⤷ Title: Sunset: Nightfall Vulnhub Walkthrough
════════════════════════
𐀪 Author: Ankit
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:12:34 GMT
════════════════════════
⌗ Tags: #penetration_testing #privilege_escalation #ctf_walkthrough #cybersecurity #vulnhub
════════════════════════
𐀪 Author: Ankit
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:12:34 GMT
════════════════════════
⌗ Tags: #penetration_testing #privilege_escalation #ctf_walkthrough #cybersecurity #vulnhub
Medium
Sunset: Nightfall Vulnhub Walkthrough
https://download.vulnhub.com/sunset/nightfall.zip
⤷ Title: Web Fuzzing Assessment [HTB]
════════════════════════
𐀪 Author: db1M
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 16:41:23 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #automation #penetration_testing #fuzzing
════════════════════════
𐀪 Author: db1M
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 16:41:23 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #automation #penetration_testing #fuzzing
Medium
Web Fuzzing Assessment [HTB]
Hello everyone
In this article, I’ll share my approach to solving the Web Fuzzing Skill Assessment on Hack The Box, sharing the…
In this article, I’ll share my approach to solving the Web Fuzzing Skill Assessment on Hack The Box, sharing the…
⤷ Title: Anonymous — TryHackMe Walkthrough
════════════════════════
𐀪 Author: Om Fulsundar
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:00:21 GMT
════════════════════════
⌗ Tags: #anonymous_walkthrough #tryhackme #tryhackme_writeup #tryhackme_walkthrough #anonymous
════════════════════════
𐀪 Author: Om Fulsundar
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:00:21 GMT
════════════════════════
⌗ Tags: #anonymous_walkthrough #tryhackme #tryhackme_writeup #tryhackme_walkthrough #anonymous
Medium
Anonymous — TryHackMe Walkthrough
Recon / Enumeration :
⤷ Title: CyberChef: The Basics | TryHackMe Writeup
════════════════════════
𐀪 Author: Debmalya Mondal⚡
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:58:45 GMT
════════════════════════
⌗ Tags: #tryhackme #cryptography #tryhackme_walkthrough #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: Debmalya Mondal⚡
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:58:45 GMT
════════════════════════
⌗ Tags: #tryhackme #cryptography #tryhackme_walkthrough #cybersecurity #tryhackme_writeup
Medium
CyberChef: The Basics | TryHackMe Writeup
Decrypting Secrets with a Pinch of CyberChef
⤷ Title: DC: 9 VulnHub — Walkthrough
════════════════════════
𐀪 Author: Vicosh
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:56:43 GMT
════════════════════════
⌗ Tags: #vulnhub
════════════════════════
𐀪 Author: Vicosh
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:56:43 GMT
════════════════════════
⌗ Tags: #vulnhub
Medium
DC: 9 VulnHub — Walkthrough
link :
⤷ Title: minU: 1 VulnHub — Walkthrough
════════════════════════
𐀪 Author: Vicosh
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:48:19 GMT
════════════════════════
⌗ Tags: #vulnhub
════════════════════════
𐀪 Author: Vicosh
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:48:19 GMT
════════════════════════
⌗ Tags: #vulnhub
Medium
minU: 1 VulnHub — Walkthrough
link : https://www.vulnhub.com/entry/minu-1,235/
⤷ Title: White Hat vs Black Hat vs Grey Hat!
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 16:54:08 GMT
════════════════════════
⌗ Tags: #cybersecurity #whitehat #ethical_hacking #blackhat #gray_hat_hacker
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 16:54:08 GMT
════════════════════════
⌗ Tags: #cybersecurity #whitehat #ethical_hacking #blackhat #gray_hat_hacker
Medium
White Hat vs Black Hat vs Grey Hat!
Another day, explanation in Hackers Types
⤷ Title: Shodan: Como usar o pesquisador de IoT na sua estratégia de defesa
════════════════════════
𐀪 Author: Bughunt
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:27:28 GMT
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Bughunt
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:27:28 GMT
════════════════════════
⌗ Tags: No_Tags
BugHunt
Shodan: Como usar o pesquisador de IoT na sua estratégia de defesa
Entenda o que é Shodan e como usá-lo para encontrar dispositivos conectados expostos, mapear sua superfície de ataque e fortalecer a defesa.
⤷ Title: “Bug Bounty Bootcamp #16: Stored & Blind XSS — The ‘Time Bomb’ and ‘Message in a Bottle’ of Web…
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:57:03 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #cybersecurity #learning #hacking
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:57:03 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #cybersecurity #learning #hacking
⤷ Title: Chain Exploitation in Web Pentesting ️
════════════════════════
𐀪 Author: Esra Kayhan
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:51:31 GMT
════════════════════════
⌗ Tags: #offensive_security #cybersecurity #security #bug_bounty #pentesting
════════════════════════
𐀪 Author: Esra Kayhan
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:51:31 GMT
════════════════════════
⌗ Tags: #offensive_security #cybersecurity #security #bug_bounty #pentesting
Medium
Chain Exploitation in Web Pentesting 🔗💥🕷️
Chain Exploitation in Web Pentesting 🔗💥🕷️ One of the most common mistakes in web pentesting is evaluating discovered vulnerabilities as isolated findings. In reality, most real-world …
⤷ Title: Why I Wiped the Crack and Went Back to “Community” by Choice (The Full Story)
════════════════════════
𐀪 Author: Mohamed Hwedy
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:33:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #web_security #ethical_hacking
════════════════════════
𐀪 Author: Mohamed Hwedy
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:33:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #web_security #ethical_hacking
Medium
Why I Wiped the Crack and Went Back to “Community” by Choice (The Full Story)
بِسْمِ اللَّهِ الرَّحْمَنِ الرَّحِيمِ، وَالصَّلَاةُ وَالسَّلَامُ عَلَى أَشْرَفِ الْمُرْسَلِينَ سَيِّدِنَا مُحَمَّدٍ، وَعَلَى آلِهِ…
⤷ Title: Secure file upload validation in .NET: A layered approach
════════════════════════
𐀪 Author: Christian Haase
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 19:11:51 GMT
════════════════════════
⌗ Tags: #application_security #secure_coding #aspnetcore #file_validation #dotnet
════════════════════════
𐀪 Author: Christian Haase
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 19:11:51 GMT
════════════════════════
⌗ Tags: #application_security #secure_coding #aspnetcore #file_validation #dotnet
Medium
Secure file upload validation in .NET: A layered approach
I thought file uploads were simple… until I saw how often they aren’t. This article shows a practical .NET baseline that covers common…
⤷ Title: AI vs. AI: The Autonomous Arms Race of 2026
════════════════════════
𐀪 Author: M.A.G | Cybersecurity | F. Policy | Music | Tech |
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:49:58 GMT
════════════════════════
⌗ Tags: #hacking #ai #malware #google #cybersecurity
════════════════════════
𐀪 Author: M.A.G | Cybersecurity | F. Policy | Music | Tech |
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:49:58 GMT
════════════════════════
⌗ Tags: #hacking #ai #malware #google #cybersecurity
Medium
AI vs. AI: The Autonomous Arms Race of 2026
What we need to know
⤷ Title: The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night
════════════════════════
𐀪 Author: Tarek CHEIKH
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:44:48 GMT
════════════════════════
⌗ Tags: #security #aws_s3 #aws #infosec #data
════════════════════════
𐀪 Author: Tarek CHEIKH
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:44:48 GMT
════════════════════════
⌗ Tags: #security #aws_s3 #aws #infosec #data
Medium
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night
Part 1 of 4 in the S3 Security Series
⤷ Title: Attacktive Directory TryHackMe Walkthrough | Active Directory Kerberos Exploitation
════════════════════════
𐀪 Author: Mohamed Rashith S
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 19:41:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #kerberos #active_directory #tryhackme #penetration_testing
════════════════════════
𐀪 Author: Mohamed Rashith S
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 19:41:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #kerberos #active_directory #tryhackme #penetration_testing
Medium
Attacktive Directory TryHackMe Walkthrough | Active Directory Kerberos Exploitation
Category: Active Directory | Kerberos | Windows Domain Attacks Difficulty: Medium Platform: TryHackMe
⤷ Title: OWASP Juice Shop: Docker Üzerinde Kurulum (Windows)
════════════════════════
𐀪 Author: Volkan Yılmaz
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:52:30 GMT
════════════════════════
⌗ Tags: #owasp #juice_shop #siber_güvenlik #penetration_testing #owasp_juice_shop
════════════════════════
𐀪 Author: Volkan Yılmaz
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:52:30 GMT
════════════════════════
⌗ Tags: #owasp #juice_shop #siber_güvenlik #penetration_testing #owasp_juice_shop
Medium
OWASP Juice Shop: Docker Üzerinde Kurulum (Windows)
Bu rehberde sizlere OWASP Juice Shop’un ne olduğuna ve Kali ya da Node.js’e gerekmeden Windows Server’da nasıl kurabileceğinize…
⤷ Title: XOR’un Labirenti
════════════════════════
𐀪 Author: Onurgorur
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:00:58 GMT
════════════════════════
⌗ Tags: #siber_guvenlik #ctf #ctf_writeup #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Onurgorur
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:00:58 GMT
════════════════════════
⌗ Tags: #siber_guvenlik #ctf #ctf_writeup #tryhackme #cybersecurity
Medium
XOR’un Labirenti
Siber güvenlik yolculuğumda bazen en basit görünen algoritmalar, en öğretici anlara dönüşebiliyor. Geçenlerde karşılaştığım bir XOR tabanlı…
⤷ Title: AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 01:01:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 01:01:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: New PayPal Scam Sends Verified Invoices With Fake Support Numbers
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:52:49 +0000
════════════════════════
⌗ Tags: #Phishing Scam #Security #Callback #Cybersecurity #Fraud #Paypal #Phishing #Privacy #Scam
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:52:49 +0000
════════════════════════
⌗ Tags: #Phishing Scam #Security #Callback #Cybersecurity #Fraud #Paypal #Phishing #Privacy #Scam
Hackread
New PayPal Scam Sends Verified Invoices With Fake Support Numbers
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: How do I feel about finding bugs as my meal?
════════════════════════
𐀪 Author: Imran Niaz
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:36:42 GMT
════════════════════════
⌗ Tags: #api #bug_bounty #pentesting #facebook #hacking
════════════════════════
𐀪 Author: Imran Niaz
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:36:42 GMT
════════════════════════
⌗ Tags: #api #bug_bounty #pentesting #facebook #hacking
Medium
How do I feel about finding bugs as my meal?
In real life, my fascination with cybersecurity began when I volunteered to help a local business secure its network after it experienced…
⤷ Title: Getting Started with CAI Framework: Building Multi-Agent Systems in Minutes
════════════════════════
𐀪 Author: MrGood
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:07:51 GMT
════════════════════════
⌗ Tags: #pentesting #infosec #framework #automation_testing #ai
════════════════════════
𐀪 Author: MrGood
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:07:51 GMT
════════════════════════
⌗ Tags: #pentesting #infosec #framework #automation_testing #ai
Medium
Getting Started with CAI Framework: Building Multi-Agent Systems in Minutes
In the rapidly evolving landscape of AI, the ability to orchestrate multiple agents to work in parallel is becoming a game-changer. Whether…