⤷ Title: JWT Header Parameters Injections | jwk | jku | Kid
════════════════════════
𐀪 Author: Amrsmooke
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 12:30:40 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #jwt #penetration_testing #hacking
════════════════════════
𐀪 Author: Amrsmooke
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 12:30:40 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #jwt #penetration_testing #hacking
Medium
JWT Header Parameters Injections | jwk | jku | Kid
1. JWTs and Their Headers
⤷ Title: SQL Injection: Root Causes Developers Miss and Pentesters Exploit
════════════════════════
𐀪 Author: Gokul
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 15:41:46 GMT
════════════════════════
⌗ Tags: #sql_injection #web_security #sql #application_security #cybersecurity
════════════════════════
𐀪 Author: Gokul
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 15:41:46 GMT
════════════════════════
⌗ Tags: #sql_injection #web_security #sql #application_security #cybersecurity
Medium
SQL Injection: Root Causes Developers Miss and Pentesters Exploit
Table of Contents
⤷ Title: TOP SECRET Israel China and US Kill Chip Kill Switch Technology | The Trojan…
════════════════════════
𐀪 Author: ElonMuskTheAntichrist
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 15:25:22 GMT
════════════════════════
⌗ Tags: #hacking #kill_switch #cyber_warfare #osint #military
════════════════════════
𐀪 Author: ElonMuskTheAntichrist
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 15:25:22 GMT
════════════════════════
⌗ Tags: #hacking #kill_switch #cyber_warfare #osint #military
Medium
🔥TOP SECRET 🔥 Israel 🇮🇱 China 🇨🇳and US 🇱🇷 Kill Chip Kill Switch Technology | The Trojan…
🔥TOP SECRET 🔥 Israel 🇮🇱 China 🇨🇳and US 🇱🇷 Kill Chip Kill Switch Technology | The Trojan Horse in INDIA’S (and Anti Zionist Nations) MILITARY Arsenal: Backdoor Surveillance …
⤷ Title: Wachtwoord: 12345 (column)
════════════════════════
𐀪 Author: Johan van de Beek (DjoeGio's Marginalia)
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:57:59 GMT
════════════════════════
⌗ Tags: #hacking #jeff_bezos
════════════════════════
𐀪 Author: Johan van de Beek (DjoeGio's Marginalia)
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:57:59 GMT
════════════════════════
⌗ Tags: #hacking #jeff_bezos
Medium
Wachtwoord: 12345 (column)
Door Johan van de Beek
⤷ Title: Listening to Light- The Complete Engineering Guide to Laser Acoustic Surveillance Technology
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:51:42 GMT
════════════════════════
⌗ Tags: #surveillance #software_engineering #guides_and_tutorials #hacking #laser
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:51:42 GMT
════════════════════════
⌗ Tags: #surveillance #software_engineering #guides_and_tutorials #hacking #laser
Medium
Listening to Light- The Complete Engineering Guide to Laser Acoustic Surveillance Technology
Let’s clear something up immediately.
⤷ Title: Detecting Suspicious Activities Using Wireshark: A Comprehensive Guide
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:32:26 GMT
════════════════════════
⌗ Tags: #hacking #suspicious #suspicious_activity #wireshark #man_in_the_middle_attack
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:32:26 GMT
════════════════════════
⌗ Tags: #hacking #suspicious #suspicious_activity #wireshark #man_in_the_middle_attack
Medium
Detecting Suspicious Activities Using Wireshark: A Comprehensive Guide
ARP spoofing & Man In The Middle Attacks Execution & Detection
⤷ Title: Firewalls & Segmentation: Building Digital Walls That Actually Work
════════════════════════
𐀪 Author: Satyam Singh
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:56:40 GMT
════════════════════════
⌗ Tags: #infosec #offensive_security #cybersecurity #firewall #network_security
════════════════════════
𐀪 Author: Satyam Singh
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:56:40 GMT
════════════════════════
⌗ Tags: #infosec #offensive_security #cybersecurity #firewall #network_security
Medium
Firewalls & Segmentation: Building Digital Walls That Actually Work
Part 9 of the Cybersecurity Simplified Series
⤷ Title: Cyborg — THM Writeups
════════════════════════
𐀪 Author: Alts
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 13:59:38 GMT
════════════════════════
⌗ Tags: #infosec #tryhackme #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: Alts
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 13:59:38 GMT
════════════════════════
⌗ Tags: #infosec #tryhackme #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
Medium
Cyborg — THM Writeups
Easy: A box involving encrypted archives, source code analysis and more.
⤷ Title: Relevant CTF Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:30:09 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf_writeup #tryhackme_walkthrough #ctf_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:30:09 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf_writeup #tryhackme_walkthrough #ctf_walkthrough #tryhackme_writeup
Medium
Relevant CTF Notes | TryHackMe
SMB share to web shell, then SYSTEM with PrintSpoofer.
⤷ Title: SOC Workflow Explained: How Cyber Attacks Are Detected and Stopped
════════════════════════
𐀪 Author: Abhinsubej
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:24:14 GMT
════════════════════════
⌗ Tags: #siem #cybersecurity_news #cybersecurity #ethical_hacking #soc_analyst
════════════════════════
𐀪 Author: Abhinsubej
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 14:24:14 GMT
════════════════════════
⌗ Tags: #siem #cybersecurity_news #cybersecurity #ethical_hacking #soc_analyst
Medium
SOC Workflow Explained: How Cyber Attacks Are Detected and Stopped
In today’s digital environment, cyber threats are continuous and unavoidable. Organizations cannot rely only on firewalls or antivirus…
⤷ Title: Shadow AI and API Vulnerabilities: The Invisible Wound of Modern Enterprises
════════════════════════
𐀪 Author: Emir Yusuf Nural
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 15:02:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #software_development #api_security #cloud_security #shadow_ai
════════════════════════
𐀪 Author: Emir Yusuf Nural
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 15:02:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #software_development #api_security #cloud_security #shadow_ai
Medium
Shadow AI and API Vulnerabilities: The Invisible Wound of Modern Enterprises
In 2026, the greatest threat to your company’s data isn’t just a hooded hacker in a dark room; it’s often an enthusiastic employee trying…
⤷ Title: ID Parametresi Üzerinden Yetki Aşımı /IDOR
════════════════════════
𐀪 Author: Zekikayaalp
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 15:49:22 GMT
════════════════════════
⌗ Tags: #cybersecurity #bugbounty_writeup #idor #pentesting
════════════════════════
𐀪 Author: Zekikayaalp
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 15:49:22 GMT
════════════════════════
⌗ Tags: #cybersecurity #bugbounty_writeup #idor #pentesting
Medium
ID Parametresi Üzerinden Yetki Aşımı /IDOR
VDP/BBP’de avlanırken daha keşif aşamasında denediğimiz o en umut veren nokta,IDOR. En başından anlaşalım. IDOR , ID değişmesi değildir…
⤷ Title: Starting Your Bug Bounty Journey: Tips for Beginners
════════════════════════
𐀪 Author: Nayan Ghimire
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:33:54 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: Nayan Ghimire
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:33:54 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips
Medium
Starting Your Bug Bounty Journey: Tips for Beginners
Bug bounty programs allow security hobbyists to legally discover vulnerabilities in apps and be compensated. They are an excellent means…
⤷ Title: HackerOne HTML Injection Fix Bypass
════════════════════════
𐀪 Author: ab.infosec
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:22:17 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #hackerone #html_injection
════════════════════════
𐀪 Author: ab.infosec
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:22:17 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #hackerone #html_injection
Medium
HackerOne HTML Injection Fix Bypass👨💻
“Most bug bounty hunters stop after a fix is deployed. That’s a mistake.”
⤷ Title: Design-Level Stored XSS in Matomo i18n Rendering
════════════════════════
𐀪 Author: D7
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:14:35 GMT
════════════════════════
⌗ Tags: #i18n #web_design #bug_bounty #code #xss_attack
════════════════════════
𐀪 Author: D7
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:14:35 GMT
════════════════════════
⌗ Tags: #i18n #web_design #bug_bounty #code #xss_attack
Medium
Design-Level Stored XSS in Matomo i18n Rendering
✍️Design-level Stored Xss In Matomo I18n Rendering — Public Write-up
⤷ Title: Ghost in the Machine: 6 Shocking Ways Your Operating System Tracks Your Every Move
════════════════════════
𐀪 Author: Omega
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:53:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #technology #digital_forensics #infosec
════════════════════════
𐀪 Author: Omega
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:53:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #technology #digital_forensics #infosec
Medium
Ghost in the Machine: 6 Shocking Ways Your Operating System Tracks Your Every Move
1. Introduction: The Myth of the Clean Slate
⤷ Title: Walkthrough: Advent of Cyber Prep Track — TryHackMe
════════════════════════
𐀪 Author: Muhammad Usman
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:25:13 GMT
════════════════════════
⌗ Tags: #walkthrough #adventofcyberpreptrack #tryhackme #advent_of_cyber_2025
════════════════════════
𐀪 Author: Muhammad Usman
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:25:13 GMT
════════════════════════
⌗ Tags: #walkthrough #adventofcyberpreptrack #tryhackme #advent_of_cyber_2025
Medium
Walkthrough: Advent of Cyber Prep Track — TryHackMe
Introduction (Task 1 to Task 3)
⤷ Title: How Attackers Think About Trust (And Defenders Don’t)
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:00:48 GMT
════════════════════════
⌗ Tags: #cybersecurity #zero_trust #ethical_hacking #offensive_security #security_engineering
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 17:00:48 GMT
════════════════════════
⌗ Tags: #cybersecurity #zero_trust #ethical_hacking #offensive_security #security_engineering
Medium
How Attackers Think About Trust (And Defenders Don’t)
Every secure system is built on trust.
⤷ Title: Entering The Dark Web
════════════════════════
𐀪 Author: Nxgprince
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:32:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #darkweb #dark_web_link
════════════════════════
𐀪 Author: Nxgprince
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 16:32:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #darkweb #dark_web_link
Medium
Entering The Dark Web
Navigating the Shadows: A Comprehensive Guide to Entering the Dark Web
⤷ Title: Simple Logic Breaks Big Systems: The Contract That Ended Before It Started
════════════════════════
𐀪 Author: default_0x
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:47:05 GMT
════════════════════════
⌗ Tags: #business_logic #bug_bounty_tips #business_logic_flaw #bug_bounty
════════════════════════
𐀪 Author: default_0x
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:47:05 GMT
════════════════════════
⌗ Tags: #business_logic #bug_bounty_tips #business_logic_flaw #bug_bounty
Medium
Simple Logic Breaks Big Systems: The Contract That Ended Before It Started
We all like finding complicated bugs — the kind that takes days to figure out and makes you feel like a genius hacker. But sometimes, the…
⤷ Title: The DNS Query I Almost Ignored
════════════════════════
𐀪 Author: ATAF
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:36:58 GMT
════════════════════════
⌗ Tags: #cyber_defense #cybersecurity #hacking #blue_team
════════════════════════
𐀪 Author: ATAF
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:36:58 GMT
════════════════════════
⌗ Tags: #cyber_defense #cybersecurity #hacking #blue_team
Medium
The DNS Query I Almost Ignored
Every SOC analyst knows this moment if you've been in the industry for a while.