⤷ Title: Understanding Dark Web Leak Monitoring and Why It Matters
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:07:44 GMT
════════════════════════
⌗ Tags: #darkweb #osint #cybersecurity #infosec
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:07:44 GMT
════════════════════════
⌗ Tags: #darkweb #osint #cybersecurity #infosec
Medium
Understanding Dark Web Leak Monitoring and Why It Matters
Data breaches rarely stop at the initial incident. In many cases, stolen credentials and sensitive information circulate across hidden…
⤷ Title: Understanding and Exploiting the Samba Usermap Script Vulnerability
════════════════════════
𐀪 Author: Charitymkakina
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:13:09 GMT
════════════════════════
⌗ Tags: #penetration_testing #samba #cybersecurity #metasploitable2
════════════════════════
𐀪 Author: Charitymkakina
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:13:09 GMT
════════════════════════
⌗ Tags: #penetration_testing #samba #cybersecurity #metasploitable2
Medium
Understanding and Exploiting the Samba Usermap Script Vulnerability
Samba is software that allows Linux/Unix computers to share files and printers with Windows computers.
⤷ Title: WSTG-INFO-02
════════════════════════
𐀪 Author: Narathama Firmansyah Putra
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:08:48 GMT
════════════════════════
⌗ Tags: #owasp #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Narathama Firmansyah Putra
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:08:48 GMT
════════════════════════
⌗ Tags: #owasp #cybersecurity #penetration_testing
Medium
WSTG-INFO-02
Introduction WSTG-INFO-02 adalah pengujian untuk melakukan Fingerprint Web Server, yaitu proses untuk menentukan jenis (sperti Apache atau…
⤷ Title: WSTG-CONF-06, WSTG-SESS-02, WSTG-SESS-06
════════════════════════
𐀪 Author: Narathama Firmansyah Putra
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 13:16:12 GMT
════════════════════════
⌗ Tags: #owasp #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Narathama Firmansyah Putra
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 13:16:12 GMT
════════════════════════
⌗ Tags: #owasp #penetration_testing #cybersecurity
Medium
WSTG-CONF-06, WSTG-SESS-02, WSTG-SESS-06
Introduction Web server seperti Apache dan Nginx memiliki peran penting dalam menjalankan aplikasi web. Kesalahan konfigurasi pada web…
⤷ Title: Lo-Fi TryHackMe Writeup
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:23:06 GMT
════════════════════════
⌗ Tags: #lfi #tryhackme #tryhackme_walkthrough #file_inclusion #tryhackme_writeup
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:23:06 GMT
════════════════════════
⌗ Tags: #lfi #tryhackme #tryhackme_walkthrough #file_inclusion #tryhackme_writeup
Medium
Lo-Fi TryHackMe Writeup
Want to hear some lo-fi beats, to relax or study to? We’ve got you covered!
⤷ Title: W1seGuy TryHackMe Writeup
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:18:51 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cryptography #tryhackme_writeup #cybersecurity #tryhackme
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 14:18:51 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cryptography #tryhackme_writeup #cybersecurity #tryhackme
Medium
W1seGuy TryHackMe Writeup
A w1se guy 0nce said, the answer is usually as plain as day.
⤷ Title: THM Attacktive Directory Write-up
════════════════════════
𐀪 Author: dvdpl4y3r
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 13:53:18 GMT
════════════════════════
⌗ Tags: #attacktive_directory #active_directory #tryhackme #tryhackme_writeup
════════════════════════
𐀪 Author: dvdpl4y3r
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 13:53:18 GMT
════════════════════════
⌗ Tags: #attacktive_directory #active_directory #tryhackme #tryhackme_writeup
Medium
THM Attacktive Directory Write-up
TASK 1
⤷ Title: From Enumeration to Access: A Custom Wordlist RDP Attack Simulation
════════════════════════
𐀪 Author: Deadpool7
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:00:23 GMT
════════════════════════
⌗ Tags: #hashcat #penetration_testing #hacking #custom_wordlist #ethical_hacking
════════════════════════
𐀪 Author: Deadpool7
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:00:23 GMT
════════════════════════
⌗ Tags: #hashcat #penetration_testing #hacking #custom_wordlist #ethical_hacking
Medium
From Enumeration to Access: A Custom Wordlist RDP Attack Simulation
Introduction
⤷ Title: SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:36:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:36:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: ShinyHunters Claims Odido NL and Ben.nl Breach as Company Confirms Cyberattack
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:40:50 +0000
════════════════════════
⌗ Tags: #Data Breaches #Security #Cyber Attack #Cybersecurity #data breach #Netherlands #Odido #Privacy #ShinyHunters #Telecom
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:40:50 +0000
════════════════════════
⌗ Tags: #Data Breaches #Security #Cyber Attack #Cybersecurity #data breach #Netherlands #Odido #Privacy #ShinyHunters #Telecom
Hackread
ShinyHunters Claims Odido NL and Ben.nl Breach as Company Confirms Cyberattack
ShinyHunters claims 21M records stolen in Odido NL and Ben.nl breach as telecom confirms cyberattack impacting customer contact system data.
⤷ Title: Journey of my life
════════════════════════
𐀪 Author: Nakul
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:25:47 GMT
════════════════════════
⌗ Tags: #bug_bounty #beginners_guide #penetration_testing #ethical_hacking #hacking
════════════════════════
𐀪 Author: Nakul
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:25:47 GMT
════════════════════════
⌗ Tags: #bug_bounty #beginners_guide #penetration_testing #ethical_hacking #hacking
Medium
Journey of my life
I am a curious student who wants to break into penetration testing and bug bounty hunting. I have started learning from various sources…
⤷ Title: IDORs Explained: How One Number Can Hack an Entire Company
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:09:30 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking #cybersecurity
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:09:30 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking #cybersecurity
Medium
🔥 IDORs Explained: How One Number Can Hack an Entire Company
TL;DR: The Key Takeaways
⤷ Title: Pico CTF Web Exploitation Challenge 1 Easy Category [Crack The Gate 1]
════════════════════════
𐀪 Author: Devansh Patel
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:53:02 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #linux #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Devansh Patel
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:53:02 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #linux #cybersecurity #penetration_testing
Medium
Pico CTF Web Exploitation Challenge 1 Easy Category [Crack The Gate 1]
So guys this is V3n0mkai with the another writeup of the Pico CTF Web Exploitation Challenge 1 Easy Category [Crack The Gate 1]. This is…
⤷ Title: Bug Bounty 2026: 7 Brutal Truths Every Hunter Needs to Know Before Submitting Another Report
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:15:42 GMT
════════════════════════
⌗ Tags: #business #saas #earnings #bug_bounty #earn_money_online
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:15:42 GMT
════════════════════════
⌗ Tags: #business #saas #earnings #bug_bounty #earn_money_online
Medium
Bug Bounty 2026: 7 Brutal Truths Every Hunter Needs to Know Before Submitting Another Report
Bug Bounty 2026: 7 Brutal Truths Every Hunter Needs to Know Before Submitting Another Report Introduction: The Night Everything Changed Picture this: a security researcher spends three weeks mapping …
⤷ Title: OSINT Sock Puppets: Purpose, Risks & Ethics
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:59:01 GMT
════════════════════════
⌗ Tags: #bug_bounty #ctf #hacking #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:59:01 GMT
════════════════════════
⌗ Tags: #bug_bounty #ctf #hacking #cybersecurity #ethical_hacking
Medium
OSINT Sock Puppets: Purpose, Risks & Ethics
A sock puppet is a carefully constructed false online identity used by professionals in fields such as cybersecurity, OSINT investigations…
⤷ Title: Tales from Hobin: The M&S hacks of 2025
════════════════════════
𐀪 Author: Hobin Rood
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:26:01 GMT
════════════════════════
⌗ Tags: #education #cybersecurity #osint #hacking #technology
════════════════════════
𐀪 Author: Hobin Rood
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:26:01 GMT
════════════════════════
⌗ Tags: #education #cybersecurity #osint #hacking #technology
Medium
Tales from Hobin: The M&S hacks of 2025
M&S Hack: Social Engineering Meets Ransomware — Retail’s 2025 Nightmare Exposed
⤷ Title: Issue #3: Meet the Hackers Trying to Ruin Your Day — Cybercriminals & Nation-States
════════════════════════
𐀪 Author: Eric Gallagher
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:15:08 GMT
════════════════════════
⌗ Tags: #ai #hacking #cybercrime #software_development #cybersecurity
════════════════════════
𐀪 Author: Eric Gallagher
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:15:08 GMT
════════════════════════
⌗ Tags: #ai #hacking #cybercrime #software_development #cybersecurity
Medium
Issue #3: Meet the Hackers Trying to Ruin Your Day — Cybercriminals & Nation-States
Originally Published on LinkedIn: February 17, 2025
⤷ Title: Shodan-Cat:Maximizing Shodan Data Extraction Without API Credits
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:13:44 GMT
════════════════════════
⌗ Tags: #hacking #hacker #linux #s_h4ck13
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:13:44 GMT
════════════════════════
⌗ Tags: #hacking #hacker #linux #s_h4ck13
Medium
Shodan-Cat:Maximizing Shodan Data Extraction Without API Credits
If you don’t have a Shodan membership, this tool helps you maximize the number of IP addresses you can retrieve from Shodan.
⤷ Title: CRTA Certification Journey: Stepping Into Red Teaming
════════════════════════
𐀪 Author: Rakesh Elamaran
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:12:47 GMT
════════════════════════
⌗ Tags: #red_teaming #cybersecurity #infosec #technology #certification
════════════════════════
𐀪 Author: Rakesh Elamaran
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:12:47 GMT
════════════════════════
⌗ Tags: #red_teaming #cybersecurity #infosec #technology #certification
⤷ Title: Beyond the Click: Why Your MFA is Failing and the Rise of the Session Hijackers
════════════════════════
𐀪 Author: Ehulse
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:01:07 GMT
════════════════════════
⌗ Tags: #security #infosec #cybersecurity #incident_response
════════════════════════
𐀪 Author: Ehulse
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:01:07 GMT
════════════════════════
⌗ Tags: #security #infosec #cybersecurity #incident_response
Medium
Beyond the Click: Why Your MFA is Failing and the Rise of the Session Hijackers
Introduction: The MFA Security Paradox