⤷ Title: I Blocked Anime Websites Like a Pro (and My Sister is Not Happy )
════════════════════════
𐀪 Author: Swetha
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:11:56 GMT
════════════════════════
⌗ Tags: #hacking #ethical_hacking #hacker #network
════════════════════════
𐀪 Author: Swetha
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:11:56 GMT
════════════════════════
⌗ Tags: #hacking #ethical_hacking #hacker #network
Medium
I Blocked Anime Websites Like a Pro (and My Sister is Not Happy 😭)
So… I finally did it.
⤷ Title: CTF — Basic Pentesting
════════════════════════
𐀪 Author: Marduk I Am
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:47:09 GMT
════════════════════════
⌗ Tags: #ctf #penetration_testing #tryhackme #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Marduk I Am
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:47:09 GMT
════════════════════════
⌗ Tags: #ctf #penetration_testing #tryhackme #cybersecurity #ethical_hacking
Medium
Basic Pentesting (CTF Walkthrough)
A TryHackMe CTF
⤷ Title: Cyber Law, Ethical Hacking and Penetration Testing
════════════════════════
𐀪 Author: Nukhbasoomro
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:25:49 GMT
════════════════════════
⌗ Tags: #cyber_law #penetration_testing #ethical_hacking
════════════════════════
𐀪 Author: Nukhbasoomro
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:25:49 GMT
════════════════════════
⌗ Tags: #cyber_law #penetration_testing #ethical_hacking
Medium
Cyber Law, Ethical Hacking and Penetration Testing
Core Concepts & Terminology
⤷ Title: Write-up: Retro lab (Hard) on THM
════════════════════════
𐀪 Author: cLODIUS cOCK
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:18:39 GMT
════════════════════════
⌗ Tags: #penetration_testing #pentesting #web_app_pentesting #cybersecurity
════════════════════════
𐀪 Author: cLODIUS cOCK
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:18:39 GMT
════════════════════════
⌗ Tags: #penetration_testing #pentesting #web_app_pentesting #cybersecurity
Medium
Write-up: Retro lab (Hard) on THM
This document is a structured security write-up based on hands-on exploitation of the Retro lab on TryHackMe website…
⤷ Title: Intigriti’s December XSS challenge
By fh4ntke
════════════════════════
𐀪 Author: Hexshubz
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:03:10 GMT
════════════════════════
⌗ Tags: #tryhackme #intigriti #hackthebox_writeup
By fh4ntke
════════════════════════
𐀪 Author: Hexshubz
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:03:10 GMT
════════════════════════
⌗ Tags: #tryhackme #intigriti #hackthebox_writeup
Medium
Intigriti’s December XSS challenge
By fh4ntke
By fh4ntke
Login with any name
⤷ Title: Ethical Hacking & Penetration Testing — Complete
════════════════════════
𐀪 Author: Nukhbasoomro
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 17:30:07 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Nukhbasoomro
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 17:30:07 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
Ethical Hacking & Penetration Testing — Complete
This document consolidates 40 questions on ethical hacking and penetration testing with answers and explanations.
⤷ Title: What I Found While Analyzing a Fake Banking App
════════════════════════
𐀪 Author: Adwaith S
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:57:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #android_malware #malware_analysis #cyber_security_awareness
════════════════════════
𐀪 Author: Adwaith S
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:57:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #android_malware #malware_analysis #cyber_security_awareness
Medium
What I Found While Analyzing a Fake Banking App
An awareness-based analysis of a real Android malware incident
⤷ Title: Practical Roadmap for Learning File Upload Vulnerabilities
════════════════════════
𐀪 Author: Daniel Hammoud
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:21:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #web_security #cybersecurity #roadmaps #file_upload_vulnerability
════════════════════════
𐀪 Author: Daniel Hammoud
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:21:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #web_security #cybersecurity #roadmaps #file_upload_vulnerability
Medium
Practical Roadmap for Learning File Upload Vulnerabilities
Labs, Rooms, and CTF References (With Short Tactical Notes)
⤷ Title: How my valid critical bug got rejected
════════════════════════
𐀪 Author: TheCyberAryan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:15:56 GMT
════════════════════════
⌗ Tags: #ethical_hacking #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: TheCyberAryan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:15:56 GMT
════════════════════════
⌗ Tags: #ethical_hacking #bug_bounty #cybersecurity
Medium
How my valid critical bug got rejected
A critical vulnerability I found was rejected simply because the affected asset was labeled “third-party / out of scope” — even though it…
⤷ Title: How I Discovered a Dependency Confusion Vulnerability in a Ruby Application Leading to RCE
════════════════════════
𐀪 Author: Ahmed Tarek
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:06:39 GMT
════════════════════════
⌗ Tags: #pentesting #bug_bounty #dependency_confusion #bug_bounty_tips #ruby
════════════════════════
𐀪 Author: Ahmed Tarek
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:06:39 GMT
════════════════════════
⌗ Tags: #pentesting #bug_bounty #dependency_confusion #bug_bounty_tips #ruby
Medium
How I Discovered a Dependency Confusion Vulnerability in a Ruby Application Leading to RCE
hey there,
⤷ Title: ANTHEM TryHackMe Writeup/Walkthrough
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:55:04 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ctf #pentesting #hacking
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:55:04 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ctf #pentesting #hacking
Medium
ANTHEM TryHackMe Writeup/Walkthrough
ANTHEM Target — THM Writeup
⤷ Title: Agent Sudo THM Writeup/Walkthrough
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:49:47 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #ctf #tryhackme #cybersecurity
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:49:47 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #ctf #tryhackme #cybersecurity
Medium
Agent Sudo THM Writeup/Walkthrough
Machine Name: Agent Sudo
⤷ Title: How I Cracked the eCPPTv3 at 16
════════════════════════
𐀪 Author: Joel Morillas Pagan (Ghxstsec)
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:28:38 GMT
════════════════════════
⌗ Tags: #pentesting #ecppt #cibersecurity #hacking
════════════════════════
𐀪 Author: Joel Morillas Pagan (Ghxstsec)
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:28:38 GMT
════════════════════════
⌗ Tags: #pentesting #ecppt #cibersecurity #hacking
Medium
How I Cracked the eCPPTv3 at 16 🎂
In this article, I’m speaking about the experience of completing the eLearning Professional Penetration Testing exam from INE Security at…
⤷ Title: Why Encryption Alone Doesn’t Make Systems Secure
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:16:43 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #encryption #cybersecurity #offensive_security
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:16:43 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #encryption #cybersecurity #offensive_security
Medium
Why Encryption Alone Doesn’t Make Systems Secure
Encryption is often treated like a magic shield.
⤷ Title: What Are Command and Control (C2) Servers and Why Do They Matter?
════════════════════════
𐀪 Author: Bishal Poudel
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:03:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #malware #network_security #infosec
════════════════════════
𐀪 Author: Bishal Poudel
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:03:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #malware #network_security #infosec
Medium
What Are Command and Control (C2) Servers and Why Do They Matter?
A high-level overview of how attackers control compromised systems and how defenders try to break that control.
⤷ Title: “And Then There Were None”: Achieving My PNPT in 2025!
════════════════════════
𐀪 Author: Jinendar Kothari
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:28:40 GMT
════════════════════════
⌗ Tags: #offensive_security #tcm_security #certification #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Jinendar Kothari
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:28:40 GMT
════════════════════════
⌗ Tags: #offensive_security #tcm_security #certification #penetration_testing #cybersecurity
Medium
“And Then There Were None”: Achieving My PNPT in 2025!
Hello fellow readers! A very Happy New Year to you and your loved ones.
⤷ Title: Cyber Law in Bangladesh (2026)
════════════════════════
𐀪 Author: Kazi Sabbir
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:23:08 GMT
════════════════════════
⌗ Tags: #cyber_law #cybercrime #cybersecurity #law #ethical_hacking
════════════════════════
𐀪 Author: Kazi Sabbir
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:23:08 GMT
════════════════════════
⌗ Tags: #cyber_law #cybercrime #cybersecurity #law #ethical_hacking
Medium
Cyber Law in Bangladesh (2026)
Bangladesh’s cybersecurity regime has undergone a fundamental reset. As of January 2026, the governing framework is the Cyber Security…
⤷ Title: XSS Payload Crafting and WAF Bypass: A Beginner‑Friendly Guide
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:13:47 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #waf #bug_bounty_writeup #xss_attack
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:13:47 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #waf #bug_bounty_writeup #xss_attack
Medium
XSS Payload Crafting and WAF Bypass: A Beginner‑Friendly Guide
Hey,
⤷ Title: Hidden in the Source: Discovering Reflected XSS via Manual Code Review
════════════════════════
𐀪 Author: Samet Yiğit
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:26:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: Samet Yiğit
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:26:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #bug_bounty
Medium
Hidden in the Source: Discovering Reflected XSS via Manual Code Review
In bug bounty hunting, when automated scanners fail and the scope is narrow, your best weapon is your own eyes. Today, I’ll share how I…
⤷ Title: The Double Life of Your JPEGs: Privacy Leaks and Hidden Payloads
════════════════════════
𐀪 Author: Xiao Paw
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:25:10 GMT
════════════════════════
⌗ Tags: #infosec #osint #cybersecurity #hacking #privacy
════════════════════════
𐀪 Author: Xiao Paw
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:25:10 GMT
════════════════════════
⌗ Tags: #infosec #osint #cybersecurity #hacking #privacy
Medium
The Double Life of Your JPEGs: Privacy Leaks and Hidden Payloads
We treat images as harmless visuals, but under the hood, they are data containers waiting to be exploited. Here is how the invisible layer…
⤷ Title: SSTI Explained: HTB Hacknet Walkthrough
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:48:20 GMT
════════════════════════
⌗ Tags: #hackthebox #technology #infosec #tech #cybersecurity
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:48:20 GMT
════════════════════════
⌗ Tags: #hackthebox #technology #infosec #tech #cybersecurity
Medium
SSTI Explained: HTB Hacknet Walkthrough
Welcome to HTB Hacknet, a Hard-difficulty machine on Hack The Box that tests your ability to read the developer’s mind. This is a…