⤷ Title: How I Found a Critical Biometric 2FA Bypass… and Lost the Bounty
════════════════════════
𐀪 Author: LETCHU PKT
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:39:00 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #cyber_security_awareness #hacking #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: LETCHU PKT
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:39:00 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #cyber_security_awareness #hacking #bug_bounty_tips #bug_bounty
Medium
How I Found a Critical Biometric 2FA Bypass… and Lost the Bounty
How a Hardcoded Superadmin Key Led to a Biometric 2FA Bypass — and a Painful Duplicate
⤷ Title: Day 3 of Learning AWS: Elastic IP and Elastic Block Storage
════════════════════════
𐀪 Author: Muhammad Kashif
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:38:52 GMT
════════════════════════
⌗ Tags: #learning #cloud_security #cloud_computing #bug_bounty #aws
════════════════════════
𐀪 Author: Muhammad Kashif
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:38:52 GMT
════════════════════════
⌗ Tags: #learning #cloud_security #cloud_computing #bug_bounty #aws
Medium
Day 3 of Learning AWS: Elastic IP and Elastic Block Storage
This is Day 3 of my AWS learning journey. Today I learned about Elastic IPs and storage options in EC2, especially Elastic Block Storage…
⤷ Title: Lab: Bypassing access controls using email address parsing discrepancies
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:42:10 GMT
════════════════════════
⌗ Tags: #portswigger #medium #ctf #hacking #pentesting
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:42:10 GMT
════════════════════════
⌗ Tags: #portswigger #medium #ctf #hacking #pentesting
Medium
Lab: Bypassing access controls using email address parsing discrepancies
Bu labda ilk bakışta oldukça basit görünen bir kontrol var:
“Sadece ginandjuice.shop domain’ine sahip email adresleriyle kayıt…
“Sadece ginandjuice.shop domain’ine sahip email adresleriyle kayıt…
⤷ Title: How Telegram Clicks Can Leak Your Real IP?
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:30 GMT
════════════════════════
⌗ Tags: #hacker #linux #hacking #telegram #s_h4ck13
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:30 GMT
════════════════════════
⌗ Tags: #hacker #linux #hacking #telegram #s_h4ck13
Medium
How Telegram Clicks Can Leak Your Real IP?
I’ll reproduce this scenario from an offensive security perspective.
⤷ Title: I Received My Own Personal Details From a Telegram Stranger — Here’s the Truth
════════════════════════
𐀪 Author: Pradhan's Fintech
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:00:53 GMT
════════════════════════
⌗ Tags: #hacking #safety #telegram #scam #personal_experience
════════════════════════
𐀪 Author: Pradhan's Fintech
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:00:53 GMT
════════════════════════
⌗ Tags: #hacking #safety #telegram #scam #personal_experience
Medium
I Received My Own Personal Details From a Telegram Stranger — Here’s the Truth
Right now, we are in 2026. If we look back from 2010 to 2025, ‘‘ we can see that in these 15 years, online scams and frauds have increased…
⤷ Title: Impacket Developer Guide. Part 3. Make your own Lateral Movement
════════════════════════
𐀪 Author: CICADA8
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:16:29 GMT
════════════════════════
⌗ Tags: #red_team #hacking #pentesting #active_directory
════════════════════════
𐀪 Author: CICADA8
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:16:29 GMT
════════════════════════
⌗ Tags: #red_team #hacking #pentesting #active_directory
Medium
Impacket Developer Guide. Part 3. Make your own Lateral Movement
Create your own LM tool using impacket!
⤷ Title: How to Get Scammed (by DPRK Hackers)
════════════════════════
𐀪 Author: OZ
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #blockchain #north_korea #malware #infosec
════════════════════════
𐀪 Author: OZ
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #blockchain #north_korea #malware #infosec
Medium
How to Get Scammed (by DPRK Hackers)
A deep dive into DPRK hackers using fake job interviews and blockchain-based C2 to deploy malware
⤷ Title: Attack that can shutdown your network (SNMP) — Phase 1
════════════════════════
𐀪 Author: Shaik afrid
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:29:57 GMT
════════════════════════
⌗ Tags: #data_security #infosec #information_technology #information_security #networking
════════════════════════
𐀪 Author: Shaik afrid
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:29:57 GMT
════════════════════════
⌗ Tags: #data_security #infosec #information_technology #information_security #networking
Medium
Attack that can shutdown your network (SNMP) — Phase 1
This article is for educational purposes only and should not be misused in a production network. As a cybersecurity enthusiast, I am here…
⤷ Title: Building a Realistic Windows Server 2019 Security Lab (AD, DNS, DHCP, FTP, SMTP & VPN)
════════════════════════
𐀪 Author: Sujal Adhikari
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:03:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #hands_on_learning #penetration_testing #smb #ethical_hacking
════════════════════════
𐀪 Author: Sujal Adhikari
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:03:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #hands_on_learning #penetration_testing #smb #ethical_hacking
Medium
Building a Realistic Windows Server 2019 Security Lab (AD, DNS, DHCP, FTP, SMTP & VPN)
I wanted to move beyond surface‑level tutorials and build something that actually reflects how Windows infrastructure exists in real…
⤷ Title: Try Hack Me- HaskHell CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:03 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #penetration_testing #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:03 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #penetration_testing #cybersecurity #tryhackme_writeup
Medium
Try Hack Me- HaskHell CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: THM Hospital Write-Up
════════════════════════
𐀪 Author: ildirim2908
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:33 GMT
════════════════════════
⌗ Tags: #tryhackme
════════════════════════
𐀪 Author: ildirim2908
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:33 GMT
════════════════════════
⌗ Tags: #tryhackme
Medium
THM Hospital Write-Up
Hey, here you will see the write-up for Hospital machine made by “MrHex” on Tryhackme. You can access the machine from this link…
⤷ Title: kiba | TryHackMe | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:01 GMT
════════════════════════
⌗ Tags: #privilege_escalation #tryhackme_walkthrough #tryhackme #linux #kibana
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:01 GMT
════════════════════════
⌗ Tags: #privilege_escalation #tryhackme_walkthrough #tryhackme #linux #kibana
Medium
kiba | TryHackMe | Walkthrough
Nmap
⤷ Title: Understanding Forced Browsing Risks in Web Applications
════════════════════════
𐀪 Author: Sahil Sharma
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:29:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacker #owasp_top_10 #technology #ethical_hacking
════════════════════════
𐀪 Author: Sahil Sharma
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:29:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacker #owasp_top_10 #technology #ethical_hacking
Medium
Understanding Forced Browsing Risks in Web Applications
Forced browsing is one of the most overlooked web application vulnerabilities. Despite being simple in nature, it can lead to severe…
⤷ Title: Day 1- CEH V13 Cybersecurity Learning Journey
════════════════════════
𐀪 Author: Arun kumar G
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:20:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #windows_privilege_esc #windows_user
════════════════════════
𐀪 Author: Arun kumar G
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:20:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #windows_privilege_esc #windows_user
Medium
Day 1- CEH V13 Cybersecurity Learning Journey
Hi Everyone!! I am documenting my learning here with you inorder to track and revise it later.
⤷ Title: Dumping Full db through Apache superset
════════════════════════
𐀪 Author: Ahmed Algohary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:37 GMT
════════════════════════
⌗ Tags: #python #pentesting #apache #ethical_hacking #apache_superset
════════════════════════
𐀪 Author: Ahmed Algohary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:37 GMT
════════════════════════
⌗ Tags: #python #pentesting #apache #ethical_hacking #apache_superset
Medium
Dumping Full db through Apache superset automation
So, i was doing a pentest and i came across a subdomain with Apache superset installed, i had admin access to it, after exploring a bit i…
⤷ Title: When “Excellent Security” Still Fails: A Real-World SSRF Lesson
════════════════════════
𐀪 Author: Tyreek Haynes
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:43:08 GMT
════════════════════════
⌗ Tags: #dream_machine_pro #ssrf #cybersecurity #information_technology #internet
════════════════════════
𐀪 Author: Tyreek Haynes
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:43:08 GMT
════════════════════════
⌗ Tags: #dream_machine_pro #ssrf #cybersecurity #information_technology #internet
Medium
When “Excellent Security” Still Fails: A Real-World SSRF Lesson
During a short, controlled security assessment of an educational institution’s network, I encountered a scenario that perfectly…
⤷ Title: When ‘Dead’ Pets Come Back to Life: A Bug I Found on a Pet Platform
════════════════════════
𐀪 Author: SK3PT1K3R
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 21:34:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #api #bugbounty_writeup #business_logic
════════════════════════
𐀪 Author: SK3PT1K3R
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 21:34:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #api #bugbounty_writeup #business_logic
Medium
🐾 When ‘Dead’ Pets Come Back to Life: A Bug I Found on a Pet Platform
Ever marked a pet as inactive, thinking it’s “retired for good”… only to find you can still rename it… and even bring it back to life? 😳
⤷ Title: Top 5 AI Tools Every Bug Bounty Hunter Should Know
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:04:07 GMT
════════════════════════
⌗ Tags: #ai_hacking #bug_bounty #cybersecurity #top_5 #ethical_hacking
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:04:07 GMT
════════════════════════
⌗ Tags: #ai_hacking #bug_bounty #cybersecurity #top_5 #ethical_hacking
Medium
Top 5 AI Tools Every Bug Bounty Hunter Should Know
Your New Hunting Partners Are not Human
⤷ Title: Dig Dug: TryHackMe WriteUp
════════════════════════
𐀪 Author: Bridget
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:39:16 GMT
════════════════════════
⌗ Tags: #infosec #dns #tryhackme_writeup #tryhackme #dns_security
════════════════════════
𐀪 Author: Bridget
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:39:16 GMT
════════════════════════
⌗ Tags: #infosec #dns #tryhackme_writeup #tryhackme #dns_security
Medium
Dig Dug: TryHackMe WriteUp
Learn to solve the Dig Dug room on TryHackMe. Master DNS enumeration using ‘dig’ to find hidden flags in this quick, step-by-step write-up.
⤷ Title: Data Heist — Hackviser Real-World Scenario Walkthrough
════════════════════════
𐀪 Author: Hussein 404
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 21:18:59 GMT
════════════════════════
⌗ Tags: #data_heist #penetration_testing #hackviser #ctf #cybersecurity
════════════════════════
𐀪 Author: Hussein 404
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 21:18:59 GMT
════════════════════════
⌗ Tags: #data_heist #penetration_testing #hackviser #ctf #cybersecurity
Medium
Data Heist — Hackviser Real-World Scenario Walkthrough
A step-by-step walkthrough of the Hackviser “Data Heist” scenario, analyzing data theft techniques and real-world exploitation paths.
⤷ Title: Attacktive Directory TryHackME walkthrough
════════════════════════
𐀪 Author: Nishchay Manhas
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:20:28 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #cybersecurity #tryhackme #ctf_writeup #ctf
════════════════════════
𐀪 Author: Nishchay Manhas
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:20:28 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #cybersecurity #tryhackme #ctf_writeup #ctf
Medium
Attacktive Directory TryHackME walkthrough
The “Attacktive Directory” CTF room on TryHackMe is designed to teach users how to exploit common vulnerabilities in a Windows Active…