⤷ Title: Impacket Developer Guide. Part 3. Make your own Lateral Movement
════════════════════════
𐀪 Author: CICADA8
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:16:29 GMT
════════════════════════
⌗ Tags: #red_team #hacking #pentesting #active_directory
════════════════════════
𐀪 Author: CICADA8
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:16:29 GMT
════════════════════════
⌗ Tags: #red_team #hacking #pentesting #active_directory
Medium
Impacket Developer Guide. Part 3. Make your own Lateral Movement
Create your own LM tool using impacket!
⤷ Title: How to Get Scammed (by DPRK Hackers)
════════════════════════
𐀪 Author: OZ
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #blockchain #north_korea #malware #infosec
════════════════════════
𐀪 Author: OZ
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #blockchain #north_korea #malware #infosec
Medium
How to Get Scammed (by DPRK Hackers)
A deep dive into DPRK hackers using fake job interviews and blockchain-based C2 to deploy malware
⤷ Title: Attack that can shutdown your network (SNMP) — Phase 1
════════════════════════
𐀪 Author: Shaik afrid
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:29:57 GMT
════════════════════════
⌗ Tags: #data_security #infosec #information_technology #information_security #networking
════════════════════════
𐀪 Author: Shaik afrid
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:29:57 GMT
════════════════════════
⌗ Tags: #data_security #infosec #information_technology #information_security #networking
Medium
Attack that can shutdown your network (SNMP) — Phase 1
This article is for educational purposes only and should not be misused in a production network. As a cybersecurity enthusiast, I am here…
⤷ Title: Building a Realistic Windows Server 2019 Security Lab (AD, DNS, DHCP, FTP, SMTP & VPN)
════════════════════════
𐀪 Author: Sujal Adhikari
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:03:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #hands_on_learning #penetration_testing #smb #ethical_hacking
════════════════════════
𐀪 Author: Sujal Adhikari
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:03:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #hands_on_learning #penetration_testing #smb #ethical_hacking
Medium
Building a Realistic Windows Server 2019 Security Lab (AD, DNS, DHCP, FTP, SMTP & VPN)
I wanted to move beyond surface‑level tutorials and build something that actually reflects how Windows infrastructure exists in real…
⤷ Title: Try Hack Me- HaskHell CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:03 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #penetration_testing #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:03 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #penetration_testing #cybersecurity #tryhackme_writeup
Medium
Try Hack Me- HaskHell CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: THM Hospital Write-Up
════════════════════════
𐀪 Author: ildirim2908
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:33 GMT
════════════════════════
⌗ Tags: #tryhackme
════════════════════════
𐀪 Author: ildirim2908
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:33 GMT
════════════════════════
⌗ Tags: #tryhackme
Medium
THM Hospital Write-Up
Hey, here you will see the write-up for Hospital machine made by “MrHex” on Tryhackme. You can access the machine from this link…
⤷ Title: kiba | TryHackMe | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:01 GMT
════════════════════════
⌗ Tags: #privilege_escalation #tryhackme_walkthrough #tryhackme #linux #kibana
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:01 GMT
════════════════════════
⌗ Tags: #privilege_escalation #tryhackme_walkthrough #tryhackme #linux #kibana
Medium
kiba | TryHackMe | Walkthrough
Nmap
⤷ Title: Understanding Forced Browsing Risks in Web Applications
════════════════════════
𐀪 Author: Sahil Sharma
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:29:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacker #owasp_top_10 #technology #ethical_hacking
════════════════════════
𐀪 Author: Sahil Sharma
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:29:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacker #owasp_top_10 #technology #ethical_hacking
Medium
Understanding Forced Browsing Risks in Web Applications
Forced browsing is one of the most overlooked web application vulnerabilities. Despite being simple in nature, it can lead to severe…
⤷ Title: Day 1- CEH V13 Cybersecurity Learning Journey
════════════════════════
𐀪 Author: Arun kumar G
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:20:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #windows_privilege_esc #windows_user
════════════════════════
𐀪 Author: Arun kumar G
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:20:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #windows_privilege_esc #windows_user
Medium
Day 1- CEH V13 Cybersecurity Learning Journey
Hi Everyone!! I am documenting my learning here with you inorder to track and revise it later.
⤷ Title: Dumping Full db through Apache superset
════════════════════════
𐀪 Author: Ahmed Algohary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:37 GMT
════════════════════════
⌗ Tags: #python #pentesting #apache #ethical_hacking #apache_superset
════════════════════════
𐀪 Author: Ahmed Algohary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:37 GMT
════════════════════════
⌗ Tags: #python #pentesting #apache #ethical_hacking #apache_superset
Medium
Dumping Full db through Apache superset automation
So, i was doing a pentest and i came across a subdomain with Apache superset installed, i had admin access to it, after exploring a bit i…
⤷ Title: When “Excellent Security” Still Fails: A Real-World SSRF Lesson
════════════════════════
𐀪 Author: Tyreek Haynes
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:43:08 GMT
════════════════════════
⌗ Tags: #dream_machine_pro #ssrf #cybersecurity #information_technology #internet
════════════════════════
𐀪 Author: Tyreek Haynes
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:43:08 GMT
════════════════════════
⌗ Tags: #dream_machine_pro #ssrf #cybersecurity #information_technology #internet
Medium
When “Excellent Security” Still Fails: A Real-World SSRF Lesson
During a short, controlled security assessment of an educational institution’s network, I encountered a scenario that perfectly…
⤷ Title: When ‘Dead’ Pets Come Back to Life: A Bug I Found on a Pet Platform
════════════════════════
𐀪 Author: SK3PT1K3R
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 21:34:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #api #bugbounty_writeup #business_logic
════════════════════════
𐀪 Author: SK3PT1K3R
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 21:34:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #api #bugbounty_writeup #business_logic
Medium
🐾 When ‘Dead’ Pets Come Back to Life: A Bug I Found on a Pet Platform
Ever marked a pet as inactive, thinking it’s “retired for good”… only to find you can still rename it… and even bring it back to life? 😳
⤷ Title: Top 5 AI Tools Every Bug Bounty Hunter Should Know
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:04:07 GMT
════════════════════════
⌗ Tags: #ai_hacking #bug_bounty #cybersecurity #top_5 #ethical_hacking
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:04:07 GMT
════════════════════════
⌗ Tags: #ai_hacking #bug_bounty #cybersecurity #top_5 #ethical_hacking
Medium
Top 5 AI Tools Every Bug Bounty Hunter Should Know
Your New Hunting Partners Are not Human
⤷ Title: Dig Dug: TryHackMe WriteUp
════════════════════════
𐀪 Author: Bridget
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:39:16 GMT
════════════════════════
⌗ Tags: #infosec #dns #tryhackme_writeup #tryhackme #dns_security
════════════════════════
𐀪 Author: Bridget
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:39:16 GMT
════════════════════════
⌗ Tags: #infosec #dns #tryhackme_writeup #tryhackme #dns_security
Medium
Dig Dug: TryHackMe WriteUp
Learn to solve the Dig Dug room on TryHackMe. Master DNS enumeration using ‘dig’ to find hidden flags in this quick, step-by-step write-up.
⤷ Title: Data Heist — Hackviser Real-World Scenario Walkthrough
════════════════════════
𐀪 Author: Hussein 404
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 21:18:59 GMT
════════════════════════
⌗ Tags: #data_heist #penetration_testing #hackviser #ctf #cybersecurity
════════════════════════
𐀪 Author: Hussein 404
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 21:18:59 GMT
════════════════════════
⌗ Tags: #data_heist #penetration_testing #hackviser #ctf #cybersecurity
Medium
Data Heist — Hackviser Real-World Scenario Walkthrough
A step-by-step walkthrough of the Hackviser “Data Heist” scenario, analyzing data theft techniques and real-world exploitation paths.
⤷ Title: Attacktive Directory TryHackME walkthrough
════════════════════════
𐀪 Author: Nishchay Manhas
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:20:28 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #cybersecurity #tryhackme #ctf_writeup #ctf
════════════════════════
𐀪 Author: Nishchay Manhas
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 20:20:28 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #cybersecurity #tryhackme #ctf_writeup #ctf
Medium
Attacktive Directory TryHackME walkthrough
The “Attacktive Directory” CTF room on TryHackMe is designed to teach users how to exploit common vulnerabilities in a Windows Active…
⤷ Title: About Cyber security: Protecting Your Digital Life Every Day
════════════════════════
𐀪 Author: Sourav Krishnan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 21:03:29 GMT
════════════════════════
⌗ Tags: #cybercrime #ethical_hacking #training_institute #cybersecurity #learning
════════════════════════
𐀪 Author: Sourav Krishnan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 21:03:29 GMT
════════════════════════
⌗ Tags: #cybercrime #ethical_hacking #training_institute #cybersecurity #learning
Medium
About Cyber security: Protecting Your Digital Life Every Day
In today’s world, almost everything we do lives online, from paying bills and chatting, managing businesses and storing memories. But have…
⤷ Title: CVE-2026-22718: EOL Spring CLI Tool for VS Code Found Vulnerable to Command Injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:48:23 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Command Injection #CVE_2026_22718 #developer security #end_of_life #EOL #Spring CLI #VS Code Extension #vulnerability management #Yue Liu
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:48:23 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Command Injection #CVE_2026_22718 #developer security #end_of_life #EOL #Spring CLI #VS Code Extension #vulnerability management #Yue Liu
Daily CyberSecurity
CVE-2026-22718: EOL Spring CLI Tool for VS Code Found Vulnerable to Command Injection
Urgent: Uninstall the EOL Spring CLI VS Code extension now. CVE-2026-22718 (CVSS 6.6) allows command injection and will not be patched.
⤷ Title: From 403 Forbidden to $$$$ How a Simple Extension Bypass Led to Unauthenticated Access to Private…
════════════════════════
𐀪 Author: KiRaaDx
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 22:09:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: KiRaaDx
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 22:09:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_tips #bug_bounty
Medium
From 403 Forbidden to $$$$ How a Simple Extension Bypass Led to Unauthenticated Access to Private Documents
The target was a private HackerOne program that allows users to create organizations, upload documents, and share them naturally, documents…
⤷ Title: Can you Realistcally Hack a Wifi Network In 2026 — I Tried.
════════════════════════
𐀪 Author: Alex Grande
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:32:49 GMT
════════════════════════
⌗ Tags: #security #ethical_hacking #hacking #technology #cybersecurity
════════════════════════
𐀪 Author: Alex Grande
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:32:49 GMT
════════════════════════
⌗ Tags: #security #ethical_hacking #hacking #technology #cybersecurity
Medium
Can you Realistcally Hack a Wifi Network In 2026 — I Tried.
I Tried and this Happened…
⤷ Title: Cybersecurity Ethical Hacking — Discover the Top 3 Career Strategies for Career Advancement
════════════════════════
𐀪 Author: Franklin Rhodes
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:32:07 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #kali_linux #careers #infosec
════════════════════════
𐀪 Author: Franklin Rhodes
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:32:07 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #kali_linux #careers #infosec
Medium
Cybersecurity Ethical Hacking — Discover the Top 3 Career Strategies for Career Advancement
https://app.heygen.com/videos/39f38a8f25d040bfa12ad55d4eb63b5c