⤷ Title: Basic Pentesting 1 (lab) Walkthrough: Exploiting FTP, SSH & WordPress
════════════════════════
𐀪 Author: SUSHANT TELRANDHE
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:12:57 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #ethical_hacking #cybersecurity #vulnerability
════════════════════════
𐀪 Author: SUSHANT TELRANDHE
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:12:57 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #ethical_hacking #cybersecurity #vulnerability
Medium
Basic Pentesting 1 (lab) Walkthrough: Exploiting FTP, SSH & WordPress
A hands-on walkthrough of a deliberately vulnerable lab showing how small mistakes lead to total compromise.
⤷ Title: TryHackMe Phishing Unfolding: Detecting Base64 and DNS Exfiltration with Splunk
════════════════════════
𐀪 Author: Elmin Farzaliyev
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:16:06 GMT
════════════════════════
⌗ Tags: #blue_team #tryhackme #red_team #cybersecurity #splunk
════════════════════════
𐀪 Author: Elmin Farzaliyev
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:16:06 GMT
════════════════════════
⌗ Tags: #blue_team #tryhackme #red_team #cybersecurity #splunk
Medium
TryHackMe Phishing Unfolding: Detecting Base64 and DNS Exfiltration with Splunk
By the time I opened Splunk, it was already clear that something had gone very wrong on this workstation. The phishing attempt had worked —…
⤷ Title: Hacking the Hackers
════════════════════════
𐀪 Author: Br0k3n_1337 Aka Sourav Khan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:02:57 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #bug_bounty_writeup #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: Br0k3n_1337 Aka Sourav Khan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:02:57 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #bug_bounty_writeup #bug_bounty_tips #bug_bounty
Medium
Hacking the Hackers
In the name of Allah, the Most Gracious, the Most Merciful.
⤷ Title: HTB Whisper Walkthrough
════════════════════════
𐀪 Author: Cray Cray
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:20:37 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup
════════════════════════
𐀪 Author: Cray Cray
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:20:37 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup
Medium
HTB Whisper Walkthrough
This is whisper sherlock walkthrough on hackthebox
⤷ Title: Catch Me If You Can: Building an “Offensive” Anti-Theft System for Windows
════════════════════════
𐀪 Author: Utkarsh Srivastava
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:11:30 GMT
════════════════════════
⌗ Tags: #life_hacking #ethical_hacking
════════════════════════
𐀪 Author: Utkarsh Srivastava
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:11:30 GMT
════════════════════════
⌗ Tags: #life_hacking #ethical_hacking
Medium
Catch Me If You Can: Building an “Offensive” Anti-Theft System for Windows
Usually, when a laptop is stolen, it’s game over. You rely on “Find My Device” (which the thief instantly disables) or file a police report…
⤷ Title: Ethical Proxy Use in 2026
════════════════════════
𐀪 Author: Teodoradehanyns
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:09:45 GMT
════════════════════════
⌗ Tags: #ethical_ai #robotstxt #2026 #ethical_hacking #proxy
════════════════════════
𐀪 Author: Teodoradehanyns
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:09:45 GMT
════════════════════════
⌗ Tags: #ethical_ai #robotstxt #2026 #ethical_hacking #proxy
Medium
Ethical Proxy Use in 2026
A sustainable, ethical proxy strategy emphasizes respecting site boundaries and focusing on legitimate data collection and testing needs.
⤷ Title: Day5: Common Network Commands Explained
════════════════════════
𐀪 Author: Mohammad-AL-Momani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:05:17 GMT
════════════════════════
⌗ Tags: #money #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Mohammad-AL-Momani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:05:17 GMT
════════════════════════
⌗ Tags: #money #ethical_hacking #cybersecurity
Medium
Day5: Common Network Commands Explained
Common Network Commands
⤷ Title: SQL Injection: A Deep Dive into Preventing Database Attacks
════════════════════════
𐀪 Author: Sreelakshmi
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:32:36 GMT
════════════════════════
⌗ Tags: #sql_injection
════════════════════════
𐀪 Author: Sreelakshmi
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:32:36 GMT
════════════════════════
⌗ Tags: #sql_injection
Medium
SQL Injection: A Deep Dive into Preventing Database Attacks
SQL injection is a critical security vulnerability that allows attackers to interfere with the queries an application makes to its…
⤷ Title: [Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Widespread Magecart Campaign Targets Users of All Major Credit Cards
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:28:30 +0000
════════════════════════
⌗ Tags: #Malware #Security #Cyber Attack #Cybersecurity #MageCart #Silent Push #Skimmer
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:28:30 +0000
════════════════════════
⌗ Tags: #Malware #Security #Cyber Attack #Cybersecurity #MageCart #Silent Push #Skimmer
Hackread
Widespread Magecart Campaign Targets Users of All Major Credit Cards
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: How I Supercharged Wazuh SIEM with AI Using Claude Desktop (MCP Integration)
════════════════════════
𐀪 Author: MOAMEN REZK
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:19:41 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #security #hacking #cybersecurity
════════════════════════
𐀪 Author: MOAMEN REZK
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:19:41 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #security #hacking #cybersecurity
Medium
How I Supercharged Wazuh SIEM with AI Using Claude Desktop (MCP Integration)
The Game-Changing Combination of SIEM and Conversational AI
⤷ Title: In an era where cyber threats are evolving at the speed of AI, the "digital fence" of yesterday is…
════════════════════════
𐀪 Author: Roshankappala
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:44:22 GMT
════════════════════════
⌗ Tags: #blockchain #cybersecurity #entrepreneurship #information_security #hacking
════════════════════════
𐀪 Author: Roshankappala
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:44:22 GMT
════════════════════════
⌗ Tags: #blockchain #cybersecurity #entrepreneurship #information_security #hacking
Medium
In an era where cyber threats are evolving at the speed of AI, the "digital fence" of yesterday is…
In an era where cyber threats are evolving at the speed of AI, the "digital fence" of yesterday is no longer enough. If a traditional firewall is a bouncer checking IDs at the door, a Next-Generation …
⤷ Title: How to Create an Undetectable Backdoor: A Step-by-Step Guide
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:49 GMT
════════════════════════
⌗ Tags: #mitm_attacks #backdoor #hacking #mitm #man_in_the_middle_attack
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:49 GMT
════════════════════════
⌗ Tags: #mitm_attacks #backdoor #hacking #mitm #man_in_the_middle_attack
Medium
How to Create an Undetectable Backdoor: A Step-by-Step Guide
ARP spoofing & Man In The Middle Attacks Execution & Detection
⤷ Title: Passing the PNPT: A Practical Perspective on Modern Pentesting
════════════════════════
𐀪 Author: Ivaylo Ivanov
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:38:22 GMT
════════════════════════
⌗ Tags: #tcm_security #penetration_testing #pnpt #certification #cybersecurity
════════════════════════
𐀪 Author: Ivaylo Ivanov
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:38:22 GMT
════════════════════════
⌗ Tags: #tcm_security #penetration_testing #pnpt #certification #cybersecurity
Medium
Passing the PNPT: A Practical Perspective on Modern Pentesting
Today, I officially passed the PNPT (Practical Network Penetration Tester) certification by TCM Security. I want to share this experience…
⤷ Title: SimpleCTF
════════════════════════
𐀪 Author: Rue
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:00 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #cybersecurity #pentesting #ctf_writeup
════════════════════════
𐀪 Author: Rue
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:00 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #cybersecurity #pentesting #ctf_writeup
Medium
SimpleCTF
This is a very beginner friendly CTF. For non medium subscribsed users please visit…
⤷ Title: Burp Suite: The Basics — THM Walkthrough
════════════════════════
𐀪 Author: t3chw1z4rd
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:20:03 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #burpsuite #tryhackme_walkthrough #tryhackme #xss_bypass
════════════════════════
𐀪 Author: t3chw1z4rd
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:20:03 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #burpsuite #tryhackme_walkthrough #tryhackme #xss_bypass
Medium
Burp Suite: The Basics — THM Walkthrough
Room: TryHackMe | Burp Suite: The Basics
⤷ Title: Bon.. ça c’est pas du hack mais du bon sens (Writeup Preignition — Hack The Box)
════════════════════════
𐀪 Author: RavenBreach
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:26:05 GMT
════════════════════════
⌗ Tags: #cybersécurité #hackthebox #nginx #passwords #hackthebox_writeup
════════════════════════
𐀪 Author: RavenBreach
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:26:05 GMT
════════════════════════
⌗ Tags: #cybersécurité #hackthebox #nginx #passwords #hackthebox_writeup
Medium
Bon.. ça c’est pas du hack mais du bon sens (Writeup Preignition — Hack The Box)
Introduction
⤷ Title: CVE Hunting via Github Dorking
════════════════════════
𐀪 Author: Abhirup Konwar
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:55:42 GMT
════════════════════════
⌗ Tags: #cve #ethical_hacking #php_security #secure_code_review #programming
════════════════════════
𐀪 Author: Abhirup Konwar
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:55:42 GMT
════════════════════════
⌗ Tags: #cve #ethical_hacking #php_security #secure_code_review #programming
Medium
CVE Hunting via Github Dorking
Finding 0 days in PHP Open Source Code
⤷ Title: The Client-side Is Not a Boundary
════════════════════════
𐀪 Author: Adebayo
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:24:58 GMT
════════════════════════
⌗ Tags: #api_security #security #software_engineering #web_security
════════════════════════
𐀪 Author: Adebayo
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:24:58 GMT
════════════════════════
⌗ Tags: #api_security #security #software_engineering #web_security
Medium
The Client-side Is Not a Boundary
A quiet lesson from fintech and subnoscription based systems
⤷ Title: PCI DSS for APIs: The Compliance Guide Nobody Told You About
════════════════════════
𐀪 Author: Saro Arlene
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:30:29 GMT
════════════════════════
⌗ Tags: #api_security #pci_dss_compliance #pci_dss
════════════════════════
𐀪 Author: Saro Arlene
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:30:29 GMT
════════════════════════
⌗ Tags: #api_security #pci_dss_compliance #pci_dss
Medium
PCI DSS for APIs: The Compliance Guide Nobody Told You About
Why PCI DSS Actually Matters for APIs
⤷ Title: X (former Twitter) Login flow reconstruction. Episode 1 — Headers generation
════════════════════════
𐀪 Author: glizzykingdreko
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:11:50 GMT
════════════════════════
⌗ Tags: #reverse_engineering #xs #wasm #twitter #python_automation
════════════════════════
𐀪 Author: glizzykingdreko
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:11:50 GMT
════════════════════════
⌗ Tags: #reverse_engineering #xs #wasm #twitter #python_automation
Medium
X (former Twitter) Login flow reconstruction. Episode 1 — Headers generation
First post of a serie about X / Twitter login automatisation. In this episode I’m going to reverse engeener all the required headers