⤷ Title: How I Found a Company’s Entire Internal Infrastructure in One Search
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 09:01:05 GMT
════════════════════════
⌗ Tags: #technology #hacking #bug_bounty #cybersecurity #infosec
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 09:01:05 GMT
════════════════════════
⌗ Tags: #technology #hacking #bug_bounty #cybersecurity #infosec
Medium
How I Found a Company’s Entire Internal Infrastructure in One Search
One domain search. 2,341 results. A complete map of their internal infrastructure.
⤷ Title: Panduan Recon & Enumeration Bug Bounty (Chime) untuk Pemula
════════════════════════
𐀪 Author: Adrian Syah Abidin
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 08:58:31 GMT
════════════════════════
⌗ Tags: #reconnaissance #enumeration #bug_bounty
════════════════════════
𐀪 Author: Adrian Syah Abidin
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 08:58:31 GMT
════════════════════════
⌗ Tags: #reconnaissance #enumeration #bug_bounty
Medium
Panduan Recon & Enumeration Bug Bounty (Chime) untuk Pemula
Bug bounty itu seperti “lomba mencari celah keamanan” secara legal di website/aplikasi yang memang membuka program keamanan. Di halaman…
⤷ Title: Day 5 — The Image That Executes Code (Attribute Injection XSS)
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 08:22:05 GMT
════════════════════════
⌗ Tags: #xss_attack #ethical_hacking #web_app_pentesting #cybersecurity #attribute_injection
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 08:22:05 GMT
════════════════════════
⌗ Tags: #xss_attack #ethical_hacking #web_app_pentesting #cybersecurity #attribute_injection
Medium
🚀 Day 5 — The Image That Executes Code (Attribute Injection XSS)
Target Application: https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:19:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:19:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: $300 a Month Android Malware ‘Oblivion’ Uses Fake Updates to Hijack Phones
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:34:06 +0000
════════════════════════
⌗ Tags: #Security #Android #Malware #Certo #Cyber Attack #Cybersecurity #Google #Oblivion
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:34:06 +0000
════════════════════════
⌗ Tags: #Security #Android #Malware #Certo #Cyber Attack #Cybersecurity #Google #Oblivion
Hackread
$300 a Month Android Malware ‘Oblivion’ Uses Fake Updates to Hijack Phones
Certo researchers reveal Oblivion, a new Android malware targeting major brands like Samsung and Xiaomi to steal passwords and bank codes.
⤷ Title: Mastering Broken Access Control: A Manual Deep Dive into OWASP Top 10
════════════════════════
𐀪 Author: Yashkasbe
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:34:51 GMT
════════════════════════
⌗ Tags: #cybersecurity #application_security #owasp #web_security #ethical_hacking
════════════════════════
𐀪 Author: Yashkasbe
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:34:51 GMT
════════════════════════
⌗ Tags: #cybersecurity #application_security #owasp #web_security #ethical_hacking
Medium
Mastering Broken Access Control: A Manual Deep Dive into OWASP Top 10
Broken Access Control remains the highest risk in the OWASP Top 10 not because it is hard to scan for, but because it’s hard to reason…
⤷ Title: Claude Code Security .A Smarter Scanner That Still Needs a Human.
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:55:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #claude_code #ai #application_security #careers
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:55:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #claude_code #ai #application_security #careers
Medium
Claude Code Security Found 500 Vulnerabilities. A Smarter Scanner That Still Needs a Human.
A beginner’s honest take on Claude Code Security and the hype nobody is questioning
⤷ Title: Evasive — Hacksmarter writeup
════════════════════════
𐀪 Author: GauthamV
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:40:21 GMT
════════════════════════
⌗ Tags: #red_team #hacking #offensive_security #active_directory
════════════════════════
𐀪 Author: GauthamV
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:40:21 GMT
════════════════════════
⌗ Tags: #red_team #hacking #offensive_security #active_directory
Medium
Evasive — Hacksmarter writeup
Enumeration
⤷ Title: Zero Trust Architecture: Why “Trust” is a Taboo Word in Security (NIST SP 800–207)
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:03:22 GMT
════════════════════════
⌗ Tags: #infosec #security #cybersecurity #programming #hacking
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:03:22 GMT
════════════════════════
⌗ Tags: #infosec #security #cybersecurity #programming #hacking
Medium
Zero Trust Architecture: Why “Trust” is a Taboo Word in Security (NIST SP 800–207)
For a long time, networks were just secured from the outside. Once you were inside, you were trusted completely...
⤷ Title: How Hackers Actually Break Into Systems
════════════════════════
𐀪 Author: Hania Khan
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:03:00 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #cyber_security_awareness #infosec #ethical_hacking
════════════════════════
𐀪 Author: Hania Khan
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:03:00 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #cyber_security_awareness #infosec #ethical_hacking
Medium
How Hackers Actually Break Into Systems
They don’t break in. They walk through open doors.
⤷ Title: OSINT: How Public Data Can Give You a Strategic Edge
════════════════════════
𐀪 Author: CyberSources
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 09:27:57 GMT
════════════════════════
⌗ Tags: #cybersource #cybersecurity #hacking #generative_ai_tools #osint
════════════════════════
𐀪 Author: CyberSources
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 09:27:57 GMT
════════════════════════
⌗ Tags: #cybersource #cybersecurity #hacking #generative_ai_tools #osint
Medium
OSINT: How Public Data Can Give You a Strategic Edge
Imagine a world where everything you need to know is already out there — from social media posts to public databases and government…
⤷ Title: Demystifying Asymmetric Cryptography: Keys, Signatures, and Double Encryption
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:02:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #algorithms #programming #information_security
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:02:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #algorithms #programming #information_security
Medium
Demystifying Asymmetric Cryptography: Keys, Signatures, and Double Encryption
When I started to learn cybersecurity concepts, I found the diagram of private and public keys confusing. So I want to break these concepts…
⤷ Title: I Found a DRM Bypass While Watching a Course — Here’s What It Taught Me About Real Hacking
════════════════════════
𐀪 Author: Ammar Harris
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 09:25:11 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #infosec #business_logic_flaw #penetration_testing #information_security
════════════════════════
𐀪 Author: Ammar Harris
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 09:25:11 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #infosec #business_logic_flaw #penetration_testing #information_security
Medium
I Found a DRM Bypass While Watching a Course — Here’s What It Taught Me About Real Hacking
We’ve all seen it: the “Download” button is missing. The platform promises high-security content protection. They tell you the content is…
⤷ Title: How API Pen-Testers Approach Systems: Tools, Mindset, and Methodology
════════════════════════
𐀪 Author: Peace Dennis
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:20:16 GMT
════════════════════════
⌗ Tags: #api_penetration_testing #crapi #burpsuite #api_testing #penetration_testing
════════════════════════
𐀪 Author: Peace Dennis
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:20:16 GMT
════════════════════════
⌗ Tags: #api_penetration_testing #crapi #burpsuite #api_testing #penetration_testing
Medium
How API Pen-Testers Approach Systems: Tools, Mindset, and Methodology
When most people think about penetration testing, they imagine someone aggressively firing payloads at a system until something breaks.
⤷ Title: How I Cracked My First Pentesting Certification (eJPTv2) in 3 Months
════════════════════════
𐀪 Author: Mohammad Anas Nirban
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:10:08 GMT
════════════════════════
⌗ Tags: #ethical_hacking #web_penetration_testing #cybersecurity #penetration_testing #networking
════════════════════════
𐀪 Author: Mohammad Anas Nirban
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:10:08 GMT
════════════════════════
⌗ Tags: #ethical_hacking #web_penetration_testing #cybersecurity #penetration_testing #networking
Medium
How I Cracked My First Pentesting Certification (eJPTv2) in 3 Months
There’s something uniquely special about that first BIG win in cybersecurity.
⤷ Title: How Industries Compare to Penetration Testing Their Network
════════════════════════
𐀪 Author: Hacker’s View on Cybersecurity
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:00:26 GMT
════════════════════════
⌗ Tags: #penetration_testing
════════════════════════
𐀪 Author: Hacker’s View on Cybersecurity
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:00:26 GMT
════════════════════════
⌗ Tags: #penetration_testing
Medium
How Industries Compare to Penetration Testing Their Network
In today’s hyperconnected ecosystem, penetration testing of network infrastructure has evolved from a periodic compliance requirement into…
⤷ Title: TryHackMe | Conti
════════════════════════
𐀪 Author: AbbasMurshid
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:31:46 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #conti_ransomware #tryhackme
════════════════════════
𐀪 Author: AbbasMurshid
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:31:46 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #conti_ransomware #tryhackme
Medium
TryHackMe | Conti
Some employees from your company reported that they can’t log into Outlook. The Exchange system admin also reported that he can’t log in to…
⤷ Title: Ironhole Tryhackme walkthrough
════════════════════════
𐀪 Author: Uummeerr
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 09:10:02 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #tryhackme #previlege_escalation #steganography #ironhole
════════════════════════
𐀪 Author: Uummeerr
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 09:10:02 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #tryhackme #previlege_escalation #steganography #ironhole
Medium
Ironhole Tryhackme walkthrough
Task 1: Introduction
⤷ Title: TryHackMe: Bricks Heist — From RCE to Crypto-Forensics
════════════════════════
𐀪 Author: hacker_space11
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 08:57:34 GMT
════════════════════════
⌗ Tags: #tryhackme #digital_forensics #cyper_security #ctf #ethical_hacking
════════════════════════
𐀪 Author: hacker_space11
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 08:57:34 GMT
════════════════════════
⌗ Tags: #tryhackme #digital_forensics #cyper_security #ctf #ethical_hacking
Medium
TryHackMe: Bricks Heist — From RCE to Crypto-Forensics 🧱💎
In this write-up, we will dive into the Bricks Heist room on TryHackMe. This room is a masterpiece that takes you through a full attack…
⤷ Title: Vulnhub:VulnOS 2
════════════════════════
𐀪 Author: Sreeram s m
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:41:38 GMT
════════════════════════
⌗ Tags: #walkthrough #vulnos2 #vulnhub
════════════════════════
𐀪 Author: Sreeram s m
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 10:41:38 GMT
════════════════════════
⌗ Tags: #walkthrough #vulnos2 #vulnhub
Medium
Vulnhub:VulnOS 2
Walkthrough
⤷ Title: HackTheBox | Lab AOTR 2 (Advent of The Relics 2) — Operation Winter Blackout
════════════════════════
𐀪 Author: M.Daffa Hakiki
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 09:39:28 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #challenge #hackthebox #cybersecurity
════════════════════════
𐀪 Author: M.Daffa Hakiki
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 09:39:28 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #challenge #hackthebox #cybersecurity
Medium
HackTheBox | Lab AOTR 2 (Advent of The Relics 2) — Operation Winter Blackout
Press enter or click to view image in full size