⤷ Title: INE-Host & Network Penetration Testing: Post-Exploitation CTF 2 by Singkhon
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:41:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #coding #ctf #programming
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:41:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #coding #ctf #programming
Medium
INE-Host & Network Penetration Testing: Post-Exploitation CTF 2 by Singkhon
Hello, my name is Singkhon. After completing the eJPT course, I would like to share my methods and approaches for solving each CTF problem…
⤷ Title: Aircrack-ng: A Suite of Tools Every Wireless Pentester Needs
════════════════════════
𐀪 Author: Mark Puckett
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:26:01 GMT
════════════════════════
⌗ Tags: #wireless_security #deauthentication_attack #penetration_testing #aircrack_ng
════════════════════════
𐀪 Author: Mark Puckett
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:26:01 GMT
════════════════════════
⌗ Tags: #wireless_security #deauthentication_attack #penetration_testing #aircrack_ng
Medium
Aircrack-ng: A Suite of Tools Every Wireless Pentester Needs
Discover the tools within the Aircrack-ng suite and get started using them for deauth attacks, grabbing handshakes, and more.
⤷ Title: Try Hack Me- Iron Corp CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:16:01 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:16:01 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme
Medium
Try Hack Me- Iron Corp CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: How to connect with TryHackMe room using openvpn and remmina — Applicable for kali, debian, ubuntu…
════════════════════════
𐀪 Author: Mahim Avi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:37:42 GMT
════════════════════════
⌗ Tags: #remmina #debian #kali #openvpn #tryhackme
════════════════════════
𐀪 Author: Mahim Avi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:37:42 GMT
════════════════════════
⌗ Tags: #remmina #debian #kali #openvpn #tryhackme
Medium
How to connect with TryHackMe room using openvpn and remmina — Applicable for kali, debian, ubuntu and windows
First of all you need to install OpenVPN in your kali machine (I am using kali here, you can use ubuntu as well). The command is:
⤷ Title: HackTheBox | Fawn | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:34:28 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #htb #hackthebox_walkthrough #ctf
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:34:28 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #htb #hackthebox_walkthrough #ctf
Medium
HackTheBox | Fawn | WriteUp
Disclaimer: This writeup is based on a Capture The Flag (CTF) challenge hosted on HackTheBox and it is intended for educational purposes…
⤷ Title: Batman’s Kitchen CTF (BKCTF) 2026: web/TinySQL
════════════════════════
𐀪 Author: Chimdi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:17:35 GMT
════════════════════════
⌗ Tags: #sql_injection #carlthecreator #ctf #cybersecurity #ctf_writeup
════════════════════════
𐀪 Author: Chimdi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:17:35 GMT
════════════════════════
⌗ Tags: #sql_injection #carlthecreator #ctf #cybersecurity #ctf_writeup
Medium
Batman’s Kitchen CTF (BKCTF) 2026: web/TinySQL
This challenge relied on exploiting a custom query language, as hinted by the denoscription.
⤷ Title: The UI Said No, The API Said 200 OK: Two RBAC Vulnerabilities I Found
════════════════════════
𐀪 Author: Muhammad Wageh
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:11:20 GMT
════════════════════════
⌗ Tags: #api #rbac_access_control #bug_bounty #hacking #access_control
════════════════════════
𐀪 Author: Muhammad Wageh
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:11:20 GMT
════════════════════════
⌗ Tags: #api #rbac_access_control #bug_bounty #hacking #access_control
Medium
The UI Said No, The API Said 200 OK: Two RBAC Vulnerabilities I Found
Hey everyone, I just want to talk about two Access Control issues I found.
❤1
⤷ Title: Speck Shellcode Encryption with Session Key Wrapping
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:16:48 GMT
════════════════════════
⌗ Tags: #malware #hacker #cybersecurity #hacking #pentesting
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:16:48 GMT
════════════════════════
⌗ Tags: #malware #hacker #cybersecurity #hacking #pentesting
Medium
Speck Shellcode Encryption with Session Key Wrapping
Welcome to this post, in today’s post we take our previous Speck shellcode encryption implementation a step further by introducing dynamic…
⤷ Title: Fixing “error while loading shared libraries” on Arch Linux
════════════════════════
𐀪 Author: sassywoocoo
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:01:12 GMT
════════════════════════
⌗ Tags: #hacking #emulator #linux
════════════════════════
𐀪 Author: sassywoocoo
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:01:12 GMT
════════════════════════
⌗ Tags: #hacking #emulator #linux
Medium
Fixing “error while loading shared libraries” on Arch Linux
If you’ve been using Arch Linux for more than five minutes, you’ve probably seen this:
⤷ Title: I Find IDOR Bug in Hacking Hub Challenge - VulnBegin
════════════════════════
𐀪 Author: The Cyberboy
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:37:07 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #hacking_hub #idor #ctf
════════════════════════
𐀪 Author: The Cyberboy
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:37:07 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #hacking_hub #idor #ctf
Medium
I Find IDOR Bug in Hacking Hub Challenge - VulnBegin
Hacking Hub Challenge -VulnBegin Introduction : Hello everyone if you are new in hacking hub platform so start with this ctf, it is easy and beginner friendly ctf with 9 Flags. before you start ctf …
⤷ Title: Anthonyverse© Codex: The hacker
════════════════════════
𐀪 Author: Anthonyverse
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:01:12 GMT
════════════════════════
⌗ Tags: #short_story #hacking #science_fiction #smart_contracts #government
════════════════════════
𐀪 Author: Anthonyverse
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:01:12 GMT
════════════════════════
⌗ Tags: #short_story #hacking #science_fiction #smart_contracts #government
Medium
Anthonyverse© Codex: The hacker
By: Anthony Maldonado
⤷ Title: Networking Finally Clicked: How OSI, Nmap, and Host Discovery Started Making Sense (eJPT Day 6)
════════════════════════
𐀪 Author: getroot.dev
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:36:34 GMT
════════════════════════
⌗ Tags: #nmap #ejpt #networking #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: getroot.dev
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:36:34 GMT
════════════════════════
⌗ Tags: #nmap #ejpt #networking #penetration_testing #cybersecurity
Medium
Networking Finally Clicked: How OSI, Nmap, and Host Discovery Started Making Sense (eJPT Day 6)
eJPT Day 6: Strengthening Footprinting & Scanning Skills Through Networking Fundamentals
⤷ Title: From Zero to Domain Admin: Building and Attacking an Active Directory Lab
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:33:13 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf #cybersecurity #penetration_testing #active_directory
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:33:13 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf #cybersecurity #penetration_testing #active_directory
Medium
From Zero to Domain Admin: Building and Attacking an Active Directory Lab
Overview
⤷ Title: Become a Defender (THM) Tryhackme Walkthrough
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:54:42 GMT
════════════════════════
⌗ Tags: #blue_team #tryhackme #cybersecurity #cyber_security_awareness #cybercrime
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:54:42 GMT
════════════════════════
⌗ Tags: #blue_team #tryhackme #cybersecurity #cyber_security_awareness #cybercrime
Medium
Become a Defender (THM) Tryhackme Walkthrough
Denoscription : Explore defensive security, cyber infrastructure, and how to protect systems from attacks.
⤷ Title: TryHackMe Writeup: Pyrat
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:44:08 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #tryhackme #tryhackme_writeup #cybercrime
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:44:08 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #tryhackme #tryhackme_writeup #cybercrime
Medium
TryHackMe Writeup: Pyrat
Makinenin yazarı bize aslında oyunun tüm kurallarını ve yol haritasını önden vermiş: “Önce bir Python kod çalıştırma zafiyeti bulacaksın…
⤷ Title: Intigriti February 2026 Challenge - CTF Write-up
════════════════════════
𐀪 Author: roguenull
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:57:58 GMT
════════════════════════
⌗ Tags: #bug_bounty #ctf_writeup #ethical_hacking #ctf
════════════════════════
𐀪 Author: roguenull
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:57:58 GMT
════════════════════════
⌗ Tags: #bug_bounty #ctf_writeup #ethical_hacking #ctf
Medium
Intigriti February 2026 Challenge - CTF Write-up
Challenge Link : https://x.com/intigriti/status/2023381870008733733
⤷ Title: North Korean Lazarus Group Adopts Medusa Ransomware in Global Attacks
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:40:47 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attacks #Cyber Crime #Cyber Attack #Cybersecurity #Extortion #Lazarus #Medusa #North Korea #Ransomware #Symantec #Vulnerability
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:40:47 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attacks #Cyber Crime #Cyber Attack #Cybersecurity #Extortion #Lazarus #Medusa #North Korea #Ransomware #Symantec #Vulnerability
Hackread
North Korean Lazarus Group Adopts Medusa Ransomware in Global Attacks
Lazarus Group is now using Medusa ransomware in attacks on healthcare and social services, signaling a move toward profit-focused cybercrime.
⤷ Title: Malicious NuGet Packages Weaponize ASP.NET Identity for Production Backdoors
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:13:36 +0000
════════════════════════
⌗ Tags: #Malware #ASP.NET Security #C2 Server #Identity and Access Management #infosec #Malware Dropper #NCryptYo #NuGet Attack #Socket Threat Research #supply chain attack #Typosquatting
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:13:36 +0000
════════════════════════
⌗ Tags: #Malware #ASP.NET Security #C2 Server #Identity and Access Management #infosec #Malware Dropper #NCryptYo #NuGet Attack #Socket Threat Research #supply chain attack #Typosquatting
Daily CyberSecurity
Malicious NuGet Packages Weaponize ASP.NET Identity for Production Backdoors
Socket researchers uncover a NuGet supply chain attack using "NCryptYo" to hijack ASP.NET apps. Attackers inject backdoors into production authorization layers.
⤷ Title: Stealth & Persistence: MuddyWater’s New Rust-Based Payload Mimics Cloudflare and Reddit
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:06:20 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #Genians Report #infosec #Macro_based Attacks #MuddyWater APT #Operation Olalampo #RMM tool abuse #Rust malware #State_Sponsored Espionage #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:06:20 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #Genians Report #infosec #Macro_based Attacks #MuddyWater APT #Operation Olalampo #RMM tool abuse #Rust malware #State_Sponsored Espionage #threat intelligence
Daily CyberSecurity
Stealth & Persistence: MuddyWater’s New Rust-Based Payload Mimics Cloudflare and Reddit
Genians report reveals MuddyWater APT's shift to Rust-based malware and RMM tool abuse for long-term espionage across government and critical infrastructure.
⤷ Title: Total Takeover: Critical Zyxel Flaw (CVSS 9.8) Exposes Routers to Remote Command Injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:00:52 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Command Injection #CVE_2025_13942 #Cyber Security #firmware update #infosec #Patch Alert #rce #Remote Code Execution #router security #UPnP Vulnerability #Zyxel
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:00:52 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Command Injection #CVE_2025_13942 #Cyber Security #firmware update #infosec #Patch Alert #rce #Remote Code Execution #router security #UPnP Vulnerability #Zyxel
Daily CyberSecurity
Total Takeover: Critical Zyxel Flaw (CVSS 9.8) Exposes Routers to Remote Command Injection
Zyxel issues urgent patches for a critical 9.8 severity flaw (CVE-2025-13942) in UPnP functions that allows remote attackers to execute OS commands. Patch now!
⤷ Title: Hakrawler Guide: Ultra-Fast Web Crawling for Bug Hunting and Recon
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:01:02 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #web_scraping #bug_bounty #hacking
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:01:02 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #web_scraping #bug_bounty #hacking
Medium
Hakrawler Guide: Ultra-Fast Web Crawling for Bug Hunting and Recon
Master Hakrawler: the crawler in Go for discovering endpoints, JS files, and hidden paths in your cybersecurity audits.