⤷ Title: Breaking Authentication — Part 3
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:37:53 GMT
════════════════════════
⌗ Tags: #oauth2 #cybersecurity #security #bug_bounty #hacking
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:37:53 GMT
════════════════════════
⌗ Tags: #oauth2 #cybersecurity #security #bug_bounty #hacking
Medium
Breaking Authentication — Part 3
Breaking Authentication — Part 3
⤷ Title: My Complete Bug Bounty Hunting Workflow Every Command I Use, Step by Step
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:27:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #hacking #ethical_hacking
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:27:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #hacking #ethical_hacking
Medium
My Complete Bug Bounty Hunting Workflow Every Command I Use, Step by Step
From zero attack surface to critical vulnerability report the exact workflow I built as a beginner that still works today
⤷ Title: Encryption and Secure Data Management in iOS
════════════════════════
𐀪 Author: Gaye Uğur
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:33:21 GMT
════════════════════════
⌗ Tags: #ios_app_development #swift #application_security #ios #security
════════════════════════
𐀪 Author: Gaye Uğur
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:33:21 GMT
════════════════════════
⌗ Tags: #ios_app_development #swift #application_security #ios #security
Medium
Encryption and Secure Data Management in iOS
Core Concepts and Swift Examples with CryptoKit and CommonCrypto
⤷ Title: HackThisSite Basic Missions: A Pentester’s Walkthrough (Levels 1–11)
════════════════════════
𐀪 Author: AG_Notes
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:20:55 GMT
════════════════════════
⌗ Tags: #hacking #labs #web3 #interview #pentesting
════════════════════════
𐀪 Author: AG_Notes
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:20:55 GMT
════════════════════════
⌗ Tags: #hacking #labs #web3 #interview #pentesting
Medium
HackThisSite Basic Missions: A Pentester’s Walkthrough (Levels 1–11)
Hey hackers! Ready to test your skills?
⤷ Title: How a PS5 Controller Hijacked 7,000 Robot Vacuums
════════════════════════
𐀪 Author: Ship X/ TechX
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:15:25 GMT
════════════════════════
⌗ Tags: #software_engineering #programming #techx_official #hacking #robotics
════════════════════════
𐀪 Author: Ship X/ TechX
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:15:25 GMT
════════════════════════
⌗ Tags: #software_engineering #programming #techx_official #hacking #robotics
Medium
How a PS5 Controller Hijacked 7,000 Robot Vacuums
Let me paint a picture for you.
You’re a software engineer, it’s the weekend, and your brain is itching for a project.
You look across the…
You’re a software engineer, it’s the weekend, and your brain is itching for a project.
You look across the…
⤷ Title: HOW I GAINED FULL CONTROL OF A WEBSITE USING SQL INJECTION (Beginner Writeup)
════════════════════════
𐀪 Author: ANKUSH KUMAR TIWARI
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:20:04 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #sql_injection #ethical_hacking
════════════════════════
𐀪 Author: ANKUSH KUMAR TIWARI
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:20:04 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #sql_injection #ethical_hacking
Medium
HOW I GAINED FULL CONTROL OF A WEBSITE USING SQL INJECTION (Beginner Writeup)
WE SURF 100’S OF WEBSITE DAILY ,EITHER ITS FOR BLOG WRITING , SURFING SOCIAL MEDIA OR FOR WATCHING PIRATED MOVIES . THE INTERNET HOLDS…
⤷ Title: Slop Squatting…
════════════════════════
𐀪 Author: blackhatter
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:19:07 GMT
════════════════════════
⌗ Tags: #exploitation #hacking #cybersecurity #humor #slopsquatting
════════════════════════
𐀪 Author: blackhatter
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:19:07 GMT
════════════════════════
⌗ Tags: #exploitation #hacking #cybersecurity #humor #slopsquatting
Medium
Slop Squatting…
Slopsquatting is a clever (and unsettling) new cybersecurity threat that sits at the intersection of AI hallucinations and software supply…
⤷ Title: The Automation Paradox: You Spent $26 Million and Analysts Are Still Drowning
════════════════════════
𐀪 Author: Ehulse
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:11:01 GMT
════════════════════════
⌗ Tags: #automation #cybersecurity #infosec
════════════════════════
𐀪 Author: Ehulse
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:11:01 GMT
════════════════════════
⌗ Tags: #automation #cybersecurity #infosec
Medium
The Automation Paradox: You Spent $26 Million and Analysts Are Still Drowning
SOAR is officially in Gartner’s Trough of Disillusionment. The industry’s response? Rebrand SOAR as “AI SOC Analysts” and call it progress…
⤷ Title: Proving Grounds Twiggy: Backport
════════════════════════
𐀪 Author: Nicolas Garcia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #linux #red_team #ethical_hacking
════════════════════════
𐀪 Author: Nicolas Garcia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #linux #red_team #ethical_hacking
Medium
Proving Grounds Twiggy: Backport
Authentication Bypass
⤷ Title: El Diablo CTF Writeup— BitSkrieg CTF 2026
════════════════════════
𐀪 Author: Shoaib Bin Rashid
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:57:57 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #penetration_testing #ctf #reverse_engineering
════════════════════════
𐀪 Author: Shoaib Bin Rashid
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:57:57 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #penetration_testing #ctf #reverse_engineering
Medium
😈 El Diablo CTF Writeup— BitSkrieg CTF 2026
✍️ Author: Shoaib Bin Rashid | R3D_XplOiT
⤷ Title: CEH (Certified Ethical Hacking)-1
════════════════════════
𐀪 Author: Nomanjoyo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:10:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #ethical_hacking #che
════════════════════════
𐀪 Author: Nomanjoyo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:10:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #ethical_hacking #che
Medium
CEH (Certified Ethical Hacking)-1
Theory: Today I learned. Basics of cyber security just theory. like what is cyber security, cyber kill chain, types of attacks, how to…
⤷ Title: Linux Redirection Under the Hood: How the Shell Really Handles I/O
════════════════════════
𐀪 Author: MR.7
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:03:22 GMT
════════════════════════
⌗ Tags: #devops #linux #software_engineering #software_development #ethical_hacking
════════════════════════
𐀪 Author: MR.7
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:03:22 GMT
════════════════════════
⌗ Tags: #devops #linux #software_engineering #software_development #ethical_hacking
Medium
Linux Redirection Under the Hood: How the Shell Really Handles I/O
When you run a command in Linux, the program doesn’t magically “print to the screen.”
⤷ Title: Instalasi Kali Linux
════════════════════════
𐀪 Author: Arel Lioza Akhmad
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:29:19 GMT
════════════════════════
⌗ Tags: #untidar #ethical_hacking
════════════════════════
𐀪 Author: Arel Lioza Akhmad
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:29:19 GMT
════════════════════════
⌗ Tags: #untidar #ethical_hacking
Medium
Instalasi Kali Linux
Ethical Hacking
⤷ Title: Password Cracking Exposed: The Brute Force
Dictionary-Rainbow
════════════════════════
𐀪 Author: Felciaharini
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:12:19 GMT
════════════════════════
⌗ Tags: #cybercrime #ethical_hacking #cyberattack #password_security #cybersecurity
Dictionary-Rainbow
════════════════════════
𐀪 Author: Felciaharini
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 17:12:19 GMT
════════════════════════
⌗ Tags: #cybercrime #ethical_hacking #cyberattack #password_security #cybersecurity
Medium
Password Cracking Exposed: The Brute Force
Dictionary-Rainbow
Dictionary-Rainbow
Cybercriminals use three main techniques to crack your passwords: brute force attacks, dictionary attacks, and rainbow table attacks. Each…
⤷ Title: Reverse Shell Cheat Sheet (OSCP & CPTS Exam)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:48:51 GMT
════════════════════════
⌗ Tags: #vulnerability #oscp #cybersecurity #ethical_hacking #information_security
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:48:51 GMT
════════════════════════
⌗ Tags: #vulnerability #oscp #cybersecurity #ethical_hacking #information_security
Medium
🔥 Reverse Shell Cheat Sheet (OSCP & CPTS Exam)
By Cyber_Public_School | Cyber Security Researcher
⤷ Title: Username & Email Collision Leading to Account Lockout and identity collision☠️
════════════════════════
𐀪 Author: 0xMo7areb
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:01:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty_tips #writing_tips #bug_bounty_writeup #bug_bounty
════════════════════════
𐀪 Author: 0xMo7areb
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:01:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty_tips #writing_tips #bug_bounty_writeup #bug_bounty
Medium
Username & Email Collision Leading to Account Lockout and identity collision☠️
Who Am I: 0xMo7areb — a bug hunter and Penenteration Tester :)
⤷ Title: Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:30:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:30:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: New Aeternum C2 Botnet Evades Takedowns via Polygon Blockchain
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:08:19 +0000
════════════════════════
⌗ Tags: #Security #Blockchain #Malware #Aeternum C2 #Botnet #Cybersecurity #DDOS #Polygon #Qrator
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:08:19 +0000
════════════════════════
⌗ Tags: #Security #Blockchain #Malware #Aeternum C2 #Botnet #Cybersecurity #DDOS #Polygon #Qrator
Hackread
New Aeternum C2 Botnet Evades Takedowns via Polygon Blockchain
Follow us on all social media @Hackread
⤷ Title: Deprecating Yield DTF Batch Auctions: EasyAuction.sol Division-by-Zero
════════════════════════
𐀪 Author: Patrick Mckelvy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:07:42 GMT
════════════════════════
⌗ Tags: #bug_bounty #yield_dtf #reserve_protocol #bugs
════════════════════════
𐀪 Author: Patrick Mckelvy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:07:42 GMT
════════════════════════
⌗ Tags: #bug_bounty #yield_dtf #reserve_protocol #bugs
Medium
Deprecating Yield DTF Batch Auctions: EasyAuction.sol Division-by-Zero
Deprecating Yield DTF Batch Auctions: EasyAuction.sol Division-by-Zero Summary A whitehat security researcher GregoAI (@therealgregoAI) / X recently uncovered a vulnerability in the backup auction …
⤷ Title: The Era of Agentic Warfare
════════════════════════
𐀪 Author: Kawser Ayoub
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:21:05 GMT
════════════════════════
⌗ Tags: #security #artificial_intelligence #information_security #application_security #cyber_security_awareness
════════════════════════
𐀪 Author: Kawser Ayoub
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:21:05 GMT
════════════════════════
⌗ Tags: #security #artificial_intelligence #information_security #application_security #cyber_security_awareness
Medium
The Era of Agentic Warfare
The barrier between ”thinking” and ”doing” just disappeared.
⤷ Title: The Neuroscience of Cybercrime: What Makes a Hacker’s Mind Different?
════════════════════════
𐀪 Author: Prisha Patel
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:46:00 GMT
════════════════════════
⌗ Tags: #psychology #cybercrime #neuroscience #hacking #criminal_minds
════════════════════════
𐀪 Author: Prisha Patel
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:46:00 GMT
════════════════════════
⌗ Tags: #psychology #cybercrime #neuroscience #hacking #criminal_minds
Medium
The Neuroscience of Cybercrime: What Makes a Hacker’s Mind Different?
When people imagine a cybercriminal, they often picture a hooded figure typing in a dark room. But researchers in behavioral science and…