⤷ Title: How Hackers Actually Think:
════════════════════════
𐀪 Author: Abdul Ahad
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:01:51 GMT
════════════════════════
⌗ Tags: #technology #hacking #ai #cybersecurity #infosec
════════════════════════
𐀪 Author: Abdul Ahad
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:01:51 GMT
════════════════════════
⌗ Tags: #technology #hacking #ai #cybersecurity #infosec
Medium
How Hackers Actually Think
A Simple Mental Model Most Defenders Ignore
⤷ Title: Web Application Firewall Detection — WAFW00F
════════════════════════
𐀪 Author: mohandika
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:56:27 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #waf #network_security #ethical_hacking
════════════════════════
𐀪 Author: mohandika
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:56:27 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #waf #network_security #ethical_hacking
Medium
Web Application Firewall Detection — WAFW00F
A Web Hacking Tool
⤷ Title: Ignite — THM Writeups
════════════════════════
𐀪 Author: Alts
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:07:15 GMT
════════════════════════
⌗ Tags: #ctf_writeup #tryhackme #tryhackme_walkthrough #tryhackme_writeup #ctf
════════════════════════
𐀪 Author: Alts
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 19:07:15 GMT
════════════════════════
⌗ Tags: #ctf_writeup #tryhackme #tryhackme_walkthrough #tryhackme_writeup #ctf
Medium
Ignite — THM Writeups
https://tryhackme.com/room/ignite
⤷ Title: Takeover CTF
════════════════════════
𐀪 Author: Rue
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:31:08 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #subdomains_enumeration #reconnaissance #ctf
════════════════════════
𐀪 Author: Rue
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 18:31:08 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #subdomains_enumeration #reconnaissance #ctf
Medium
Takeover CTF
This CTF focuses on subdomain enumeration — a critical reconnaissance technique used to discover hidden services and potential attack…
⤷ Title: Lab: Reflected XSS into HTML context with nothing encoded
════════════════════════
𐀪 Author: Mylescorey
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 20:28:02 GMT
════════════════════════
⌗ Tags: #burpsuite #bug_bounty #xss_attack
════════════════════════
𐀪 Author: Mylescorey
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 20:28:02 GMT
════════════════════════
⌗ Tags: #burpsuite #bug_bounty #xss_attack
Medium
Lab: Reflected XSS into HTML context with nothing encoded
After opening the lab, I put the basic alert payload into the search bar and after putting search we got the alert function that lets us…
⤷ Title: Inter Process Communication with RPC
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:52:51 GMT
════════════════════════
⌗ Tags: #malware #hacking #cybersecurity #tryhackme #pentesting
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:52:51 GMT
════════════════════════
⌗ Tags: #malware #hacking #cybersecurity #tryhackme #pentesting
Medium
Inter Process Communication with RPC
Welcome to this new Medium post! In this one we’re gonna mess around with something pretty cool: RPC (Remote Procedure Call), basically the…
⤷ Title: For 11 Minutes, the Internet Trusted a Lie — and No Firewall Noticed
════════════════════════
𐀪 Author: Liam
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:17:19 GMT
════════════════════════
⌗ Tags: #technology #ai_security #cybersecurity #artificial_intelligence #hacking
════════════════════════
𐀪 Author: Liam
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:17:19 GMT
════════════════════════
⌗ Tags: #technology #ai_security #cybersecurity #artificial_intelligence #hacking
Medium
For 11 Minutes, the Internet Trusted a Lie — and No Firewall Noticed
A story about why “secure” networks still fail, and why most defenses are pointed in the wrong direction.
⤷ Title: The Hacking Tool Chronicles: Dirb
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:08:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_hacking #hacking #osint #ethical_hacking
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:08:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_hacking #hacking #osint #ethical_hacking
Medium
The Hacking Tool Chronicles: Dirb
A series of articles focused on freely available hacking tools, in this edition we look at the web recon tool Dirb.
⤷ Title: ওয়েব অ্যাপ্লিকেশন পেনটেস্টিংয়ে রিকন টুলসের ব্যবহার: একটি পূর্ণাঙ্গ গাইড
════════════════════════
𐀪 Author: SecurityMindPro
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:36:41 GMT
════════════════════════
⌗ Tags: #web_testing #penetration_testing #webapplicationpentest
════════════════════════
𐀪 Author: SecurityMindPro
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:36:41 GMT
════════════════════════
⌗ Tags: #web_testing #penetration_testing #webapplicationpentest
Medium
ওয়েব অ্যাপ্লিকেশন পেনটেস্টিংয়ে রিকন টুলসের ব্যবহার: একটি পূর্ণাঙ্গ গাইড
সাইবার সিকিউরিটি এবং পেনিট্রেশন টেস্টিংয়ের জগতে একটি বহুল প্রচলিত কথা আছে — “আপনি যা দেখতে পাচ্ছেন না, তা আপনি হ্যাক করতে পারবেন না।” এই…
⤷ Title: “Relevant” ctf | TryHackMe| Complete detailed walkthrough| (Token Impersonation, PrintSpoofer.exe,
════════════════════════
𐀪 Author: Nishchay Manhas
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:27:01 GMT
════════════════════════
⌗ Tags: #penetration_testing #ctf_writeup #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Nishchay Manhas
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:27:01 GMT
════════════════════════
⌗ Tags: #penetration_testing #ctf_writeup #tryhackme #cybersecurity
Medium
“Relevant” ctf | TryHackMe| Complete detailed walkthrough| (Token Impersonation, PrintSpoofer.exe,
A step-by-step TryHackMe walkthrough covering enumeration, token impersonation, and Windows privilege escalation using PrintSpoofer.exe
⤷ Title: Breaking and Finding Vulnerabilities: My Cybersecurity Capstone Project
════════════════════════
𐀪 Author: Maria Sagwa
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 20:20:47 GMT
════════════════════════
⌗ Tags: #parocyber #cybersecurity #smbclient #ethical_hacking #sql_injection
════════════════════════
𐀪 Author: Maria Sagwa
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 20:20:47 GMT
════════════════════════
⌗ Tags: #parocyber #cybersecurity #smbclient #ethical_hacking #sql_injection
Medium
🔐 Breaking and Finding Vulnerabilities: My Cybersecurity Capstone Project
Cybersecurity is best learned by doing, not just reading. This capstone project challenged me to step into the mindset of an attacker while…
⤷ Title: [Rabbit Store] — JWT Manipulation, SSRF, SSTI Leading to RCE and Root Access via a Vulnerable…
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:51:31 GMT
════════════════════════
⌗ Tags: #rce #ssrf #privilege_escalation #ssti #jwt_token
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 21:51:31 GMT
════════════════════════
⌗ Tags: #rce #ssrf #privilege_escalation #ssti #jwt_token
Medium
[Rabbit Store] — JWT Manipulation, SSRF, SSTI Leading to RCE and Root Access via a Vulnerable Erlang Distribution on RabbitMQ
From SSRF and SSTI to Erlang cookie theft and root compromise.
⤷ Title: Blind SQL Injection: A Hands-On Lab Walkthrough
════════════════════════
𐀪 Author: SilentExploit
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 23:32:59 GMT
════════════════════════
⌗ Tags: #hacker #hacking_tutorial #hacking
════════════════════════
𐀪 Author: SilentExploit
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 23:32:59 GMT
════════════════════════
⌗ Tags: #hacker #hacking_tutorial #hacking
Medium
Blind SQL Injection: A Hands-On Lab Walkthrough
In a standard SQL injection, the database often spits out helpful error messages or direct data. But what happens when the application is…
⤷ Title: Welcome to my space :)
════════════════════════
𐀪 Author: Hobin Rood
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 22:18:00 GMT
════════════════════════
⌗ Tags: #osint #freelancing #hacking #osint_investigation #education
════════════════════════
𐀪 Author: Hobin Rood
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 22:18:00 GMT
════════════════════════
⌗ Tags: #osint #freelancing #hacking #osint_investigation #education
Medium
Welcome to my space :)
Welcome to the Network (the name I have still yet to decide).
⤷ Title: Beyond the Noise: Why I Built VedicRecon (and Why Reconnaissance Needs to Change)
════════════════════════
𐀪 Author: Vedic_error
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 23:11:49 GMT
════════════════════════
⌗ Tags: #vulnerability #penetration_testing #cybersecurity #ethical_hacking #generative_ai_tools
════════════════════════
𐀪 Author: Vedic_error
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 23:11:49 GMT
════════════════════════
⌗ Tags: #vulnerability #penetration_testing #cybersecurity #ethical_hacking #generative_ai_tools
Medium
Beyond the Noise: Why I Built VedicRecon (and Why Reconnaissance Needs to Change)
⚠️All testing described below was performed in a fully isolated lab environment for educational and defensive research purposes only. No…
⤷ Title: Phishing Simulator
════════════════════════
𐀪 Author: Aaronashley
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 22:16:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #python_web_developer #html5_development #phishing_awareness
════════════════════════
𐀪 Author: Aaronashley
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 22:16:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #python_web_developer #html5_development #phishing_awareness
Medium
Phishing Simulator
This is for educational purposes only! Do not use unless authorized.
⤷ Title: Fake Malwarebytes Campaign Exploits DLL Sideloading to Drop Infostealers
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 00:46:26 +0000
════════════════════════
⌗ Tags: #Malware #BrowserStealer #CoreMessaging.dll #Cyber Security #DLL Sideloading #Infostealer #Joseliyo Sánchez #Malware Analysis #Malwarebytes #social engineering
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 00:46:26 +0000
════════════════════════
⌗ Tags: #Malware #BrowserStealer #CoreMessaging.dll #Cyber Security #DLL Sideloading #Infostealer #Joseliyo Sánchez #Malware Analysis #Malwarebytes #social engineering
Daily CyberSecurity
Fake Malwarebytes Campaign Exploits DLL Sideloading to Drop Infostealers
New malware campaign impersonates Malwarebytes installers. Hackers use DLL sideloading to deploy infostealers targeting crypto & MFA. Verify downloads now.
⤷ Title: CVE-2026-0695: High-Severity XSS Flaw Patched in ConnectWise PSA 2026.1
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 00:43:21 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #ConnectWise PSA #CVE_2026_0695 #CVE_2026_0696 #Cyber Security #MSP Security #Patch Alert #Session Hijacking #Stored XSS #Web Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 00:43:21 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #ConnectWise PSA #CVE_2026_0695 #CVE_2026_0696 #Cyber Security #MSP Security #Patch Alert #Session Hijacking #Stored XSS #Web Security
Daily CyberSecurity
CVE-2026-0695: High-Severity XSS Flaw Patched in ConnectWise PSA 2026.1
ConnectWise patches critical Stored XSS (CVE-2026-0695) in PSA Time Entry notes. Vulnerability allows session hijacking. Update to version 2026.1 immediately.
⤷ Title: DragonForce: The Rise of a New “Ransomware Cartel” Built on LockBit and Conti DNA
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 00:42:44 +0000
════════════════════════
⌗ Tags: #Malware #BlackLock #Conti #Cyber Cartel #decryptor #DragonForce #infosec #LockBit 3.0 #Malware Analysis #RansomBay #ransomware #S2W
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 00:42:44 +0000
════════════════════════
⌗ Tags: #Malware #BlackLock #Conti #Cyber Cartel #decryptor #DragonForce #infosec #LockBit 3.0 #Malware Analysis #RansomBay #ransomware #S2W
Daily CyberSecurity
DragonForce: The Rise of a New "Ransomware Cartel" Built on LockBit and Conti DNA
S2W reveals DragonForce is a "cartel" hacking rivals like BlackLock. Built on LockBit 3.0 code, they offer "Ransombay" services. A decryptor was found.
⤷ Title: Fake Productivity Tools: 5 Malicious Chrome Extensions Hijack Enterprise Sessions
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 00:37:04 +0000
════════════════════════
⌗ Tags: #Malware #Chrome extensions #Cookie Injection #DataByCloud #Enterprise Security #infosec #malware #NetSuite #Session Hijacking #Socket Threat Research #Workday
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 00:37:04 +0000
════════════════════════
⌗ Tags: #Malware #Chrome extensions #Cookie Injection #DataByCloud #Enterprise Security #infosec #malware #NetSuite #Session Hijacking #Socket Threat Research #Workday
Daily CyberSecurity
Fake Productivity Tools: 5 Malicious Chrome Extensions Hijack Enterprise Sessions
Socket discovers 5 malicious Chrome extensions posing as productivity tools. They steal session tokens & block security teams. 2,300+ enterprise users at risk.
⤷ Title: Sitting Ducks and Scammy Notifications: Inside a Global Malvertising Operation
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 00:32:03 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Ad Fraud #Android security #Cyber Crime #Cyber Hygiene #DNS hijacking #DNS Vulnerability #Infoblox #Malvertising #Push Notification Scam #Sitting Ducks
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 00:32:03 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Ad Fraud #Android security #Cyber Crime #Cyber Hygiene #DNS hijacking #DNS Vulnerability #Infoblox #Malvertising #Push Notification Scam #Sitting Ducks
Daily CyberSecurity
Sitting Ducks and Scammy Notifications: Inside a Global Malvertising Operation
Infoblox researchers hijacked a scam network using the "Sitting Ducks" DNS flaw. 57M logs reveal how abandoned domains fuel global push notification spam.