⤷ Title: 12 Seconds Is All You Need to Take a Summarized Note!!
════════════════════════
𐀪 Author: Alareqi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:23:07 GMT
════════════════════════
⌗ Tags: #bug_bounty #obsidian #ai #fabric #notes
════════════════════════
𐀪 Author: Alareqi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:23:07 GMT
════════════════════════
⌗ Tags: #bug_bounty #obsidian #ai #fabric #notes
Medium
12 Seconds Is All You Need to Take a Summarized Note!!
Let’s be honest — note-taking in bug bounty hunting can be exhausting.
⤷ Title: HackIta: la piattaforma italiana per diventare davvero operativo nel penetration testing
════════════════════════
𐀪 Author: Campamudassir
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:26:16 GMT
════════════════════════
⌗ Tags: #linux #penetration_testing #windows #cybersecurity #hacking
════════════════════════
𐀪 Author: Campamudassir
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:26:16 GMT
════════════════════════
⌗ Tags: #linux #penetration_testing #windows #cybersecurity #hacking
Medium
HackIta: la piattaforma italiana per diventare davvero operativo nel penetration testing
HackIta: la piattaforma italiana per diventare davvero operativo nel penetration testing Se stai studiando ethical hacking, probabilmente ti sei già scontrato con questo problema: le informazioni ci …
⤷ Title: Vulnhub: Book-Shelf: 1 Walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:45:44 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ctf_writeup #ctf
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:45:44 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ctf_writeup #ctf
Medium
Vulnhub: Book-Shelf: 1 Walkthrough
Machine details
⤷ Title: Intigriti Challenge 0226 : Stored XSS & CSP Bypass
════════════════════════
𐀪 Author: Achraf (@40rbidd3n)
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:34:29 GMT
════════════════════════
⌗ Tags: #ctf #intigriti #xss_attack #bugbounty_writeup #ctf_writeup
════════════════════════
𐀪 Author: Achraf (@40rbidd3n)
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:34:29 GMT
════════════════════════
⌗ Tags: #ctf #intigriti #xss_attack #bugbounty_writeup #ctf_writeup
Medium
Intigriti Challenge 0226 : Stored XSS & CSP Bypass
This write-up walks through finding and exploiting a stored XSS in the challenge application, and bypassing the page’s…
⤷ Title: Machine-Speed Intrusions: How One Hacker Used DeepSeek and Claude to Scale a Global Campaign
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 03:00:36 +0000
════════════════════════
⌗ Tags: #Cybercriminals #@goyaramen #AI Cyberattacks #ARXON #Claude AI #Cyber Security #DeepSeek #Fortinet Vulnerability #HexStrike #infosec #LLM Automation #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 03:00:36 +0000
════════════════════════
⌗ Tags: #Cybercriminals #@goyaramen #AI Cyberattacks #ARXON #Claude AI #Cyber Security #DeepSeek #Fortinet Vulnerability #HexStrike #infosec #LLM Automation #threat intelligence
Daily CyberSecurity
Machine-Speed Intrusions: How One Hacker Used DeepSeek and Claude to Scale a Global Campaign
Researcher @goyaramen exposes "ARXON," an AI-automated pipeline using LLMs to manage simultaneous global attacks on Fortinet devices. The future of scale is here.
⤷ Title: Become a Sponsor on Cyber Kalki Matrix — Permanent Visibility in the Cyber Kalki Intelligence…
════════════════════════
𐀪 Author: ElonMuskTheAntichrist
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 03:32:09 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #coding #cybersecurity
════════════════════════
𐀪 Author: ElonMuskTheAntichrist
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 03:32:09 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #coding #cybersecurity
Medium
💰Become a Sponsor on Cyber Kalki Matrix — Permanent Visibility in the Cyber Kalki Intelligence…
https://kalkikrivadna.com/halloffame.html
⤷ Title: Advent of The Relics 1 — A Call from the Museum
════════════════════════
𐀪 Author: Adindazara
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 04:30:14 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup
════════════════════════
𐀪 Author: Adindazara
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 04:30:14 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup
Medium
Advent of The Relics 1 — A Call from the Museum
Resources: https://app.hackthebox.com/sherlocks/AoTR%25201%253A%2520A%2520Call%2520from%2520the%2520Museum?tab=play_sherlock
⤷ Title: When /phpmyadmin Isn’t Hidden Anymore: An Exposed Database Panel
════════════════════════
𐀪 Author: Manav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:00 GMT
════════════════════════
⌗ Tags: #infosec #penetration_testing #bug_bounty_writeup #bug_bounty
════════════════════════
𐀪 Author: Manav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:00 GMT
════════════════════════
⌗ Tags: #infosec #penetration_testing #bug_bounty_writeup #bug_bounty
Medium
When /phpmyadmin Isn’t Hidden Anymore: An Exposed Database Panel
Hello guys, welcome back! I hope you’re doing well.
⤷ Title: Claude Code Security Found 500 Vulnerabilities. A Smarter Scanner That Still Needs a Human.
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:55:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #claude_code #ai #application_security #careers
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:55:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #claude_code #ai #application_security #careers
Medium
Claude Code Security Found 500 Vulnerabilities. A Smarter Scanner That Still Needs a Human.
A beginner’s honest take on Claude Code Security and the hype nobody is questioning
⤷ Title: How to Prevent SQL Injection in Modern Applications
════════════════════════
𐀪 Author: Mark L. Hill
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:38:51 GMT
════════════════════════
⌗ Tags: #sql #web_development #sql_injection #hacking
════════════════════════
𐀪 Author: Mark L. Hill
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:38:51 GMT
════════════════════════
⌗ Tags: #sql #web_development #sql_injection #hacking
Medium
How to Prevent SQL Injection in Modern Applications
Security is no longer optional in modern web development. As applications grow more complex and data-driven, protecting user information…
⤷ Title: AoTR2 — Operation Winter Blackout — HackTheBox
════════════════════════
𐀪 Author: Yrddry
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:20:52 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox #hacking #ctf_writeup #hackthebox_writeup
════════════════════════
𐀪 Author: Yrddry
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:20:52 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox #hacking #ctf_writeup #hackthebox_writeup
Medium
AoTR2 — Operation Winter Blackout — HackTheBox
By: Andry Muh Ivan De Reva
⤷ Title: Wide OpenClaw: Abusing Loose Permissions for the Powerful AI Assistant
════════════════════════
𐀪 Author: grepStrength
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:05:27 GMT
════════════════════════
⌗ Tags: #agentic_ai #cybersecurity #generative_ai_tools #cybersecurity_awareness #hacking
════════════════════════
𐀪 Author: grepStrength
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:05:27 GMT
════════════════════════
⌗ Tags: #agentic_ai #cybersecurity #generative_ai_tools #cybersecurity_awareness #hacking
Medium
Wide OpenClaw: Abusing Loose Permissions for the Powerful AI Assistant
New Attack Vectors Incoming
⤷ Title: Top 10 Networking Concepts Every Ethical Hacker Must Know
════════════════════════
𐀪 Author: 0xSmit
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:21:13 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cybersecurity #web_development #networking #infosec
════════════════════════
𐀪 Author: 0xSmit
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:21:13 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cybersecurity #web_development #networking #infosec
Medium
Top 10 Networking Concepts Every Ethical Hacker Must Know
Ethical hacking without networking knowledge is like driving blindfolded. Every attack, every defense, every packet — it all depends on how…
⤷ Title: TRYHACKME-
════════════════════════
𐀪 Author: Gargbhumika
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:12 GMT
════════════════════════
⌗ Tags: #tryhackme #networking
════════════════════════
𐀪 Author: Gargbhumika
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:12 GMT
════════════════════════
⌗ Tags: #tryhackme #networking
Medium
TRYHACKME-
INTRODUCTORY TO NETWORKING
⤷ Title: TryHackMe Writeup: Brains
════════════════════════
𐀪 Author: Aashish
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:01:02 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #tryhackme
════════════════════════
𐀪 Author: Aashish
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:01:02 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #tryhackme
Medium
TryHackMe Writeup: Brains
Welcome to my first CTF Writeup.
⤷ Title: Subdomain Enumeration | TryHackMe Write-up | Farros
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:00:23 GMT
════════════════════════
⌗ Tags: #writeup #tryhackme #osint #security #farro
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:00:23 GMT
════════════════════════
⌗ Tags: #writeup #tryhackme #osint #security #farro
Medium
Subdomain Enumeration | TryHackMe Write-up | Farros
This is my write-up for the TryHackMe room on Subdomain Enumeration ↗ . Written in 2026, I hope this write-up helps others learn and…
⤷ Title: Advent of The Relics 1 — A Call from the Museum | Cybersecurity Bootcamp
════════════════════════
𐀪 Author: Najafghifari
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:27 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #cybersecurity #hackthebox #bootcamp
════════════════════════
𐀪 Author: Najafghifari
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:27 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #cybersecurity #hackthebox #bootcamp
Medium
Advent of The Relics 1 — A Call from the Museum | Cybersecurity Bootcamp
Kasus ini menceritakan tentang suatu malam di pertengahan bulan November, ketika seorang karyawan CALE yang sedang kelelahan mendapatkan…
⤷ Title: DOM XSS: When JavaScript Becomes the Vulnerability
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:43:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #xss_attack #dom_xss #blackhat
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:43:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #xss_attack #dom_xss #blackhat
Medium
DOM XSS: When JavaScript Becomes the Vulnerability
I Didn’t Touch The Server… But I Still Executed JavaScript (DOM XSS Explained)
⤷ Title: HTTP Headers Every Hacker Should Know: When One Header Breaks All Security
════════════════════════
𐀪 Author: Nitin yadav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:21:36 GMT
════════════════════════
⌗ Tags: #web_security #technology #programming #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Nitin yadav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:21:36 GMT
════════════════════════
⌗ Tags: #web_security #technology #programming #cybersecurity #ethical_hacking
Medium
HTTP Headers Every Hacker Should Know: When One Header Breaks All Security
Introduction – HTTP Headers Are Not “Just Metadata”
⤷ Title: Token Theft and Session Hijacking: The New Frontier of Identity Attacks
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:20:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberattack #information_security #cyber_security_awareness #ethical_hacking
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:20:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberattack #information_security #cyber_security_awareness #ethical_hacking
Medium
Token Theft and Session Hijacking: The New Frontier of Identity Attacks
Introduction
⤷ Title: Intigriti Feb 2026: Cooking the CSP with a Side of JSONP
════════════════════════
𐀪 Author: Gaurav Jha
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:58:10 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #intigriti #cybersecurity #hacking #bug_bounty
════════════════════════
𐀪 Author: Gaurav Jha
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:58:10 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #intigriti #cybersecurity #hacking #bug_bounty
Medium
Intigriti Feb 2026: Cooking the CSP with a Side of JSONP
The February Intigriti challenge was a whole vibe. We went from a simple Markdown input to full-on administrative cookie exfiltration. In…