⤷ Title: Crypto Heists
════════════════════════
𐀪 Author: So Cleva
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:27 GMT
════════════════════════
⌗ Tags: #exploit #hacking #cryptocurrency #data_breach #vulnerability
════════════════════════
𐀪 Author: So Cleva
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:27 GMT
════════════════════════
⌗ Tags: #exploit #hacking #cryptocurrency #data_breach #vulnerability
Medium
Crypto Heists
what happened in 2025?
⤷ Title: Implementación de un Honeypot con T-Pot para detección y análisis de ataques.
════════════════════════
𐀪 Author: Eric Cabrera Cruz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:06 GMT
════════════════════════
⌗ Tags: #threat_detection #cybersecurity #hacking #network_security #ethical_hacking
════════════════════════
𐀪 Author: Eric Cabrera Cruz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:06 GMT
════════════════════════
⌗ Tags: #threat_detection #cybersecurity #hacking #network_security #ethical_hacking
Medium
Implementación de un Honeypot con T-Pot para detección y análisis de ataques.
Para empezar, tenemos que tener claro que es lo que vamos a construir. Los Honeypot según INCIBE son sistemas hardware o herramientas…
⤷ Title: SOC167 — LS Command Detected in Requested URL
════════════════════════
𐀪 Author: Wrench
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:25 GMT
════════════════════════
⌗ Tags: #security_operation_center #hacking #lets_defend #security #virustotal
════════════════════════
𐀪 Author: Wrench
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:25 GMT
════════════════════════
⌗ Tags: #security_operation_center #hacking #lets_defend #security #virustotal
Medium
SOC167 — LS Command Detected in Requested URL
Alert Overview and Initial Identification of the ls Command in Web Traffic. This section explains how the alert was generated, what…
⤷ Title: Testing PSPDFKit License Validity via Client-Side PoC
════════════════════════
𐀪 Author: WHO AM I ?
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:24:48 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: WHO AM I ?
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:24:48 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #penetration_testing #cybersecurity
Medium
Testing PSPDFKit License Validity via Client-Side PoC
Testing PSPDFKit License Validity via Client-Side PoC
⤷ Title: PUPPY.HTB — Active Directory
════════════════════════
𐀪 Author: JY00X3
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:04 GMT
════════════════════════
⌗ Tags: #active_directory #cybersecurity #ethical_hacking #penetration_testing #htb
════════════════════════
𐀪 Author: JY00X3
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:04 GMT
════════════════════════
⌗ Tags: #active_directory #cybersecurity #ethical_hacking #penetration_testing #htb
Medium
PUPPY.HTB — Active Directory
Initial Credentials
⤷ Title: Dumping Full db through Apache superset automation
════════════════════════
𐀪 Author: Ahmed Algohary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:37 GMT
════════════════════════
⌗ Tags: #python #pentesting #apache #ethical_hacking #apache_superset
════════════════════════
𐀪 Author: Ahmed Algohary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:37 GMT
════════════════════════
⌗ Tags: #python #pentesting #apache #ethical_hacking #apache_superset
Medium
Dumping Full db through Apache superset automation
So, i was doing a pentest and i came across a subdomain with Apache superset installed, i had admin access to it, after exploring a bit i…
⤷ Title: Hacking Humans: How I Learned That You Are the Vulnerability
════════════════════════
𐀪 Author: HEKKO
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:31:08 GMT
════════════════════════
⌗ Tags: #web3 #cybersecurity #blockchain #student_life #ethical_hacking
════════════════════════
𐀪 Author: HEKKO
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:31:08 GMT
════════════════════════
⌗ Tags: #web3 #cybersecurity #blockchain #student_life #ethical_hacking
Medium
Hacking Humans: How I Learned That You Are the Vulnerability
We all have the same image of a hacker.
⤷ Title: Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Telegram to Add Warning for Proxy Links After IP Leak Concerns
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:40:02 +0000
════════════════════════
⌗ Tags: #Privacy #Security #Cybersecurity #Encryption #IP Address #Messanger #Telegram
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:40:02 +0000
════════════════════════
⌗ Tags: #Privacy #Security #Cybersecurity #Encryption #IP Address #Messanger #Telegram
Hackread
Telegram to Add Warning for Proxy Links After IP Leak Concerns
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: How I Found a Critical Biometric 2FA Bypass… and Lost the Bounty
════════════════════════
𐀪 Author: LETCHU PKT
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:39:00 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #cyber_security_awareness #hacking #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: LETCHU PKT
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:39:00 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #cyber_security_awareness #hacking #bug_bounty_tips #bug_bounty
Medium
How I Found a Critical Biometric 2FA Bypass… and Lost the Bounty
How a Hardcoded Superadmin Key Led to a Biometric 2FA Bypass — and a Painful Duplicate
⤷ Title: Day 3 of Learning AWS: Elastic IP and Elastic Block Storage
════════════════════════
𐀪 Author: Muhammad Kashif
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:38:52 GMT
════════════════════════
⌗ Tags: #learning #cloud_security #cloud_computing #bug_bounty #aws
════════════════════════
𐀪 Author: Muhammad Kashif
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:38:52 GMT
════════════════════════
⌗ Tags: #learning #cloud_security #cloud_computing #bug_bounty #aws
Medium
Day 3 of Learning AWS: Elastic IP and Elastic Block Storage
This is Day 3 of my AWS learning journey. Today I learned about Elastic IPs and storage options in EC2, especially Elastic Block Storage…
⤷ Title: Lab: Bypassing access controls using email address parsing discrepancies
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:42:10 GMT
════════════════════════
⌗ Tags: #portswigger #medium #ctf #hacking #pentesting
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:42:10 GMT
════════════════════════
⌗ Tags: #portswigger #medium #ctf #hacking #pentesting
Medium
Lab: Bypassing access controls using email address parsing discrepancies
Bu labda ilk bakışta oldukça basit görünen bir kontrol var:
“Sadece ginandjuice.shop domain’ine sahip email adresleriyle kayıt…
“Sadece ginandjuice.shop domain’ine sahip email adresleriyle kayıt…
⤷ Title: How Telegram Clicks Can Leak Your Real IP?
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:30 GMT
════════════════════════
⌗ Tags: #hacker #linux #hacking #telegram #s_h4ck13
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:30 GMT
════════════════════════
⌗ Tags: #hacker #linux #hacking #telegram #s_h4ck13
Medium
How Telegram Clicks Can Leak Your Real IP?
I’ll reproduce this scenario from an offensive security perspective.
⤷ Title: I Received My Own Personal Details From a Telegram Stranger — Here’s the Truth
════════════════════════
𐀪 Author: Pradhan's Fintech
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:00:53 GMT
════════════════════════
⌗ Tags: #hacking #safety #telegram #scam #personal_experience
════════════════════════
𐀪 Author: Pradhan's Fintech
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:00:53 GMT
════════════════════════
⌗ Tags: #hacking #safety #telegram #scam #personal_experience
Medium
I Received My Own Personal Details From a Telegram Stranger — Here’s the Truth
Right now, we are in 2026. If we look back from 2010 to 2025, ‘‘ we can see that in these 15 years, online scams and frauds have increased…
⤷ Title: Impacket Developer Guide. Part 3. Make your own Lateral Movement
════════════════════════
𐀪 Author: CICADA8
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:16:29 GMT
════════════════════════
⌗ Tags: #red_team #hacking #pentesting #active_directory
════════════════════════
𐀪 Author: CICADA8
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:16:29 GMT
════════════════════════
⌗ Tags: #red_team #hacking #pentesting #active_directory
Medium
Impacket Developer Guide. Part 3. Make your own Lateral Movement
Create your own LM tool using impacket!
⤷ Title: How to Get Scammed (by DPRK Hackers)
════════════════════════
𐀪 Author: OZ
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #blockchain #north_korea #malware #infosec
════════════════════════
𐀪 Author: OZ
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #blockchain #north_korea #malware #infosec
Medium
How to Get Scammed (by DPRK Hackers)
A deep dive into DPRK hackers using fake job interviews and blockchain-based C2 to deploy malware
⤷ Title: Attack that can shutdown your network (SNMP) — Phase 1
════════════════════════
𐀪 Author: Shaik afrid
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:29:57 GMT
════════════════════════
⌗ Tags: #data_security #infosec #information_technology #information_security #networking
════════════════════════
𐀪 Author: Shaik afrid
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:29:57 GMT
════════════════════════
⌗ Tags: #data_security #infosec #information_technology #information_security #networking
Medium
Attack that can shutdown your network (SNMP) — Phase 1
This article is for educational purposes only and should not be misused in a production network. As a cybersecurity enthusiast, I am here…
⤷ Title: Building a Realistic Windows Server 2019 Security Lab (AD, DNS, DHCP, FTP, SMTP & VPN)
════════════════════════
𐀪 Author: Sujal Adhikari
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:03:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #hands_on_learning #penetration_testing #smb #ethical_hacking
════════════════════════
𐀪 Author: Sujal Adhikari
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:03:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #hands_on_learning #penetration_testing #smb #ethical_hacking
Medium
Building a Realistic Windows Server 2019 Security Lab (AD, DNS, DHCP, FTP, SMTP & VPN)
I wanted to move beyond surface‑level tutorials and build something that actually reflects how Windows infrastructure exists in real…
⤷ Title: Try Hack Me- HaskHell CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:03 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #penetration_testing #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:03 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #penetration_testing #cybersecurity #tryhackme_writeup
Medium
Try Hack Me- HaskHell CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: THM Hospital Write-Up
════════════════════════
𐀪 Author: ildirim2908
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:33 GMT
════════════════════════
⌗ Tags: #tryhackme
════════════════════════
𐀪 Author: ildirim2908
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:33 GMT
════════════════════════
⌗ Tags: #tryhackme
Medium
THM Hospital Write-Up
Hey, here you will see the write-up for Hospital machine made by “MrHex” on Tryhackme. You can access the machine from this link…
⤷ Title: kiba | TryHackMe | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:01 GMT
════════════════════════
⌗ Tags: #privilege_escalation #tryhackme_walkthrough #tryhackme #linux #kibana
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:01 GMT
════════════════════════
⌗ Tags: #privilege_escalation #tryhackme_walkthrough #tryhackme #linux #kibana
Medium
kiba | TryHackMe | Walkthrough
Nmap