⤷ Title: Intermediate Nmap- TryHackMe challenege Walkthrough
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:29:17 GMT
════════════════════════
⌗ Tags: #nmap #tryhackme #cybersecurity #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:29:17 GMT
════════════════════════
⌗ Tags: #nmap #tryhackme #cybersecurity #tryhackme_walkthrough #tryhackme_writeup
Medium
Intermediate Nmap- TryHackMe challenege Walkthrough
Can you combine your great nmap skills with other tools to log in to this machine?
⤷ Title: Neighbour TryHackMe Writeup
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:26:12 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #idor #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:26:12 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #idor #cybersecurity #tryhackme_writeup
Medium
Neighbour TryHackMe Writeup
Check out our new cloud service, Authentication Anywhere. Can you find other user’s secrets?
⤷ Title: How to Pass CEH v13 (Theory + Practical) on Your First Attempt — A 6-Month Study Plan That Actually…
════════════════════════
𐀪 Author: Akash Madanu
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:16:41 GMT
════════════════════════
⌗ Tags: #che #ethical_hacking #information_security #certification #cybersecurity
════════════════════════
𐀪 Author: Akash Madanu
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:16:41 GMT
════════════════════════
⌗ Tags: #che #ethical_hacking #information_security #certification #cybersecurity
⤷ Title: Fake Avast Website Targets Users With €499 Phishing Refund Scam
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:18:11 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #avast #Cyber Attack #Cybersecurity #Fraud #Phishing #Scam
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:18:11 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #avast #Cyber Attack #Cybersecurity #Fraud #Phishing #Scam
Hackread
Fake Avast Website Targets Users With €499 Phishing Refund Scam
Follow us on all social media @Hackread
⤷ Title: Anatomy of a Cloud Native Attack: How We Pwned Kubernetes for $100k
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:29:23 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking #cybersecurity
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:29:23 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking #cybersecurity
Medium
💰 Anatomy of a Cloud Native Attack: How We Pwned Kubernetes for $100k
TL;DR: The Ultimate Cloud Hack Chain
⤷ Title: Breaking Authentication — Part 3
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:37:53 GMT
════════════════════════
⌗ Tags: #oauth2 #cybersecurity #security #bug_bounty #hacking
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:37:53 GMT
════════════════════════
⌗ Tags: #oauth2 #cybersecurity #security #bug_bounty #hacking
Medium
Breaking Authentication — Part 3
Breaking Authentication — Part 3
⤷ Title: My Complete Bug Bounty Hunting Workflow Every Command I Use, Step by Step
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:27:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #hacking #ethical_hacking
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:27:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #hacking #ethical_hacking
Medium
My Complete Bug Bounty Hunting Workflow Every Command I Use, Step by Step
From zero attack surface to critical vulnerability report the exact workflow I built as a beginner that still works today
⤷ Title: Encryption and Secure Data Management in iOS
════════════════════════
𐀪 Author: Gaye Uğur
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:33:21 GMT
════════════════════════
⌗ Tags: #ios_app_development #swift #application_security #ios #security
════════════════════════
𐀪 Author: Gaye Uğur
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:33:21 GMT
════════════════════════
⌗ Tags: #ios_app_development #swift #application_security #ios #security
Medium
Encryption and Secure Data Management in iOS
Core Concepts and Swift Examples with CryptoKit and CommonCrypto
⤷ Title: HackThisSite Basic Missions: A Pentester’s Walkthrough (Levels 1–11)
════════════════════════
𐀪 Author: AG_Notes
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:20:55 GMT
════════════════════════
⌗ Tags: #hacking #labs #web3 #interview #pentesting
════════════════════════
𐀪 Author: AG_Notes
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:20:55 GMT
════════════════════════
⌗ Tags: #hacking #labs #web3 #interview #pentesting
Medium
HackThisSite Basic Missions: A Pentester’s Walkthrough (Levels 1–11)
Hey hackers! Ready to test your skills?
⤷ Title: How a PS5 Controller Hijacked 7,000 Robot Vacuums
════════════════════════
𐀪 Author: Ship X/ TechX
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:15:25 GMT
════════════════════════
⌗ Tags: #software_engineering #programming #techx_official #hacking #robotics
════════════════════════
𐀪 Author: Ship X/ TechX
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:15:25 GMT
════════════════════════
⌗ Tags: #software_engineering #programming #techx_official #hacking #robotics
Medium
How a PS5 Controller Hijacked 7,000 Robot Vacuums
Let me paint a picture for you.
You’re a software engineer, it’s the weekend, and your brain is itching for a project.
You look across the…
You’re a software engineer, it’s the weekend, and your brain is itching for a project.
You look across the…
⤷ Title: HOW I GAINED FULL CONTROL OF A WEBSITE USING SQL INJECTION (Beginner Writeup)
════════════════════════
𐀪 Author: ANKUSH KUMAR TIWARI
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:20:04 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #sql_injection #ethical_hacking
════════════════════════
𐀪 Author: ANKUSH KUMAR TIWARI
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:20:04 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #sql_injection #ethical_hacking
Medium
HOW I GAINED FULL CONTROL OF A WEBSITE USING SQL INJECTION (Beginner Writeup)
WE SURF 100’S OF WEBSITE DAILY ,EITHER ITS FOR BLOG WRITING , SURFING SOCIAL MEDIA OR FOR WATCHING PIRATED MOVIES . THE INTERNET HOLDS…
⤷ Title: Slop Squatting…
════════════════════════
𐀪 Author: blackhatter
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:19:07 GMT
════════════════════════
⌗ Tags: #exploitation #hacking #cybersecurity #humor #slopsquatting
════════════════════════
𐀪 Author: blackhatter
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:19:07 GMT
════════════════════════
⌗ Tags: #exploitation #hacking #cybersecurity #humor #slopsquatting
Medium
Slop Squatting…
Slopsquatting is a clever (and unsettling) new cybersecurity threat that sits at the intersection of AI hallucinations and software supply…
⤷ Title: The Automation Paradox: You Spent $26 Million and Analysts Are Still Drowning
════════════════════════
𐀪 Author: Ehulse
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:11:01 GMT
════════════════════════
⌗ Tags: #automation #cybersecurity #infosec
════════════════════════
𐀪 Author: Ehulse
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:11:01 GMT
════════════════════════
⌗ Tags: #automation #cybersecurity #infosec
Medium
The Automation Paradox: You Spent $26 Million and Analysts Are Still Drowning
SOAR is officially in Gartner’s Trough of Disillusionment. The industry’s response? Rebrand SOAR as “AI SOC Analysts” and call it progress…
⤷ Title: Proving Grounds Twiggy: Backport
════════════════════════
𐀪 Author: Nicolas Garcia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #linux #red_team #ethical_hacking
════════════════════════
𐀪 Author: Nicolas Garcia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #linux #red_team #ethical_hacking
Medium
Proving Grounds Twiggy: Backport
Authentication Bypass
⤷ Title: El Diablo CTF Writeup— BitSkrieg CTF 2026
════════════════════════
𐀪 Author: Shoaib Bin Rashid
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:57:57 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #penetration_testing #ctf #reverse_engineering
════════════════════════
𐀪 Author: Shoaib Bin Rashid
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:57:57 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #penetration_testing #ctf #reverse_engineering
Medium
😈 El Diablo CTF Writeup— BitSkrieg CTF 2026
✍️ Author: Shoaib Bin Rashid | R3D_XplOiT
⤷ Title: CEH (Certified Ethical Hacking)-1
════════════════════════
𐀪 Author: Nomanjoyo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:10:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #ethical_hacking #che
════════════════════════
𐀪 Author: Nomanjoyo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:10:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #ethical_hacking #che
Medium
CEH (Certified Ethical Hacking)-1
Theory: Today I learned. Basics of cyber security just theory. like what is cyber security, cyber kill chain, types of attacks, how to…
⤷ Title: Linux Redirection Under the Hood: How the Shell Really Handles I/O
════════════════════════
𐀪 Author: MR.7
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:03:22 GMT
════════════════════════
⌗ Tags: #devops #linux #software_engineering #software_development #ethical_hacking
════════════════════════
𐀪 Author: MR.7
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:03:22 GMT
════════════════════════
⌗ Tags: #devops #linux #software_engineering #software_development #ethical_hacking
Medium
Linux Redirection Under the Hood: How the Shell Really Handles I/O
When you run a command in Linux, the program doesn’t magically “print to the screen.”
⤷ Title: Instalasi Kali Linux
════════════════════════
𐀪 Author: Arel Lioza Akhmad
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:29:19 GMT
════════════════════════
⌗ Tags: #untidar #ethical_hacking
════════════════════════
𐀪 Author: Arel Lioza Akhmad
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:29:19 GMT
════════════════════════
⌗ Tags: #untidar #ethical_hacking
Medium
Instalasi Kali Linux
Ethical Hacking
⤷ Title: Password Cracking Exposed: The Brute Force
Dictionary-Rainbow
════════════════════════
𐀪 Author: Felciaharini
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:12:19 GMT
════════════════════════
⌗ Tags: #cybercrime #ethical_hacking #cyberattack #password_security #cybersecurity
Dictionary-Rainbow
════════════════════════
𐀪 Author: Felciaharini
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:12:19 GMT
════════════════════════
⌗ Tags: #cybercrime #ethical_hacking #cyberattack #password_security #cybersecurity
Medium
Password Cracking Exposed: The Brute Force
Dictionary-Rainbow
Dictionary-Rainbow
Cybercriminals use three main techniques to crack your passwords: brute force attacks, dictionary attacks, and rainbow table attacks. Each…
⤷ Title: Reverse Shell Cheat Sheet (OSCP & CPTS Exam)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:48:51 GMT
════════════════════════
⌗ Tags: #vulnerability #oscp #cybersecurity #ethical_hacking #information_security
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:48:51 GMT
════════════════════════
⌗ Tags: #vulnerability #oscp #cybersecurity #ethical_hacking #information_security
Medium
🔥 Reverse Shell Cheat Sheet (OSCP & CPTS Exam)
By Cyber_Public_School | Cyber Security Researcher
⤷ Title: Username & Email Collision Leading to Account Lockout and identity collision☠️
════════════════════════
𐀪 Author: 0xMo7areb
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:01:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty_tips #writing_tips #bug_bounty_writeup #bug_bounty
════════════════════════
𐀪 Author: 0xMo7areb
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:01:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty_tips #writing_tips #bug_bounty_writeup #bug_bounty
Medium
Username & Email Collision Leading to Account Lockout and identity collision☠️
Who Am I: 0xMo7areb — a bug hunter and Penenteration Tester :)