Nir Chako
Nir Chako
Red Teamer | Security Researcher
Go to the profile of Marcin Szydlowski
Marcin Szydlowski
Cyber security professional. Offensive security enthusiast. Bug Bounty and CTF fan.
Go to the profile of Jonathan Leitschuh
Go to the profile of Ajay Gautam
Ajay Gautam
Security Researcher at SayCure