⤷ Title: When length - 32 Goes Negative: A Small Check, Real Memory Bug in wolfSSL
════════════════════════
𐀪 Author: MostReal
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:39:25 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #cybersecurity #hacking #coding #bugbounty_tips
════════════════════════
𐀪 Author: MostReal
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:39:25 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #cybersecurity #hacking #coding #bugbounty_tips
Medium
When length - 32 Goes Negative: A Small Check, Real Memory Bug in wolfSSL
While looking at the TLS 1.3 session ticket handling in wolfSSL, I found a small boundary issue inside SetTicket() in src/internal.c. At first glance, it looks harmless. Just some pointer math and a length check. But the details matter. The code builds a…
⤷ Title: FahmSec CTF 2026 : Func !
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:34:20 GMT
════════════════════════
⌗ Tags: #hacking #malware #cybersecurity #reverse_engineering #ctf
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:34:20 GMT
════════════════════════
⌗ Tags: #hacking #malware #cybersecurity #reverse_engineering #ctf
Medium
FahmSec CTF 2026 : Func Reversing !
وما توفيقي إلا بالله :)
⤷ Title: Valenfind — A TryHackMe Writeup
════════════════════════
𐀪 Author: 0x77
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:20:56 GMT
════════════════════════
⌗ Tags: #ctf_writeup #infosec #cybersecurity #hacking #ctf
════════════════════════
𐀪 Author: 0x77
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:20:56 GMT
════════════════════════
⌗ Tags: #ctf_writeup #infosec #cybersecurity #hacking #ctf
Medium
Valenfind — A TryHackMe Writeup
Introduction
⤷ Title: Welcome Writeup (Hack Smarter Labs)
════════════════════════
𐀪 Author: Keith Monroe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:06:03 GMT
════════════════════════
⌗ Tags: #ethical_hacking #hacking #cybersecurity
════════════════════════
𐀪 Author: Keith Monroe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:06:03 GMT
════════════════════════
⌗ Tags: #ethical_hacking #hacking #cybersecurity
Medium
Welcome Writeup (Hack Smarter Labs)
It’s been too long since my last blog post and this time around I’m determined to be a bit more consistent. To kick things off, let’s start…
⤷ Title: Malware Analysis: .NET Dropper and Encrypted UPX-Packed Infostealer (Salat Stealer)
════════════════════════
𐀪 Author: Hack(IT)Sec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:43:14 GMT
════════════════════════
⌗ Tags: #infosec #infostealer #malware #cybersecurity
════════════════════════
𐀪 Author: Hack(IT)Sec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:43:14 GMT
════════════════════════
⌗ Tags: #infosec #infostealer #malware #cybersecurity
Medium
Malware Analysis: .NET Dropper and Encrypted UPX-Packed Infostealer (Salat Stealer)
Overview
⤷ Title: Understanding the Difference Between the Dark Web and the Deep Web
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:39:30 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #osint #darkweb
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:39:30 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #osint #darkweb
Medium
Understanding the Difference Between the Dark Web and the Deep Web
Many people use the terms dark web and deep web interchangeably. However, they are not the same thing.
⤷ Title: Intermediate Web Application Penetration Testing — Episode 002 | Session Management Room Tryhackme
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:32:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #offsec #ethical_hacking #infosec #tryhackme
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:32:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #offsec #ethical_hacking #infosec #tryhackme
Medium
Intermediate Web Application Penetration Testing — Episode 002
Session Management Room Tryhackme
⤷ Title: The Truth Machine: How Blockchain Can Fight the AI Deepfake Crisis
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:51:31 GMT
════════════════════════
⌗ Tags: #ai #information_security #cyber_security_awareness #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:51:31 GMT
════════════════════════
⌗ Tags: #ai #information_security #cyber_security_awareness #cybersecurity #ethical_hacking
Medium
The Truth Machine: How Blockchain Can Fight the AI Deepfake Crisis
Remember the photo of Pope Francis wearing that massive white Balenciaga puffer jacket?
⤷ Title: API Security Fundamentals: Architecture, Protocols, and Real-World Risks
════════════════════════
𐀪 Author: Reduan Islam Badhon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:17:40 GMT
════════════════════════
⌗ Tags: #website #api #api_security #owasp_api_security_top_10 #owasp_top_10
════════════════════════
𐀪 Author: Reduan Islam Badhon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:17:40 GMT
════════════════════════
⌗ Tags: #website #api #api_security #owasp_api_security_top_10 #owasp_top_10
Medium
API Security Fundamentals: Architecture, Protocols, and Real-World Risks
If we want to properly understand API security, you need to think in layers:
⤷ Title: Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Multiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacks
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:27:24 +0000
════════════════════════
⌗ Tags: #Security #0day #Apryse #Cybersecurity #Foxit #Novee Security #Vulnerability #XSS
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:27:24 +0000
════════════════════════
⌗ Tags: #Security #0day #Apryse #Cybersecurity #Foxit #Novee Security #Vulnerability #XSS
Hackread
Multiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacks
16 zero-day security flaws found in Foxit and Apryse PDF platforms could lead to account takeover and RCE. Learn how AI identified these risks.
⤷ Title: Red Team Weapon: RapidDNS CLI + Nuclei/Httpx for Automated Vulnerability Mining Pipeline
════════════════════════
𐀪 Author: rapiddns
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:57:11 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: rapiddns
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:57:11 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity
Medium
Red Team Weapon: RapidDNS CLI + Nuclei/Httpx for Automated Vulnerability Mining Pipeline
Every Red Teamer and Bug Bounty Hunter knows that Reconnaissance (Recon) is the most critical step. In this phase, not only do your tools…
⤷ Title: Beyond Recon: Mastering Authentication Logic in Bug Bounty
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:38:25 GMT
════════════════════════
⌗ Tags: #sso #cybersecurity #security #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:38:25 GMT
════════════════════════
⌗ Tags: #sso #cybersecurity #security #penetration_testing #bug_bounty
Medium
Beyond Recon: Mastering Authentication Logic in Bug Bounty
Why Authentication Logic Is the Next Level in Bug Bounty Hunting
⤷ Title: Cheesy Does it writeup (Business Logic flaw)(Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:05:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf_writeup #bugforge #bug_bounty
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:05:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf_writeup #bugforge #bug_bounty
Medium
Cheesy Does it writeup (Business Logic flaw)(Bugforge)
We’re back at Cheesy Does It! The only pizza restaurant that somehow stays in business despite losing gargantuan amounts of cash!
⤷ Title: One Invite Endpoint, One Race Condition — 4 Bugs Later
════════════════════════
𐀪 Author: Raslanco
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:03:06 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #infosec_write_ups #bug_bounty_writeup #bugs
════════════════════════
𐀪 Author: Raslanco
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:03:06 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #infosec_write_ups #bug_bounty_writeup #bugs
Medium
One Invite Endpoint, One Race Condition — 4 Bugs Later
Sometimes the most interesting vulnerabilities don’t require complex payloads or advanced exploitation chains. Sometimes, all it takes is…
⤷ Title: Unsafe Deserialization in Ruby Background Workers Leading to Deterministic Remote Code Execution
════════════════════════
𐀪 Author: NullSecurityX
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:57:42 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #json #bug_bounty #ruby
════════════════════════
𐀪 Author: NullSecurityX
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:57:42 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #json #bug_bounty #ruby
Medium
Unsafe Deserialization in Ruby Background Workers Leading to Deterministic Remote Code Execution
Object Injection via Oj.load Allows Command Execution in RubitMQ Job Workers
⤷ Title: Lab: Blind SQL injection with conditional responses | PortSwigger
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:20:24 GMT
════════════════════════
⌗ Tags: #hacking #sql_injection #ethical_hacking #portswigger #web_hacking
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:20:24 GMT
════════════════════════
⌗ Tags: #hacking #sql_injection #ethical_hacking #portswigger #web_hacking
Medium
Lab: Blind SQL injection with conditional responses | PortSwigger
Denoscription
⤷ Title: Hack 108: Reviving the Hacker Spirit in the Corporate World
════════════════════════
𐀪 Author: ᴅᴀɴ ᴋᴏʀᴏᴠᴛᴄʜ
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:52:03 GMT
════════════════════════
⌗ Tags: #advisor #hacking #executive_training #company_culture
════════════════════════
𐀪 Author: ᴅᴀɴ ᴋᴏʀᴏᴠᴛᴄʜ
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:52:03 GMT
════════════════════════
⌗ Tags: #advisor #hacking #executive_training #company_culture
Medium
Hack 108: Reviving the Hacker Spirit in the Corporate World
When I first thought of the number 108, I didn’t just see a number — I saw a symbol of wholeness, cycles, and alignment, a concept deeply…
⤷ Title: FahmSec CTF 2026 : Func Reversing !
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:34:20 GMT
════════════════════════
⌗ Tags: #hacking #malware #cybersecurity #reverse_engineering #ctf
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:34:20 GMT
════════════════════════
⌗ Tags: #hacking #malware #cybersecurity #reverse_engineering #ctf
Medium
FahmSec CTF 2026 : Func Reversing !
وما توفيقي إلا بالله :)
⤷ Title: FahmSec CTF 2026 : ReflectiveBait Reversing
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:38:43 GMT
════════════════════════
⌗ Tags: #reverse_engineering #malware_analysis #hacking #ctf #cybersecurity
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:38:43 GMT
════════════════════════
⌗ Tags: #reverse_engineering #malware_analysis #hacking #ctf #cybersecurity
Medium
FahmSec CTF 2026 : ReflectiveBait
“What you see is not what runs. Find the truth.”
⤷ Title: Part 5: The Grand Finale — Building a Master Shield for the Digital Age
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:29 GMT
════════════════════════
⌗ Tags: #cybersecurity #azerbaijantech #infosec #holberton_school
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:29 GMT
════════════════════════
⌗ Tags: #cybersecurity #azerbaijantech #infosec #holberton_school
Medium
Part 5: The Grand Finale — Building a Master Shield for the Digital Age
Hello everyone! It has been an incredible journey sharing my cybersecurity studies at Holberton School Azerbaijan with you.