⤷ Title: HTB — Soulmate(Linux)
════════════════════════
𐀪 Author: 6cloudguy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:29:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox_writeup #hacking #hackthebox
════════════════════════
𐀪 Author: 6cloudguy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:29:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox_writeup #hacking #hackthebox
Medium
HTB — Soulmate(Linux)
As my first writeup in medium, I have decided to go with the box Soulmate. I hope it will be a nice start. Now, lets do this without…
⤷ Title: Penetration Testing Report for ClientWriting
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:50:56 GMT
════════════════════════
⌗ Tags: #penetration_testing #pentest_report #client_pentest_report
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:50:56 GMT
════════════════════════
⌗ Tags: #penetration_testing #pentest_report #client_pentest_report
Medium
Penetration Testing Report for ClientWriting
Simulated Client Scenario
⤷ Title: What is OAuth vulnerability?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:32:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #oauth_vulnerabilities #penetration_testing #binaryshield
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:32:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #oauth_vulnerabilities #penetration_testing #binaryshield
Medium
What is OAuth vulnerability?
1. What it is (very simple, no jargon)
⤷ Title: What is SSRF (server-side request forgery)?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:31:55 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #ssrf #ethical_hacking #binaryshield
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:31:55 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #ssrf #ethical_hacking #binaryshield
Medium
What is SSRF (server-side request forgery)?
1. What it is (very simple definition)
⤷ Title: From Zero to Root: A Complete HackMyVM “yuan111” Walkthrough (LFI, SSH & Privilege Escalation)
════════════════════════
𐀪 Author: SWALE
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:47:45 GMT
════════════════════════
⌗ Tags: #linux #cybersecurity #ctf #penetration_testing
════════════════════════
𐀪 Author: SWALE
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:47:45 GMT
════════════════════════
⌗ Tags: #linux #cybersecurity #ctf #penetration_testing
Medium
From Zero to Root: A Complete HackMyVM “yuan111” Walkthrough (LFI, SSH & Privilege Escalation)
Penetration testing is rarely about exploiting the fanciest vulnerability. More often, it’s about patience, enumeration, and understanding…
⤷ Title: Intermediate Nmap- TryHackMe challenege Walkthrough
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:29:17 GMT
════════════════════════
⌗ Tags: #nmap #tryhackme #cybersecurity #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:29:17 GMT
════════════════════════
⌗ Tags: #nmap #tryhackme #cybersecurity #tryhackme_walkthrough #tryhackme_writeup
Medium
Intermediate Nmap- TryHackMe challenege Walkthrough
Can you combine your great nmap skills with other tools to log in to this machine?
⤷ Title: Neighbour TryHackMe Writeup
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:26:12 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #idor #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:26:12 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #idor #cybersecurity #tryhackme_writeup
Medium
Neighbour TryHackMe Writeup
Check out our new cloud service, Authentication Anywhere. Can you find other user’s secrets?
⤷ Title: How to Pass CEH v13 (Theory + Practical) on Your First Attempt — A 6-Month Study Plan That Actually…
════════════════════════
𐀪 Author: Akash Madanu
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:16:41 GMT
════════════════════════
⌗ Tags: #che #ethical_hacking #information_security #certification #cybersecurity
════════════════════════
𐀪 Author: Akash Madanu
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:16:41 GMT
════════════════════════
⌗ Tags: #che #ethical_hacking #information_security #certification #cybersecurity
⤷ Title: Fake Avast Website Targets Users With €499 Phishing Refund Scam
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:18:11 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #avast #Cyber Attack #Cybersecurity #Fraud #Phishing #Scam
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:18:11 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #avast #Cyber Attack #Cybersecurity #Fraud #Phishing #Scam
Hackread
Fake Avast Website Targets Users With €499 Phishing Refund Scam
Follow us on all social media @Hackread
⤷ Title: Anatomy of a Cloud Native Attack: How We Pwned Kubernetes for $100k
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:29:23 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking #cybersecurity
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:29:23 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking #cybersecurity
Medium
💰 Anatomy of a Cloud Native Attack: How We Pwned Kubernetes for $100k
TL;DR: The Ultimate Cloud Hack Chain
⤷ Title: Breaking Authentication — Part 3
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:37:53 GMT
════════════════════════
⌗ Tags: #oauth2 #cybersecurity #security #bug_bounty #hacking
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:37:53 GMT
════════════════════════
⌗ Tags: #oauth2 #cybersecurity #security #bug_bounty #hacking
Medium
Breaking Authentication — Part 3
Breaking Authentication — Part 3
⤷ Title: My Complete Bug Bounty Hunting Workflow Every Command I Use, Step by Step
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:27:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #hacking #ethical_hacking
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:27:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #hacking #ethical_hacking
Medium
My Complete Bug Bounty Hunting Workflow Every Command I Use, Step by Step
From zero attack surface to critical vulnerability report the exact workflow I built as a beginner that still works today
⤷ Title: Encryption and Secure Data Management in iOS
════════════════════════
𐀪 Author: Gaye Uğur
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:33:21 GMT
════════════════════════
⌗ Tags: #ios_app_development #swift #application_security #ios #security
════════════════════════
𐀪 Author: Gaye Uğur
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:33:21 GMT
════════════════════════
⌗ Tags: #ios_app_development #swift #application_security #ios #security
Medium
Encryption and Secure Data Management in iOS
Core Concepts and Swift Examples with CryptoKit and CommonCrypto
⤷ Title: HackThisSite Basic Missions: A Pentester’s Walkthrough (Levels 1–11)
════════════════════════
𐀪 Author: AG_Notes
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:20:55 GMT
════════════════════════
⌗ Tags: #hacking #labs #web3 #interview #pentesting
════════════════════════
𐀪 Author: AG_Notes
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:20:55 GMT
════════════════════════
⌗ Tags: #hacking #labs #web3 #interview #pentesting
Medium
HackThisSite Basic Missions: A Pentester’s Walkthrough (Levels 1–11)
Hey hackers! Ready to test your skills?
⤷ Title: How a PS5 Controller Hijacked 7,000 Robot Vacuums
════════════════════════
𐀪 Author: Ship X/ TechX
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:15:25 GMT
════════════════════════
⌗ Tags: #software_engineering #programming #techx_official #hacking #robotics
════════════════════════
𐀪 Author: Ship X/ TechX
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:15:25 GMT
════════════════════════
⌗ Tags: #software_engineering #programming #techx_official #hacking #robotics
Medium
How a PS5 Controller Hijacked 7,000 Robot Vacuums
Let me paint a picture for you.
You’re a software engineer, it’s the weekend, and your brain is itching for a project.
You look across the…
You’re a software engineer, it’s the weekend, and your brain is itching for a project.
You look across the…
⤷ Title: HOW I GAINED FULL CONTROL OF A WEBSITE USING SQL INJECTION (Beginner Writeup)
════════════════════════
𐀪 Author: ANKUSH KUMAR TIWARI
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:20:04 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #sql_injection #ethical_hacking
════════════════════════
𐀪 Author: ANKUSH KUMAR TIWARI
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:20:04 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #sql_injection #ethical_hacking
Medium
HOW I GAINED FULL CONTROL OF A WEBSITE USING SQL INJECTION (Beginner Writeup)
WE SURF 100’S OF WEBSITE DAILY ,EITHER ITS FOR BLOG WRITING , SURFING SOCIAL MEDIA OR FOR WATCHING PIRATED MOVIES . THE INTERNET HOLDS…
⤷ Title: Slop Squatting…
════════════════════════
𐀪 Author: blackhatter
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:19:07 GMT
════════════════════════
⌗ Tags: #exploitation #hacking #cybersecurity #humor #slopsquatting
════════════════════════
𐀪 Author: blackhatter
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:19:07 GMT
════════════════════════
⌗ Tags: #exploitation #hacking #cybersecurity #humor #slopsquatting
Medium
Slop Squatting…
Slopsquatting is a clever (and unsettling) new cybersecurity threat that sits at the intersection of AI hallucinations and software supply…
⤷ Title: The Automation Paradox: You Spent $26 Million and Analysts Are Still Drowning
════════════════════════
𐀪 Author: Ehulse
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:11:01 GMT
════════════════════════
⌗ Tags: #automation #cybersecurity #infosec
════════════════════════
𐀪 Author: Ehulse
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:11:01 GMT
════════════════════════
⌗ Tags: #automation #cybersecurity #infosec
Medium
The Automation Paradox: You Spent $26 Million and Analysts Are Still Drowning
SOAR is officially in Gartner’s Trough of Disillusionment. The industry’s response? Rebrand SOAR as “AI SOC Analysts” and call it progress…
⤷ Title: Proving Grounds Twiggy: Backport
════════════════════════
𐀪 Author: Nicolas Garcia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #linux #red_team #ethical_hacking
════════════════════════
𐀪 Author: Nicolas Garcia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #linux #red_team #ethical_hacking
Medium
Proving Grounds Twiggy: Backport
Authentication Bypass
⤷ Title: El Diablo CTF Writeup— BitSkrieg CTF 2026
════════════════════════
𐀪 Author: Shoaib Bin Rashid
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:57:57 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #penetration_testing #ctf #reverse_engineering
════════════════════════
𐀪 Author: Shoaib Bin Rashid
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:57:57 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #penetration_testing #ctf #reverse_engineering
Medium
😈 El Diablo CTF Writeup— BitSkrieg CTF 2026
✍️ Author: Shoaib Bin Rashid | R3D_XplOiT
⤷ Title: CEH (Certified Ethical Hacking)-1
════════════════════════
𐀪 Author: Nomanjoyo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:10:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #ethical_hacking #che
════════════════════════
𐀪 Author: Nomanjoyo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:10:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #ethical_hacking #che
Medium
CEH (Certified Ethical Hacking)-1
Theory: Today I learned. Basics of cyber security just theory. like what is cyber security, cyber kill chain, types of attacks, how to…