⤷ Title: SSTI Explained: HTB Hacknet Walkthrough
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:48:20 GMT
════════════════════════
⌗ Tags: #hackthebox #technology #infosec #tech #cybersecurity
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:48:20 GMT
════════════════════════
⌗ Tags: #hackthebox #technology #infosec #tech #cybersecurity
Medium
SSTI Explained: HTB Hacknet Walkthrough
Welcome to HTB Hacknet, a Hard-difficulty machine on Hack The Box that tests your ability to read the developer’s mind. This is a…
⤷ Title: HackTheBox Module: Password Attacks | Credentials Hunting in Network Traffic
════════════════════════
𐀪 Author: Sunain
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:08:01 GMT
════════════════════════
⌗ Tags: #hackthebox #packet_capture #wireshark #hackthebox_writeup #networking
════════════════════════
𐀪 Author: Sunain
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:08:01 GMT
════════════════════════
⌗ Tags: #hackthebox #packet_capture #wireshark #hackthebox_writeup #networking
Medium
HackTheBox Module: Password Attacks | Credentials Hunting in Network Traffic
Introduction
Despite widespread adoption of encrypted protocols, misconfigurations and legacy services can still expose sensitive data in…
Despite widespread adoption of encrypted protocols, misconfigurations and legacy services can still expose sensitive data in…
⤷ Title: SQL Injection Lab(THM)
════════════════════════
𐀪 Author: Tarek Monoar
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:54:30 GMT
════════════════════════
⌗ Tags: #sqli #sqlite3 #sqlite #database #sql
════════════════════════
𐀪 Author: Tarek Monoar
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:54:30 GMT
════════════════════════
⌗ Tags: #sqli #sqlite3 #sqlite #database #sql
Medium
SQL Injection Lab(THM):Task 03
Understand how SQL injection attacks work and how to exploit this vulnerability.
⤷ Title: Nested Comment Bypass file upload
════════════════════════
𐀪 Author: Muhammad Syahrul Haniawan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:03:18 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Muhammad Syahrul Haniawan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:03:18 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #cybersecurity
Medium
Nested Comment Bypass file upload
Long time no see~ Halo semua, sudah hampir 3 tahun saya tidak menulis write up tentang finding saya di dunia bug hunting dan CyberSecurity karena saya sendiri beberapa tahun kebelakang tidak terlalu …
⤷ Title: Why the #1 Vulnerability Isn’t About Hacking, It’s About Walking Through Open Doors
════════════════════════
𐀪 Author: Wnellygrace
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:05:30 GMT
════════════════════════
⌗ Tags: #web_security #cybersecurity #application_security #broken_access_control #owasp
════════════════════════
𐀪 Author: Wnellygrace
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:05:30 GMT
════════════════════════
⌗ Tags: #web_security #cybersecurity #application_security #broken_access_control #owasp
Medium
Why the #1 Vulnerability Isn’t About Hacking, It’s About Walking Through Open Doors
In the ever-evolving landscape of cybersecurity, few vulnerabilities pose as pervasive and dangerous a threat as Broken Access Control…
⤷ Title: Why IoT Security Research Lives at the Intersection of RF and Cybersecurity
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:26:32 GMT
════════════════════════
⌗ Tags: #wifi #hacking #cybersecurity #pentesting #iot
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:26:32 GMT
════════════════════════
⌗ Tags: #wifi #hacking #cybersecurity #pentesting #iot
Medium
Why IoT Security Research Lives at the Intersection of RF and Cybersecurity
Insights from testing real-world Bluetooth, Wi-Fi, and proprietary wireless protocols
⤷ Title: Hackear la Física, no la Matemática: Cómo construí un simulador de Ataque de Canal Lateral (SCA) en…
════════════════════════
𐀪 Author: Methodwhite
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 00:46:33 GMT
════════════════════════
⌗ Tags: #python #hacking #cryptography #cybersecurity #reverse_engineering
════════════════════════
𐀪 Author: Methodwhite
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 00:46:33 GMT
════════════════════════
⌗ Tags: #python #hacking #cryptography #cybersecurity #reverse_engineering
Medium
Hackear la Física, no la Matemática: Cómo construí un simulador de Ataque de Canal Lateral (SCA) en Python
De la fuerza bruta al Análisis de Segundo Orden. La historia del Proyecto 3t y cómo rompimos AES explotando el ruido y el tiempo.
⤷ Title: 10 Must-Know Malware Analysis Interview Questions (with Scenario-Based Answers)
════════════════════════
𐀪 Author: Vikas Singh Panwar
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:54:43 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #malware #cybersecurity #interview
════════════════════════
𐀪 Author: Vikas Singh Panwar
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:54:43 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #malware #cybersecurity #interview
Medium
10 Must-Know Malware Analysis Interview Questions (with Scenario-Based Answers)
Get ready for your malware analyst interview with 10 must-know malware analysis questions and clear, practical answers covering IOCs…
⤷ Title: Mastering iOS Pentesting: Part 2 — Shell Access, File Transfers, IPA-App Signing, TrollStore & IPA…
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 00:46:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #mobile_security #information_security #cybercrime
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 00:46:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #mobile_security #information_security #cybercrime
Medium
Mastering iOS Pentesting: Part 2 — Shell Access, File Transfers, IPA-App Signing, TrollStore & IPA Dumping & Decrypting
Welcome back to the Mastering iOS Pentesting series! In Part 1, we successfully jailbroke our test devices (Dopamine on iPhone 7 iOS…
⤷ Title: Speaking in Binary — Packet Crafting & Manipulation with Scapy
════════════════════════
𐀪 Author: KOJO
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:49:54 GMT
════════════════════════
⌗ Tags: #scapy #ethical_hacking #hacking #cybersecurity
════════════════════════
𐀪 Author: KOJO
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:49:54 GMT
════════════════════════
⌗ Tags: #scapy #ethical_hacking #hacking #cybersecurity
Medium
Speaking in Binary — Packet Crafting & Manipulation with Scapy
Beyond the Tool: Why I Learned to Build My Own Packets
⤷ Title: Digital Cartography — Mapping the Attack Surface with Nmap
════════════════════════
𐀪 Author: KOJO
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:47:40 GMT
════════════════════════
⌗ Tags: #nmap #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: KOJO
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:47:40 GMT
════════════════════════
⌗ Tags: #nmap #cybersecurity #ethical_hacking
Medium
Digital Cartography — Mapping the Attack Surface with Nmap
The First Rule of Cybersecurity: You Can’t Protect What You Don’t See
⤷ Title: WAFs Made Simple: Why They Can’t Block Everything (And How They Really Work)
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:49:25 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #waf
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:49:25 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #waf
Medium
WAFs Made Simple: Why They Can’t Block Everything (And How They Really Work)
“Why not just block everything?”
⤷ Title: Jangan Asal Klik Link! Kenapa “Phishing” Adalah Musuh Nomor 1 Akun Digital Kita.
════════════════════════
𐀪 Author: Arsal Naufal
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 04:52:27 GMT
════════════════════════
⌗ Tags: #phising #hacking #scammer #social_media #scam_warning
════════════════════════
𐀪 Author: Arsal Naufal
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 04:52:27 GMT
════════════════════════
⌗ Tags: #phising #hacking #scammer #social_media #scam_warning
Medium
Jangan Asal Klik Link! Kenapa “Phishing” Adalah Musuh Nomor 1 Akun Digital Kita.
Pernahkah kamu dapat DM atau email seperti ini? “Selamat! Akun Anda telah melanggar komunitas dan akan dihapus dalam 24 jam. Klik link di…
⤷ Title: Hello World
════════════════════════
𐀪 Author: Brad
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 04:31:02 GMT
════════════════════════
⌗ Tags: #penetration_testing #information_security #hello_world
════════════════════════
𐀪 Author: Brad
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 04:31:02 GMT
════════════════════════
⌗ Tags: #penetration_testing #information_security #hello_world
Medium
Hello World
Recently, I was watching an interview with John Hammond and Rob Fuller. I have been interviewing for jobs lately and something that Rob…
⤷ Title: Beyond the Network: Cracking the Application and the Human Firewall
════════════════════════
𐀪 Author: Keith Gabriel
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:59:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberguy #penetration_testing #ethical_hacking #cyber
════════════════════════
𐀪 Author: Keith Gabriel
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:59:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberguy #penetration_testing #ethical_hacking #cyber
Medium
Beyond the Network: Cracking the Application and the Human Firewall
Introduction: The Shift to Layer 7
⤷ Title: When Rate Limits Lie: A Quiet Path to Account Takeover
════════════════════════
𐀪 Author: PevinKumar A
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 07:50:29 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: PevinKumar A
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 07:50:29 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #ethical_hacking #cybersecurity
Medium
When Rate Limits Lie🤥: A Quiet Path to Account Takeover😳
How a tiny misconfiguration created a serious security risk
⤷ Title: Root Me — XSS Stored 1
════════════════════════
𐀪 Author: LiGhTZod
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 06:07:35 GMT
════════════════════════
⌗ Tags: #bug_bounty #web_hacking #cybersecurity
════════════════════════
𐀪 Author: LiGhTZod
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 06:07:35 GMT
════════════════════════
⌗ Tags: #bug_bounty #web_hacking #cybersecurity
Medium
Root Me — XSS Stored 1
Challenge Author : g0uZ
⤷ Title: Cybersecurity: Phishing — How to Protect Yourself from Online Scams —
════════════════════════
𐀪 Author: Md. Abrar Shahriar
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 07:06:39 GMT
════════════════════════
⌗ Tags: #pishing #hacking #cybercrime #cybersecurity #privacy
════════════════════════
𐀪 Author: Md. Abrar Shahriar
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 07:06:39 GMT
════════════════════════
⌗ Tags: #pishing #hacking #cybercrime #cybersecurity #privacy
Medium
Cybersecurity: Phishing — How to Protect Yourself from Online Scams -
Photo by Dan Nelson on Unsplash
⤷ Title: Root Me(XSS Stored 1)
════════════════════════
𐀪 Author: Zon-Salon
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 06:10:48 GMT
════════════════════════
⌗ Tags: #web_hacking #cybersecurity #xss_attack #hacking
════════════════════════
𐀪 Author: Zon-Salon
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 06:10:48 GMT
════════════════════════
⌗ Tags: #web_hacking #cybersecurity #xss_attack #hacking
Medium
Root Me(XSS Stored 1)
Author: g0uz
⤷ Title: Next.js: CVE-2025–29927 -TryHackMe WriteUp
════════════════════════
𐀪 Author: Bridget
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 07:28:38 GMT
════════════════════════
⌗ Tags: #cve_2025_29927 #nextjs #tryhackme #ethical_hacking #middleware
════════════════════════
𐀪 Author: Bridget
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 07:28:38 GMT
════════════════════════
⌗ Tags: #cve_2025_29927 #nextjs #tryhackme #ethical_hacking #middleware
Medium
Next.js: CVE-2025–29927 -TryHackMe WriteUp
Explore an authorisation bypass vulnerability in Next.js
⤷ Title: Recover a Gmail Account Without Recovery Email or Phone Number in 2026
════════════════════════
𐀪 Author: Muhammad Haider Tallal
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 07:43:08 GMT
════════════════════════
⌗ Tags: #ethical_hacking #gmail_account_recovery #tips_and_tricks #google_account #tech
════════════════════════
𐀪 Author: Muhammad Haider Tallal
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 07:43:08 GMT
════════════════════════
⌗ Tags: #ethical_hacking #gmail_account_recovery #tips_and_tricks #google_account #tech
Medium
Recover a Gmail Account Without Recovery Email or Phone Number in 2026
Recover a Gmail account without recovery email, phone number, or two-step verification access