
HACKLIDO
@hacklido
Followers
11K
Following
1K
Media
129
Statuses
886
#1 - Cybersecurity blogging community curating knowledge from wonderful & insightful infosec writers! Join the club right now. ๐
Joined November 2020
#php Type Juggling Explained: The Silent Security Risk Lurking in Web Applications #bugbounty .
hacklido.com
Did you ever think about the reason some PHP applications can still be bypassed after various hard-to-guess login tries? Type juggling can be a helpful f...
0
0
4
Exploiting & Understanding JWT Authentication Tokens #bugbountytip #Cybersecurity .
hacklido.com
Introduction Almost in our every day internet connected life, secure authentication is crucial. JWT (JSON Web Token) has become a mainstay in modern...
0
2
12
Click, Hack, Repeat: Race Conditions Demystified.
hacklido.com
Introduction Without any doubt, time and again life grants benefits to people who make their purchases earliest. The digital environment provides oppor...
0
1
1
๐ NoSQL Injection: Detection, Exploitation, and Fixes #bugbounty #CyberSecurity.
hacklido.com
Introduction: In the evolving landscape of web security, NoSQL databases have become a cornerstone of modern applications as they offer flexibility in...
0
0
4
Understanding and Exploiting File Inclusion Vulnerability #bugbountytips.
hacklido.com
Introduction to File Inclusion Vulnerabilities File inclusion vulnerabilities create a security risk that freely allows unrestricted access to all fi...
0
1
6
๐ Insecure Direct Object References (IDOR): Exploiting and Preventing. #BugBounty #Security #bugbountytips .
hacklido.com
Introduction: When Simplicity Betrays Security IDORs represent dangerous security defects which exist between convenience features and vulnerabilities...
0
0
2
๐ Burp Suite + Claude AI: Connect Using MCP Server (2025 Setup). #bugbounty #bugbountytips #Security .
hacklido.com
If youโre looking to enhance your Burp Suite workflow with the help of AI and if you donโt have burp pro but want something cool and dope with burp sui...
0
3
11
$4100 in Bug Bounties: Session Hacking Exploits Explained. #bugbounty #CyberSecurity .
hacklido.com
Introduction: The Illusion of Logging Out Picture ceasing to hand in your office keycard only for it to still open up the building months down the line...
0
2
13
RT @GuidedHacking: In the latest and greatest episode of the Guided Hacking Podcast we had the unique honor of interviewing the Titan of Anโฆ.
0
20
0
Command Injection: Leveraging OS Commands for Exploits #bugbountytips .
hacklido.com
Command injection is a critical vulnerability that enables attackers to execute unauthorized commands on a system. In this blog, weโll explore both w...
0
1
9
Automating SQL Injection with Tools: Beginner to Pro Techniques.
hacklido.com
Introduction Understanding SQL Injection A web application becomes vulnerable to SQL injection attacks when attackers perform malicious manipulation...
0
1
2
#SQL Injection 101: Uncovering and Exploiting SQLi Vulnerabilities #bugbountytips .
hacklido.com
Introduction to SQL Injection What is SQL Injection and Its Types? To define SQL Injection in a single sentence attackers (hackers) inject malicious...
0
0
4
RT @GuidedHacking: ๐จ Guided Hacking Podcast - Episode 2. ๐ What Nobody Tells You About Becoming a Vulnerability Researcher. ๐ Featuring @_sโฆ.
0
23
0
RT @GuidedHacking: ๐ฅVirtual Memory Explained๐ฅ.๐พ Paging: Key to memory management.๐ Disk Paging vs Demand Paging.๐ Virtual Address Space.๐ก๏ธโฆ.
0
7
0
๐ Congratulations @misterxcrypt on winning 1x Ultimate Bug Bounty Guide โฅ๏ธ. Dm us to claim your course. Make sure to leave an honest review about the course when you complete it so @theXSSrat can see it ๐๐ง.
2
0
3
๐ Giveaway: 1x Ultimate Bug Bounty Guide 2025 by @theXSSrat . This is for you if you're truly passionate about starting your bug bounty journey. How to participate:.1โฃ Follow @hacklido and @theXSSrat .2โฃ Comment below why you want this course and how it will help you.
4
2
5