⤷ Title: TryHackMe Writeup: Envizon
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 16:26:20 GMT
════════════════════════
⌗ Tags: #cybercrime #tryhackme_walkthrough #cybersecurity #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 16:26:20 GMT
════════════════════════
⌗ Tags: #cybercrime #tryhackme_walkthrough #cybersecurity #tryhackme_writeup #tryhackme
Medium
TryHackMe Writeup: Envizon
Sızma testlerinde bazen karşımıza çıkan hedef, sıradan bir web sitesi değil, bizzat güvenlik uzmanlarının kullandığı bir araç olur. Bu…
⤷ Title: VulnHub : ICA: 1 CTF Çözümü
════════════════════════
𐀪 Author: Azat Dicle
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 16:34:12 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #ica #vulnhub #ctf_writeup #vulnhub_walkthrough
════════════════════════
𐀪 Author: Azat Dicle
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 16:34:12 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #ica #vulnhub #ctf_writeup #vulnhub_walkthrough
Medium
VulnHub : ICA: 1 CTF Çözümü
Bu yazımda sizlerle VulnHub üzerinde bulunan Empire Breakout makinesini çözeceğim.
⤷ Title: A Practical Look at File Password Cracking Using John
════════════════════════
𐀪 Author: Janmejaysinh ThinkLab
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 16:39:29 GMT
════════════════════════
⌗ Tags: #information_security #ethical_hacking #john_the_ripper #kali_linux #cybersecurity
════════════════════════
𐀪 Author: Janmejaysinh ThinkLab
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 16:39:29 GMT
════════════════════════
⌗ Tags: #information_security #ethical_hacking #john_the_ripper #kali_linux #cybersecurity
Medium
A Practical Look at File Password Cracking Using John
In this post, I share a hands-on walkthrough of file password cracking using John the Ripper, written to help beginners understand password…
⤷ Title: n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 22:09:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 22:09:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: 5 Best Secure Container Images for Modern Applications (2026)
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:16:42 +0000
════════════════════════
⌗ Tags: #Security #Technology
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:16:42 +0000
════════════════════════
⌗ Tags: #Security #Technology
Hackread
5 Best Secure Container Images for Modern Applications (2026)
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Hacker At Work:Recon Workflow Process
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:05:12 GMT
════════════════════════
⌗ Tags: #kali_linux #ethical_hacking #cybersecurity #bug_bounty #hacking
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:05:12 GMT
════════════════════════
⌗ Tags: #kali_linux #ethical_hacking #cybersecurity #bug_bounty #hacking
Medium
Hacker At Work:Recon Workflow Process
🧠 Part 2: Real-World Recon Workflow
⤷ Title: The Bug Bounty Toolkit (2026): Tools, Workflows, and Real-World Recon That Actually Finds Bugs
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:37:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #bug_bounty #pentesting #reconnaissance
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:37:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #bug_bounty #pentesting #reconnaissance
Medium
The Bug Bounty Toolkit (2026): Tools, Workflows, and Real-World Recon That Actually Finds Bugs
🕵️♂️ The Modern Bug Bounty Toolkit (2026 Edition)
⤷ Title: Lab: Authentication bypass via encryption oracle
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:56:10 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ctf #pentesting #hacking #portswigger
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:56:10 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ctf #pentesting #hacking #portswigger
Medium
Lab: Authentication bypass via encryption oracle
Bu labda, kullanıcılara bir encryption oracle (şifreleme/çözme oracle’ı) açığa çıkaran bir mantık hatası bulunuyor. Labı çözmek için bu…
⤷ Title: HTB — Agile Writeup
════════════════════════
𐀪 Author: Ayça Gül
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:40:22 GMT
════════════════════════
⌗ Tags: #hackthebox #hacking #hackthebox_writeup
════════════════════════
𐀪 Author: Ayça Gül
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:40:22 GMT
════════════════════════
⌗ Tags: #hackthebox #hacking #hackthebox_writeup
Medium
HTB — Agile Writeup
Hello everyone! In this post, I will explain the walkthrough of the HackTheBox Agile machine (Medium level, Linux). I hope you enjoy…
⤷ Title: Bir Hacker’ın Oyun Alanı: Hibrit Sızma Testi Laboratuvarında Adım Adım Pentest
════════════════════════
𐀪 Author: Arda
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:57:14 GMT
════════════════════════
⌗ Tags: #pivoting #sızma_testi #siber_guvenlik #infosec
════════════════════════
𐀪 Author: Arda
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:57:14 GMT
════════════════════════
⌗ Tags: #pivoting #sızma_testi #siber_guvenlik #infosec
Medium
Bir Hacker’ın Oyun Alanı: Hibrit Sızma Testi Laboratuvarında Adım Adım Pentest
Siber güvenlikte “teorik bilgi bilmek” ile “yapabilmek” arasındaki uçurum, ancak bir şeyleri teorikten çeşitli deneyimlere…
⤷ Title: Cybersecurity Basics: The Roadmap I Wish I Had When I Started
════════════════════════
𐀪 Author: Thapaswin
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:43:41 GMT
════════════════════════
⌗ Tags: #linux #cybersecurity #infosec #tech_career #learning_to_code
════════════════════════
𐀪 Author: Thapaswin
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:43:41 GMT
════════════════════════
⌗ Tags: #linux #cybersecurity #infosec #tech_career #learning_to_code
Medium
Cybersecurity Basics: The Roadmap I Wish I Had When I Started
The beginner cybersecurity guide I needed when everything felt confusing — no tools, no shortcuts, just fundamentals that finally made…
⤷ Title: Siber Güvenlik Laboratuvarı Notları: Teorik Temeller, Araçlar ve Metodolojiler
════════════════════════
𐀪 Author: Arda
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:56:21 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #cybersecurity #siber_guvenlik #penetration_testing
════════════════════════
𐀪 Author: Arda
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:56:21 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #cybersecurity #siber_guvenlik #penetration_testing
Medium
Siber Güvenlik Laboratuvarı Notları: Teorik Temeller, Araçlar ve Metodolojiler
Bu notlar, siber güvenlik öğrenim sürecimdeki araştırmalar ve pratiklerden derlenmiştir. Detaylı bilgi sunmaz, hatırlatıcı ve genel bilgi…
⤷ Title: Modern Vulnerability Management & Penetration Testing Services
════════════════════════
𐀪 Author: IT_Engineer
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:26:49 GMT
════════════════════════
⌗ Tags: #attacker #penetration_testing #vulnerability_management #cybersecurity #vulnerability
════════════════════════
𐀪 Author: IT_Engineer
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:26:49 GMT
════════════════════════
⌗ Tags: #attacker #penetration_testing #vulnerability_management #cybersecurity #vulnerability
Medium
Modern Vulnerability Management & Penetration Testing Services
Identify What Matters. Exploit What Attackers Would. Fix What Puts Your Business at Risk.
⤷ Title: Rivalry — Hackviser Real-World Scenario Walkthrough
════════════════════════
𐀪 Author: Hussein 404
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:16:47 GMT
════════════════════════
⌗ Tags: #rivalry #hackviser #penetration_testing #cybersecurity #capt
════════════════════════
𐀪 Author: Hussein 404
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:16:47 GMT
════════════════════════
⌗ Tags: #rivalry #hackviser #penetration_testing #cybersecurity #capt
Medium
Rivalry — Hackviser Real-World Scenario Walkthrough
Hands-on analysis of the Rivalry challenge, covering reconnaissance, exploitation, and real-world threat simulation.
⤷ Title: Void — Hackviser Real-World Scenario Walkthrough
════════════════════════
𐀪 Author: Hussein 404
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:01:13 GMT
════════════════════════
⌗ Tags: #hackviser #ctf #penetration_testing #cybersecurity #void
════════════════════════
𐀪 Author: Hussein 404
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:01:13 GMT
════════════════════════
⌗ Tags: #hackviser #ctf #penetration_testing #cybersecurity #void
Medium
Void — Hackviser Real-World Scenario Walkthrough
A step-by-step walkthrough of the Hackviser “Void” scenario, simulating real-world attack techniques and defensive analysis.
⤷ Title: Information Gathering’s Assessment
════════════════════════
𐀪 Author: db1M
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:21:22 GMT
════════════════════════
⌗ Tags: #penetration_testing #reconnaissance #web_penetration_testing
════════════════════════
𐀪 Author: db1M
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:21:22 GMT
════════════════════════
⌗ Tags: #penetration_testing #reconnaissance #web_penetration_testing
Medium
Information Gathering’s Assessment
Hello everyone I’m Mohanad Edrees (db1M), a self-taught penetration tester and CTF player. In this article, I’ll share my approach to…
⤷ Title: # Stop Wasting Hours Setting Up Your Parrot OS — Here’s an Open Source Tool That Does It in Minutes
════════════════════════
𐀪 Author: Zahradeen Muazu
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:35:40 GMT
════════════════════════
⌗ Tags: #shell_noscript #linux #parrotos #programming #ethical_hacking
════════════════════════
𐀪 Author: Zahradeen Muazu
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:35:40 GMT
════════════════════════
⌗ Tags: #shell_noscript #linux #parrotos #programming #ethical_hacking
Medium
# Stop Wasting Hours Setting Up Your Parrot OS — Here’s an Open Source Tool That Does It in Minutes
*A comprehensive toolkit for pentesting professionals tired of manual tool installation*
⤷ Title: This Bug Bounty Recon is much PEAKKK!!!!!!
════════════════════════
𐀪 Author: Alham Rizvi(ExoidSec)
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:07:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #hacking #bug_hunting #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Alham Rizvi(ExoidSec)
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:07:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #hacking #bug_hunting #bug_bounty #cybersecurity
Medium
This Bug Bounty Recon is so much PEAKKK!!!!!!
This Bug Bounty Recon is so much PEAKKK!!!!!! In this blog, I’ll walk you through a practical, real‑world bug bounty reconnaissance workflow used by active hunters. Recon is the foundation of …
⤷ Title: Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure
════════════════════════
𐀪 Author: Red Asgard
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 21:01:33 GMT
════════════════════════
⌗ Tags: #malware_analysis #north_korea #threat_intelligence #hacking #cybersecurity
════════════════════════
𐀪 Author: Red Asgard
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 21:01:33 GMT
════════════════════════
⌗ Tags: #malware_analysis #north_korea #threat_intelligence #hacking #cybersecurity
Medium
Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure
We found North Korean malware in an Upwork project. Then we spent five days mapping their infrastructure.
⤷ Title: Why Telecommunications Companies Are Primary Targets for State-Sponsored Hackers
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:18:26 GMT
════════════════════════
⌗ Tags: #hacking #telecommunication #critical_infrastructure #cybersecurity #cybercrime
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:18:26 GMT
════════════════════════
⌗ Tags: #hacking #telecommunication #critical_infrastructure #cybersecurity #cybercrime
Medium
Why Telecommunications Companies Are Primary Targets for State-Sponsored Hackers
Why Telecommunications Companies Are Primary Targets for State-Sponsored Hackers Telecommunications companies have emerged as the most critical targets for state-sponsored cyber operations, not …
⤷ Title: Your IDE Might Betray You Before You Run Anything
════════════════════════
𐀪 Author: Ryan W
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:52:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #android_app_development #android_developers #software_engineering #infosec
════════════════════════
𐀪 Author: Ryan W
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:52:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #android_app_development #android_developers #software_engineering #infosec
Medium
Your IDE Might Betray You Before You Run Anything
A real-world VS Code security incident, and why Android developers aren’t safe either