⤷ Title: SQL Injection ile Gizli Verileri Elde Etmek — WHERE Clause Exploit (Adim Adim)
════════════════════════
𐀪 Author: Zerioth Cypher Evidence
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:31:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #cybersecurity #sql_injection #web_security
════════════════════════
𐀪 Author: Zerioth Cypher Evidence
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:31:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #cybersecurity #sql_injection #web_security
Medium
SQL Injection ile Gizli Verileri Elde Etmek — WHERE Clause Exploit (Adim Adim)
Bu yazida, PortSwigger Web Security Academy platformundaki bir lab uzerinden klasik bir SQL Injection zafiyetini adim adim inceleyecegiz.
⤷ Title: TryHackMe — Pentesting Fundamentals (Walkthrough)
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:14:00 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #penetration_testing #pentesting
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:14:00 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #penetration_testing #pentesting
Medium
TryHackMe — Pentesting Fundamentals (Walkthrough)
In this room, we will understand more about what a penetration tester’s job responsibilities and what processes should be followed prior to…
⤷ Title: VulnHub — The Planets: Earth CTF
════════════════════════
𐀪 Author: Macmillan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:58:51 GMT
════════════════════════
⌗ Tags: #ctf_writeup #planets #earth #vulnhub
════════════════════════
𐀪 Author: Macmillan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:58:51 GMT
════════════════════════
⌗ Tags: #ctf_writeup #planets #earth #vulnhub
Medium
VulnHub — The Planets: Earth CTF
Hello, today we are trying to get the flags from the second machine from The Planets series: Earth!
⤷ Title: RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:22:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:22:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: The Personality Hire Who Accidentally Found Her People
════════════════════════
𐀪 Author: Demetria Washington
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:25:17 GMT
════════════════════════
⌗ Tags: #information_security #tech_career #cybsersecurity #application_security #women_in_tech
════════════════════════
𐀪 Author: Demetria Washington
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:25:17 GMT
════════════════════════
⌗ Tags: #information_security #tech_career #cybsersecurity #application_security #women_in_tech
Medium
The Personality Hire Who Accidentally Found Her People
Three years ago, I was a claims adjuster at GEICO. Today, I work in Application Security. No, I didn’t take the traditional route. I didn’t…
⤷ Title: Phantom Protocol (Razzify) .
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:44:50 GMT
════════════════════════
⌗ Tags: #razzify #hacking #websocket #ctf #cybersecurity
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:44:50 GMT
════════════════════════
⌗ Tags: #razzify #hacking #websocket #ctf #cybersecurity
Medium
Phantom Protocol (Razzify) .
Challenge Overview
⤷ Title: The Computer in Your Pocket is Your Biggest Vulnerability: A Guide to Mobile Hacking
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:34:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #mobile #ethical_hacking #mobile_hacking
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:34:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #mobile #ethical_hacking #mobile_hacking
Medium
The Computer in Your Pocket is Your Biggest Vulnerability: A Guide to Mobile Hacking
Most apps are a security nightmare. Here is how to start reverse engineering APKs and why mobile security is the new frontier for 2026.
⤷ Title: Pre-Windows 2000 Account Abuse to Domain Admin via ESC1
════════════════════════
𐀪 Author: Hishamrazak
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:50:04 GMT
════════════════════════
⌗ Tags: #learning #labs #penetration_testing #active_directory #information_security
════════════════════════
𐀪 Author: Hishamrazak
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:50:04 GMT
════════════════════════
⌗ Tags: #learning #labs #penetration_testing #active_directory #information_security
Medium
Pre-Windows 2000 Account Abuse to Domain Admin via ESC1
Enumeration
⤷ Title: INE-Host & Network Penetration Testing: Post-Exploitation CTF 2 by Singkhon
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:41:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #coding #ctf #programming
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:41:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #coding #ctf #programming
Medium
INE-Host & Network Penetration Testing: Post-Exploitation CTF 2 by Singkhon
Hello, my name is Singkhon. After completing the eJPT course, I would like to share my methods and approaches for solving each CTF problem…
⤷ Title: Aircrack-ng: A Suite of Tools Every Wireless Pentester Needs
════════════════════════
𐀪 Author: Mark Puckett
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:26:01 GMT
════════════════════════
⌗ Tags: #wireless_security #deauthentication_attack #penetration_testing #aircrack_ng
════════════════════════
𐀪 Author: Mark Puckett
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:26:01 GMT
════════════════════════
⌗ Tags: #wireless_security #deauthentication_attack #penetration_testing #aircrack_ng
Medium
Aircrack-ng: A Suite of Tools Every Wireless Pentester Needs
Discover the tools within the Aircrack-ng suite and get started using them for deauth attacks, grabbing handshakes, and more.
⤷ Title: Try Hack Me- Iron Corp CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:16:01 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:16:01 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme
Medium
Try Hack Me- Iron Corp CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: How to connect with TryHackMe room using openvpn and remmina — Applicable for kali, debian, ubuntu…
════════════════════════
𐀪 Author: Mahim Avi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:37:42 GMT
════════════════════════
⌗ Tags: #remmina #debian #kali #openvpn #tryhackme
════════════════════════
𐀪 Author: Mahim Avi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:37:42 GMT
════════════════════════
⌗ Tags: #remmina #debian #kali #openvpn #tryhackme
Medium
How to connect with TryHackMe room using openvpn and remmina — Applicable for kali, debian, ubuntu and windows
First of all you need to install OpenVPN in your kali machine (I am using kali here, you can use ubuntu as well). The command is:
⤷ Title: HackTheBox | Fawn | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:34:28 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #htb #hackthebox_walkthrough #ctf
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:34:28 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #htb #hackthebox_walkthrough #ctf
Medium
HackTheBox | Fawn | WriteUp
Disclaimer: This writeup is based on a Capture The Flag (CTF) challenge hosted on HackTheBox and it is intended for educational purposes…
⤷ Title: Batman’s Kitchen CTF (BKCTF) 2026: web/TinySQL
════════════════════════
𐀪 Author: Chimdi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:17:35 GMT
════════════════════════
⌗ Tags: #sql_injection #carlthecreator #ctf #cybersecurity #ctf_writeup
════════════════════════
𐀪 Author: Chimdi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:17:35 GMT
════════════════════════
⌗ Tags: #sql_injection #carlthecreator #ctf #cybersecurity #ctf_writeup
Medium
Batman’s Kitchen CTF (BKCTF) 2026: web/TinySQL
This challenge relied on exploiting a custom query language, as hinted by the denoscription.
⤷ Title: The UI Said No, The API Said 200 OK: Two RBAC Vulnerabilities I Found
════════════════════════
𐀪 Author: Muhammad Wageh
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:11:20 GMT
════════════════════════
⌗ Tags: #api #rbac_access_control #bug_bounty #hacking #access_control
════════════════════════
𐀪 Author: Muhammad Wageh
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:11:20 GMT
════════════════════════
⌗ Tags: #api #rbac_access_control #bug_bounty #hacking #access_control
Medium
The UI Said No, The API Said 200 OK: Two RBAC Vulnerabilities I Found
Hey everyone, I just want to talk about two Access Control issues I found.
❤1
⤷ Title: Speck Shellcode Encryption with Session Key Wrapping
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:16:48 GMT
════════════════════════
⌗ Tags: #malware #hacker #cybersecurity #hacking #pentesting
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:16:48 GMT
════════════════════════
⌗ Tags: #malware #hacker #cybersecurity #hacking #pentesting
Medium
Speck Shellcode Encryption with Session Key Wrapping
Welcome to this post, in today’s post we take our previous Speck shellcode encryption implementation a step further by introducing dynamic…
⤷ Title: Fixing “error while loading shared libraries” on Arch Linux
════════════════════════
𐀪 Author: sassywoocoo
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:01:12 GMT
════════════════════════
⌗ Tags: #hacking #emulator #linux
════════════════════════
𐀪 Author: sassywoocoo
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:01:12 GMT
════════════════════════
⌗ Tags: #hacking #emulator #linux
Medium
Fixing “error while loading shared libraries” on Arch Linux
If you’ve been using Arch Linux for more than five minutes, you’ve probably seen this:
⤷ Title: I Find IDOR Bug in Hacking Hub Challenge - VulnBegin
════════════════════════
𐀪 Author: The Cyberboy
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:37:07 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #hacking_hub #idor #ctf
════════════════════════
𐀪 Author: The Cyberboy
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:37:07 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #hacking_hub #idor #ctf
Medium
I Find IDOR Bug in Hacking Hub Challenge - VulnBegin
Hacking Hub Challenge -VulnBegin Introduction : Hello everyone if you are new in hacking hub platform so start with this ctf, it is easy and beginner friendly ctf with 9 Flags. before you start ctf …
⤷ Title: Anthonyverse© Codex: The hacker
════════════════════════
𐀪 Author: Anthonyverse
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:01:12 GMT
════════════════════════
⌗ Tags: #short_story #hacking #science_fiction #smart_contracts #government
════════════════════════
𐀪 Author: Anthonyverse
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:01:12 GMT
════════════════════════
⌗ Tags: #short_story #hacking #science_fiction #smart_contracts #government
Medium
Anthonyverse© Codex: The hacker
By: Anthony Maldonado
⤷ Title: Networking Finally Clicked: How OSI, Nmap, and Host Discovery Started Making Sense (eJPT Day 6)
════════════════════════
𐀪 Author: getroot.dev
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:36:34 GMT
════════════════════════
⌗ Tags: #nmap #ejpt #networking #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: getroot.dev
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:36:34 GMT
════════════════════════
⌗ Tags: #nmap #ejpt #networking #penetration_testing #cybersecurity
Medium
Networking Finally Clicked: How OSI, Nmap, and Host Discovery Started Making Sense (eJPT Day 6)
eJPT Day 6: Strengthening Footprinting & Scanning Skills Through Networking Fundamentals
⤷ Title: From Zero to Domain Admin: Building and Attacking an Active Directory Lab
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:33:13 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf #cybersecurity #penetration_testing #active_directory
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:33:13 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf #cybersecurity #penetration_testing #active_directory
Medium
From Zero to Domain Admin: Building and Attacking an Active Directory Lab
Overview