⤷ Title: Cheesy Does it writeup (Business Logic flaw)(Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:05:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf_writeup #bugforge #bug_bounty
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:05:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf_writeup #bugforge #bug_bounty
Medium
Cheesy Does it writeup (Business Logic flaw)(Bugforge)
We’re back at Cheesy Does It! The only pizza restaurant that somehow stays in business despite losing gargantuan amounts of cash!
⤷ Title: One Invite Endpoint, One Race Condition — 4 Bugs Later
════════════════════════
𐀪 Author: Raslanco
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:03:06 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #infosec_write_ups #bug_bounty_writeup #bugs
════════════════════════
𐀪 Author: Raslanco
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:03:06 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #infosec_write_ups #bug_bounty_writeup #bugs
Medium
One Invite Endpoint, One Race Condition — 4 Bugs Later
Sometimes the most interesting vulnerabilities don’t require complex payloads or advanced exploitation chains. Sometimes, all it takes is…
⤷ Title: Unsafe Deserialization in Ruby Background Workers Leading to Deterministic Remote Code Execution
════════════════════════
𐀪 Author: NullSecurityX
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:57:42 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #json #bug_bounty #ruby
════════════════════════
𐀪 Author: NullSecurityX
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:57:42 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #json #bug_bounty #ruby
Medium
Unsafe Deserialization in Ruby Background Workers Leading to Deterministic Remote Code Execution
Object Injection via Oj.load Allows Command Execution in RubitMQ Job Workers
⤷ Title: Lab: Blind SQL injection with conditional responses | PortSwigger
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:20:24 GMT
════════════════════════
⌗ Tags: #hacking #sql_injection #ethical_hacking #portswigger #web_hacking
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:20:24 GMT
════════════════════════
⌗ Tags: #hacking #sql_injection #ethical_hacking #portswigger #web_hacking
Medium
Lab: Blind SQL injection with conditional responses | PortSwigger
Denoscription
⤷ Title: Hack 108: Reviving the Hacker Spirit in the Corporate World
════════════════════════
𐀪 Author: ᴅᴀɴ ᴋᴏʀᴏᴠᴛᴄʜ
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:52:03 GMT
════════════════════════
⌗ Tags: #advisor #hacking #executive_training #company_culture
════════════════════════
𐀪 Author: ᴅᴀɴ ᴋᴏʀᴏᴠᴛᴄʜ
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:52:03 GMT
════════════════════════
⌗ Tags: #advisor #hacking #executive_training #company_culture
Medium
Hack 108: Reviving the Hacker Spirit in the Corporate World
When I first thought of the number 108, I didn’t just see a number — I saw a symbol of wholeness, cycles, and alignment, a concept deeply…
⤷ Title: FahmSec CTF 2026 : Func Reversing !
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:34:20 GMT
════════════════════════
⌗ Tags: #hacking #malware #cybersecurity #reverse_engineering #ctf
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:34:20 GMT
════════════════════════
⌗ Tags: #hacking #malware #cybersecurity #reverse_engineering #ctf
Medium
FahmSec CTF 2026 : Func Reversing !
وما توفيقي إلا بالله :)
⤷ Title: FahmSec CTF 2026 : ReflectiveBait Reversing
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:38:43 GMT
════════════════════════
⌗ Tags: #reverse_engineering #malware_analysis #hacking #ctf #cybersecurity
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:38:43 GMT
════════════════════════
⌗ Tags: #reverse_engineering #malware_analysis #hacking #ctf #cybersecurity
Medium
FahmSec CTF 2026 : ReflectiveBait
“What you see is not what runs. Find the truth.”
⤷ Title: Part 5: The Grand Finale — Building a Master Shield for the Digital Age
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:29 GMT
════════════════════════
⌗ Tags: #cybersecurity #azerbaijantech #infosec #holberton_school
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:29 GMT
════════════════════════
⌗ Tags: #cybersecurity #azerbaijantech #infosec #holberton_school
Medium
Part 5: The Grand Finale — Building a Master Shield for the Digital Age
Hello everyone! It has been an incredible journey sharing my cybersecurity studies at Holberton School Azerbaijan with you.
⤷ Title: Part4: The “Hidden Key” Debate: Is Security Through Obscurity Actually Secure?
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:14 GMT
════════════════════════
⌗ Tags: #infosec #holberton_school #azerbaijantech #cybersecurity
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:14 GMT
════════════════════════
⌗ Tags: #infosec #holberton_school #azerbaijantech #cybersecurity
Medium
Part4: The “Hidden Key” Debate: Is Security Through Obscurity Actually Secure?
Hello, Holberton Azerbaijan community and fellow tech enthusiasts!
⤷ Title: CVE-2025–15556 分析:Notepad++ 的供應鏈攻擊與防禦策略
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:43:03 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #blue_team #infosec #cve
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:43:03 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #blue_team #infosec #cve
Medium
CVE-2025–15556 分析:Notepad++ 的供應鏈攻擊與防禦策略
漏洞摘要 該漏洞在 2026/2/3 正式釋出,在 Notepad++ 8.8.9 之前的版本中,其內建的更新程式 WinGUp (gup.exe) 存在一個嚴重漏洞,WinGUp在下載更新檔時只負責下載,卻沒有「核對身分」
⤷ Title: I Bypassed an Admin Panel Using One HTTP Header
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:28:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #web_security #owasp_top_10 #vulnerability #ethical_hacking
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:28:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #web_security #owasp_top_10 #vulnerability #ethical_hacking
Medium
I Bypassed an Admin Panel Using One HTTP Header
The server didn’t get hacked. It gave up the secret itself.
⤷ Title: JavaScript: Simple Demo (THM) Tryhackme Walkthrough
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:33:27 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #javanoscript #tryhackme_walkthrough #programming
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:33:27 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #javanoscript #tryhackme_walkthrough #programming
Medium
JavaScript: Simple Demo (THM) Tryhackme Walkthrough
Denoscription : Explore what a basic JavaScript program looks like.
⤷ Title: IEC 62443: The “Gold Standard” for Industrial Security Simplified
════════════════════════
𐀪 Author: Dasmanish
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:05:45 GMT
════════════════════════
⌗ Tags: #ot_vapt #ethical_hacking #pentesting #ics_scada #iec_62443
════════════════════════
𐀪 Author: Dasmanish
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:05:45 GMT
════════════════════════
⌗ Tags: #ot_vapt #ethical_hacking #pentesting #ics_scada #iec_62443
Medium
IEC 62443: The “Gold Standard” for Industrial Security Simplified
1. Stakeholders (Roles and Responsibilities)
⤷ Title: GTFOBins Explained: How Legitimate Linux Tools Become Powerful Attack Vectors
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:24:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #blue_team #linux_security #incident_response
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:24:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #blue_team #linux_security #incident_response
Medium
GTFOBins Explained: How Legitimate Linux Tools Become Powerful Attack Vectors
Introduction
⤷ Title: Post-Quantum Cybersecurity
════════════════════════
𐀪 Author: Dietmar Marggraff
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:40:43 GMT
════════════════════════
⌗ Tags: #hacking #quantum_computing #encryption #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Dietmar Marggraff
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:40:43 GMT
════════════════════════
⌗ Tags: #hacking #quantum_computing #encryption #cyber_security_awareness #cybersecurity
Medium
Post-Quantum Cryptography
Your no-nonsense guide to PQC
⤷ Title: Cracking DVRIP/Sofia Hashes With Python
════════════════════════
𐀪 Author: Kostas Ereksonas
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:08:18 GMT
════════════════════════
⌗ Tags: #hacking #password_cracking #cameras #python #iot
════════════════════════
𐀪 Author: Kostas Ereksonas
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:08:18 GMT
════════════════════════
⌗ Tags: #hacking #password_cracking #cameras #python #iot
Medium
Cracking DVRIP/Sofia Hashes With Python
Using a simple dictionary attack to crack a DVRIP/Sofia hash found on Xiongmai-based IP cameras. Full code is provided in…
⤷ Title: Ice — TryHackMe
════════════════════════
𐀪 Author: Azzam Mohammed (WHHacker)
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:55:30 GMT
════════════════════════
⌗ Tags: #penetration_testing #privilege_escalation #cybersecurity #web_exploitation #tryhackme
════════════════════════
𐀪 Author: Azzam Mohammed (WHHacker)
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:55:30 GMT
════════════════════════
⌗ Tags: #penetration_testing #privilege_escalation #cybersecurity #web_exploitation #tryhackme
Medium
Ice — TryHackMe
Introduction
⤷ Title: Try Hack Me- Atlas CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:24:23 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:24:23 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme_writeup #tryhackme
Medium
Try Hack Me- Atlas CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: TryHackMe | JavaScript: Simple Demo | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:20:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_walkthrough #tryhackme_writeup #javanoscript
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:20:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_walkthrough #tryhackme_writeup #javanoscript
Medium
TryHackMe | JavaScript: Simple Demo | WriteUp
Explore what a basic JavaScript program looks like.
⤷ Title: TryHackMe | Python: Simple Demo | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:19:54 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #tryhackme_writeup #python #cybersecurity
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:19:54 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #tryhackme_writeup #python #cybersecurity
Medium
TryHackMe | Python: Simple Demo | WriteUp
Explore what a basic Python program looks like.
⤷ Title: Why Real API Breaches Happen Through Chains, Not Single Bugs
════════════════════════
𐀪 Author: Boluwatife Dada
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:52:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security
════════════════════════
𐀪 Author: Boluwatife Dada
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:52:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security
Medium
Why Real API Breaches Happen Through Chains, Not Single Bugs
In API security, single bugs within an application can result in a major security breach if discovered by a malicious hacker. What could be…