⤷ Title: 10 Persistence Methods Every Red Teamer MUST Master
════════════════════════
𐀪 Author: Candy Wong
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:05:13 GMT
════════════════════════
⌗ Tags: #active_directory #mitre_attack #persistence #red_team #hacking
════════════════════════
𐀪 Author: Candy Wong
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:05:13 GMT
════════════════════════
⌗ Tags: #active_directory #mitre_attack #persistence #red_team #hacking
Medium
10 Persistence Methods Every Red Teamer MUST Master
The definitive guide to callback persistence for red team operators. Covers major Windows persistence technique with full step-by-step…
⤷ Title: Understanding Safe Darkweb Browsing Tips: Privacy, Risk & Reality
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:49:45 GMT
════════════════════════
⌗ Tags: #infosec #darkweb #osint #cybersecurity
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:49:45 GMT
════════════════════════
⌗ Tags: #infosec #darkweb #osint #cybersecurity
Medium
Understanding Safe Darkweb Browsing Tips: Privacy, Risk & Reality
The dark web often gets portrayed as either completely lawless or completely anonymous. In reality, neither assumption is accurate.
⤷ Title: VulnHub: Tr0ll 2 Write-Up
════════════════════════
𐀪 Author: Khaled Waleed (MrWayne)
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:37:49 GMT
════════════════════════
⌗ Tags: #python #ssh #penetration_testing #buffer_overflow #network_security
════════════════════════
𐀪 Author: Khaled Waleed (MrWayne)
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:37:49 GMT
════════════════════════
⌗ Tags: #python #ssh #penetration_testing #buffer_overflow #network_security
Medium
🛡 VulnHub: Tr0ll 2 Write-Up
Boot2Root Walkthrough, Full Exploitation Chain.
⤷ Title: What is NoSQL Injection?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:05:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #nosql #penetration_testing #binaryshield
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:05:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #nosql #penetration_testing #binaryshield
Medium
What is NoSQL Injection?
✅ 1. What it is (very simple definition) NoSQL injection happens when:
⤷ Title: Menyelesaikan Tantangan AoTR 2: Operation Winter Blackout | HTB
════════════════════════
𐀪 Author: Masrul Hadi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:12:15 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #cybersecurity #aotr #digital_forensics
════════════════════════
𐀪 Author: Masrul Hadi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:12:15 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #cybersecurity #aotr #digital_forensics
Medium
Menyelesaikan Tantangan AoTR 2: Operation Winter Blackout | HTB
Menyelesaikan tantangan AoTR 2
⤷ Title: VM Snapshot Disk Recovery
════════════════════════
𐀪 Author: Marduk I Am
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:57:16 GMT
════════════════════════
⌗ Tags: #virtualization #ethical_hacking #linux #cybersecurity #digital_forensics
════════════════════════
𐀪 Author: Marduk I Am
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:57:16 GMT
════════════════════════
⌗ Tags: #virtualization #ethical_hacking #linux #cybersecurity #digital_forensics
Medium
🛠 VM Snapshot Disk Recovery
Snapshot Analysis and Password Recovery in a Kali Linux Virtual Machine
⤷ Title: How to Use X Ads to Get Your Business Found in 2026
════════════════════════
𐀪 Author: Gustavo Payano
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:06:54 GMT
════════════════════════
⌗ Tags: #marketing #digital_marketing #xs #xad #twitter
════════════════════════
𐀪 Author: Gustavo Payano
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:06:54 GMT
════════════════════════
⌗ Tags: #marketing #digital_marketing #xs #xad #twitter
Medium
How to Use X Ads to Get Your Business Found in 2026
By Gus Digital Solutions | gusdigitalsolutions.com
⤷ Title: UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:51:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:51:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Anthropic Claims Chinese AI Firms ‘Distilled’ Claude to Train Their Models
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:13:20 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #AI #Anthropic #China #Claude #Cyber Attack #Cyber Crime #Cybersecurity #DeepSeek #Distillation #MiniMax #Moonshot AI
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:13:20 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #AI #Anthropic #China #Claude #Cyber Attack #Cyber Crime #Cybersecurity #DeepSeek #Distillation #MiniMax #Moonshot AI
Hackread
Anthropic Claims Chinese AI Firms ‘Distilled’ Claude to Train Their Models
Anthropic claims Chinese AI firms distilled Claude to train rival AI models, raising concerns about model extraction, security risks and AI distillation abuse.
⤷ Title: This 1 Prompt Helped Me Master Any Bug I Didn’t Understand
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:59:36 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty #bug_hunting #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:59:36 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty #bug_hunting #ethical_hacking #cybersecurity
Medium
This 1 Prompt Helped Me Master Any Bug I Didn’t Understand
How I turned ChatGPT into a personal bug bounty mentor — and built a system to go from confused beginner to deep vulnerability hunter.
⤷ Title: Breaking Authentication — Part 1
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:55:03 GMT
════════════════════════
⌗ Tags: #authentication #oauth2 #bug_bounty #cybersecurity #security
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:55:03 GMT
════════════════════════
⌗ Tags: #authentication #oauth2 #bug_bounty #cybersecurity #security
Medium
Breaking Authentication — Part 1
Understanding Modern Authentication Architecture
⤷ Title: Lab: DOM XSS in jQuery Selector Sink Using a Hashchange Event
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:26:27 GMT
════════════════════════
⌗ Tags: #xss_attack #cybersecurity #hacking #dom_xss #vulnerability
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:26:27 GMT
════════════════════════
⌗ Tags: #xss_attack #cybersecurity #hacking #dom_xss #vulnerability
⤷ Title: Lab: Blind SQL injection with conditional errors | PortSwigger
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:24:00 GMT
════════════════════════
⌗ Tags: #sql_injection #portswigger #web_hacking #hacking #ethical_hacking
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:24:00 GMT
════════════════════════
⌗ Tags: #sql_injection #portswigger #web_hacking #hacking #ethical_hacking
Medium
Lab: Blind SQL injection with conditional errors | PortSwigger
Denoscription
⤷ Title: Notepad++ Updates: One for You, One for the Ministry of State Security
════════════════════════
𐀪 Author: EternalR00ted
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:30:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #malware_analysis #threat_hunting #incident_response
════════════════════════
𐀪 Author: EternalR00ted
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:30:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #malware_analysis #threat_hunting #incident_response
Medium
Notepad++ Updates: One for You, One for the Ministry of State Security
Extremely late to this, but as I’ve said, I want to publish my research to improve my writing skills and get feedback from the community…
⤷ Title: Burp Suite: The Swiss-knife of Modern Security Testing
════════════════════════
𐀪 Author: Julio Arredondo
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:49:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #app_development #penetration_testing
════════════════════════
𐀪 Author: Julio Arredondo
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:49:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #app_development #penetration_testing
Medium
Burp Suite: The Swiss-knife of Modern Security Testing
Julio Arredondo
Certified Advanced Security Professional (CASP+)
M.S. in Cybersecurity Engineering student at University of San Diego
Certified Advanced Security Professional (CASP+)
M.S. in Cybersecurity Engineering student at University of San Diego
⤷ Title: SQL Injection ile Gizli Verileri Elde Etmek — WHERE Clause Exploit (Adim Adim)
════════════════════════
𐀪 Author: Zerioth Cypher Evidence
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:31:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #cybersecurity #sql_injection #web_security
════════════════════════
𐀪 Author: Zerioth Cypher Evidence
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:31:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #cybersecurity #sql_injection #web_security
Medium
SQL Injection ile Gizli Verileri Elde Etmek — WHERE Clause Exploit (Adim Adim)
Bu yazida, PortSwigger Web Security Academy platformundaki bir lab uzerinden klasik bir SQL Injection zafiyetini adim adim inceleyecegiz.
⤷ Title: TryHackMe — Pentesting Fundamentals (Walkthrough)
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:14:00 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #penetration_testing #pentesting
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:14:00 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #penetration_testing #pentesting
Medium
TryHackMe — Pentesting Fundamentals (Walkthrough)
In this room, we will understand more about what a penetration tester’s job responsibilities and what processes should be followed prior to…
⤷ Title: VulnHub — The Planets: Earth CTF
════════════════════════
𐀪 Author: Macmillan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:58:51 GMT
════════════════════════
⌗ Tags: #ctf_writeup #planets #earth #vulnhub
════════════════════════
𐀪 Author: Macmillan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:58:51 GMT
════════════════════════
⌗ Tags: #ctf_writeup #planets #earth #vulnhub
Medium
VulnHub — The Planets: Earth CTF
Hello, today we are trying to get the flags from the second machine from The Planets series: Earth!
⤷ Title: RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:22:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:22:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: The Personality Hire Who Accidentally Found Her People
════════════════════════
𐀪 Author: Demetria Washington
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:25:17 GMT
════════════════════════
⌗ Tags: #information_security #tech_career #cybsersecurity #application_security #women_in_tech
════════════════════════
𐀪 Author: Demetria Washington
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:25:17 GMT
════════════════════════
⌗ Tags: #information_security #tech_career #cybsersecurity #application_security #women_in_tech
Medium
The Personality Hire Who Accidentally Found Her People
Three years ago, I was a claims adjuster at GEICO. Today, I work in Application Security. No, I didn’t take the traditional route. I didn’t…
⤷ Title: Phantom Protocol (Razzify) .
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:44:50 GMT
════════════════════════
⌗ Tags: #razzify #hacking #websocket #ctf #cybersecurity
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:44:50 GMT
════════════════════════
⌗ Tags: #razzify #hacking #websocket #ctf #cybersecurity
Medium
Phantom Protocol (Razzify) .
Challenge Overview