Learn to Hack
  • Introduction
    • 💀whoami
    • Writeups
      • What happens when you request a website?
      • What is bug bounty methodology?
      • Reverse Engineer an API
      • How to discover websites which got recently available on internet?
  • Where to Start?
    • Learn to hack
    • Web Basics
    • HTTP Basics
    • Networking Basics
    • Linux Basics
    • Programming Basics
    • Hacking and its types
    • Phases of hacking
    • Bug Bounty
      • Public bug bounty programs
      • Bug Bounty Methodologies
  • Learn Hacking
    • Platforms to learn hacking
    • Courses for hacking and cybersecurity
    • Youtube Channels CyberSecurity
    • Bug Bounty Writeups
    • Security Books
    • Security Blogs
    • Security News
  • Practice Hacking
    • Practice hacking skills
  • Security Bugs
    • GQL GraphQL
    • Exploit Payment Gateways
    • Unrestricted File Upload
      • Real world report PoCs
    • XSS Cross Site Scripting
      • XSS discovery using dalfox, waybackurls, gau
      • Real world report PoCs
    • CSRF Cross Site Request Forgery
      • Real world reports PoCs
    • SSRF Server Side Request Forgery
      • SSRF Bypass via OpenRedirect
      • SSRF hunt with httpx & aquatone
      • Real world report PoCs
    • BAC Broken Access Control
    • BOLA Broken Object Level Authorization
    • SQLi SQL Injection
      • Real world report PoCs
    • RCE Remote Code Execution
      • Real world report PoCs
    • IDOR Insecure Direct Object Reference
      • Real world report PoCs
  • Security Tools
    • Recon
      • Subdomain Enumeration
      • Port Scanning
      • Screenshots
      • Identify Technologies
      • Content Discovery
      • Find Links
      • Parameters
      • Fuzzing
    • Exploitation
      • Command Injection
      • CORS Misconfiguration
      • CRLF Injection
      • CSRF Injection
      • Directory Traversal
      • File Inclusion
      • GraphQL Injection
      • Header Injection
      • Insecure Deserialization
      • Insecure Direct Object Reference
      • Open Redirect
      • Race Condition
      • Request Smuggling
      • SSRF Server Side Request Forgery
      • SQLi SQL Injection
      • XSS Cross Site Scripting
      • XXE Injection
    • Setup Burp Collaborator Server
    • Miscellaneous
      • Passwords
      • Secrets
      • Git
      • Buckets
      • CMS
      • JSON Web Token
      • post Message
      • Subdomain Takeover
      • Vulnerability Scanners
      • More tools
  • Security Verification Standards
    • ASVS Application Security Verification Standard
    • MASVS Mobile Application Security Verification Standard
  • Security Testing Guides
    • Rest API Security Checklist
    • Web Application Testing Techniques
    • Web Security Testing Guide
    • Mobile Security Testing Guide
  • Security findings
    • Security Articles
  • Special Thanks
Powered by GitBook
On this page
  1. Learn Hacking

Security Blogs

Blogs you should follow to learn cybersecurity. https://blog.it-securityguard.com/ https://blog.innerht.ml/ http://brutelogic.com.br/blog/ https://klikki.fi/ http://philippeharewood.com/ https://seanmelia.wordpress.com/ https://respectxss.blogspot.com/ https://www.gracefulsecurity.com/ https://whitton.io/ https://tisiphone.net/ http://archive.nahamsec.com/ https://www.hackerscreed.org/ http://danlec.com/blog https://wehackpeople.tumblr.com/ https://bitquark.co.uk/blog/ https://www.arneswinnen.net/ http://bugbountypoc.com/ https://medium.com/@arbazhussain/ http://www.shawarkhan.com/ https://blog.detectify.com/ http://www.rafayhackingarticles.net/… https://forum.bugcrowd.com/ https://securitywall.co/ https://www.hackerone.com/blog http://www.securitytube.net/ https://hackasia.org/ http://www.gangte.net/ https://mukarramkhalid.com/ https://securitytraning.com/ https://jubaeralnaziwhitehat.wordpress.com/… http://hackaday.com/ http://www.securityfocus.com/ https://packetstormsecurity.com/ http://www.blackhat.com/ https://www.metasploit.com/ http://sectools.org/ https://labs.detectify.com/ https://blog.rubidus.com/ http://www.securityidiots.com/ https://hackernoon.com/ https://sqli-basic.blogspot.com/ https://bugbaba.blogspot.in/ https://vulnerability-lab.com/ https://medium.com/@know.0nix/ https://medium.com/@codingkarma/

PreviousSecurity BooksNextSecurity News

Last updated 3 years ago