⤷ Title: The Worst Wi-Fi Security Advice I Found on Facebook (And Why It’s a Hacker’s Dream)
════════════════════════
𐀪 Author: freerave
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:01:00 GMT
════════════════════════
⌗ Tags: #infosec #technology #cybersecurity #network_security #ethical_hacking
════════════════════════
𐀪 Author: freerave
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:01:00 GMT
════════════════════════
⌗ Tags: #infosec #technology #cybersecurity #network_security #ethical_hacking
Medium
The Worst Wi-Fi Security Advice I Found on Facebook (And Why It’s a Hacker’s Dream)
Why hiding your network and using MAC filtering in 2026 is basically leaving your front door wide open.
⤷ Title: TryHackMe— Linux Strength Training
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:32:04 GMT
════════════════════════
⌗ Tags: #writeup #tryhackme_writeup #tryhackme #ctf_writeup
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:32:04 GMT
════════════════════════
⌗ Tags: #writeup #tryhackme_writeup #tryhackme #ctf_writeup
Medium
TryHackMe— Linux Strength Training
Task 1: Introduction of the room.
Task 2:
Task 2:
⤷ Title: Anonymous — TryHackMe Writeup
════════════════════════
𐀪 Author: Hemantha Krishna Challa
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:24:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #tryhackme_walkthrough #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: Hemantha Krishna Challa
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:24:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #tryhackme_walkthrough #tryhackme_writeup #tryhackme
Medium
Anonymous — TryHackMe Writeup
This room is a classic boot-to-root challenge designed for beginners to practice enumeration, exploiting misconfigured services, and…
⤷ Title: TryHackMe — TakeOver
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:06:10 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #writeup
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:06:10 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #writeup
Medium
TryHackMe — TakeOver
Task 1: Help Us
⤷ Title: Lab: Reflected XSS into a JavaScript string with angle brackets HTML encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:16 GMT
════════════════════════
⌗ Tags: #ctf #xss_attack #hacking #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:16 GMT
════════════════════════
⌗ Tags: #ctf #xss_attack #hacking #bug_bounty #cybersecurity
Medium
Lab: Reflected XSS into a JavaScript string with angle brackets HTML encoded
Lab Overview
⤷ Title: Compile-Time XOR String Encryption
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:48:19 GMT
════════════════════════
⌗ Tags: #hackthebox #programming #reverse_engineering #hacking #malware
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:48:19 GMT
════════════════════════
⌗ Tags: #hackthebox #programming #reverse_engineering #hacking #malware
Medium
Compile-Time XOR String Encryption
Welcome to this new Medium post. In this one, I just created a compile-time XOR string encryption implementation in C++ that hides string…
⤷ Title: Hack The Box vs CRTP: Which One Is Actually Better?
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:31:59 GMT
════════════════════════
⌗ Tags: #pentesting #htb #crt_p #hacking #windows
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:31:59 GMT
════════════════════════
⌗ Tags: #pentesting #htb #crt_p #hacking #windows
Medium
Hack The Box vs CRTP: Which One Is Actually Better?
And do these certs even work?
⤷ Title: Pen-testing a Prod H3C Private Environment in 2026: Complete Redacted Findings & Pentester Playbook
════════════════════════
𐀪 Author: suicidal_teddy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:53 GMT
════════════════════════
⌗ Tags: #hacking #writeup #bug_bounty_writeup #ctf_writeup #h3c
════════════════════════
𐀪 Author: suicidal_teddy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:53 GMT
════════════════════════
⌗ Tags: #hacking #writeup #bug_bounty_writeup #ctf_writeup #h3c
Medium
Pen-testing a Prod H3C Private Environment in 2026: Complete Redacted Findings & Pentester Playbook
Every vulnerability was discovered during an authorized internal assessment of a modern H3C CAS deployment on UniServer hardware with…
⤷ Title: TryHackMe | Offensive Security Intro | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:42:11 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #tryhackme #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:42:11 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #tryhackme #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
Medium
TryHackMe | Offensive Security Intro | WriteUp
Hack your first website (legally in a safe environment) and experience an ethical hacker’s job.
⤷ Title: HackTheBox | Redeemer | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:41:42 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #htb #hackthebox_writeup #hackthebox #ctf
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:41:42 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #htb #hackthebox_writeup #hackthebox #ctf
Medium
HackTheBox | Redeemer | WriteUp
Disclaimer: This writeup is based on a Capture The Flag (CTF) challenge hosted on HackTheBox and it is intended for educational purposes…
⤷ Title: The 50,000-Download Trap: How ‘ambar-src’ Typosquatting Compromised Windows, Linux, and macOS Devs
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:30 +0000
════════════════════════
⌗ Tags: #Malware #ambar_src #Apfell malware #infosec #JavaScript Security #Malicious packages #npm malware #reverse shell #supply chain attack #Tenable Research #Typosquatting
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:30 +0000
════════════════════════
⌗ Tags: #Malware #ambar_src #Apfell malware #infosec #JavaScript Security #Malicious packages #npm malware #reverse shell #supply chain attack #Tenable Research #Typosquatting
Daily CyberSecurity
The 50,000-Download Trap: How 'ambar-src' Typosquatting Compromised Windows, Linux, and macOS Devs
Tenable uncovers "ambar-src," a malicious npm package mimicking "ember-source." It uses preinstall noscripts to deploy reverse shells and Apfell malware.
⤷ Title: The Interview Trap: Malicious Next.js Repositories Weaponize Coding Tests to Hack Developers
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:54 +0000
════════════════════════
⌗ Tags: #Cybercriminals #developer security #infosec #malware #Microsoft Defender #Next.js #npm Security #social engineering #supply chain attack #Technical Interview Scam #VS Code Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:54 +0000
════════════════════════
⌗ Tags: #Cybercriminals #developer security #infosec #malware #Microsoft Defender #Next.js #npm Security #social engineering #supply chain attack #Technical Interview Scam #VS Code Security
Daily CyberSecurity
The Interview Trap: Malicious Next.js Repositories Weaponize Coding Tests to Hack Developers
Microsoft warns of a new campaign targeting engineers via fake Next.js technical assessments. Malware hides in VS Code tasks and npm noscripts to steal secrets.
⤷ Title: Guía de Netcat para Pentesting: Comandos, Reverse Shells y Exfiltración
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #networking #technology #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #networking #technology #cybersecurity #penetration_testing
Medium
Guía de Netcat para Pentesting: Comandos, Reverse Shells y Exfiltración
Domina Netcat para Bug Hunting: desde banners y transferencia de archivos hasta reverse shells y evasión de firewalls.
⤷ Title: Exploiting HTTP request smuggling to bypass front-end security controls, CL.TE vulnerability
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #penetration_testing #pentesting #burpsuite
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #penetration_testing #pentesting #burpsuite
Medium
Exploiting HTTP request smuggling to bypass front-end security controls, CL.TE vulnerability
This writeup demonstrates how to exploit a CL.TE HTTP request smuggling vulnerability to bypass front-end security controls. The…
⤷ Title: Cryptography and Cryptanalysis
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:01:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #cryptography #cybersecurity #cryptography_series #cryptanalysis
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:01:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #cryptography #cybersecurity #cryptography_series #cryptanalysis
Medium
Cryptography and Cryptanalysis
Cryptography in Details Part 2
⤷ Title: Introducing CYBERDUDEBIVASH® Auth Bypass Tester — Premium Edition v1.0.0:
════════════════════════
𐀪 Author: CYBERDUDEBIVASH PVT LTD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 22:58:22 GMT
════════════════════════
⌗ Tags: #cyberdudebivash #auth_bypass #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: CYBERDUDEBIVASH PVT LTD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 22:58:22 GMT
════════════════════════
⌗ Tags: #cyberdudebivash #auth_bypass #cybersecurity #penetration_testing
Medium
Introducing CYBERDUDEBIVASH® Auth Bypass Tester — Premium Edition v1.0.0:
Daily Threat Intel by CyberDudeBivash
Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks.
Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks.
⤷ Title: CTF Game Zone | TryHackMe
════════════════════════
𐀪 Author: Henrique
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:57:17 GMT
════════════════════════
⌗ Tags: #offensive_security #ctf #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: Henrique
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:57:17 GMT
════════════════════════
⌗ Tags: #offensive_security #ctf #tryhackme #tryhackme_walkthrough
Medium
CTF Game Zone | TryHackMe
Máquina: Game Zone Dificuldade: Fácil Plataforma: TryHackMe
⤷ Title: Day 13 : Wordpress HTB room
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:14:49 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #wordpress #pentesting #cybersecurity
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:14:49 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #wordpress #pentesting #cybersecurity
Medium
Day 13 : Wordpress HTB room
Wordpress is the world’s most widely used open-source Content Management System (CMS), powering nearly 40% of all websites. Its flexibility…
⤷ Title: Walkthrough: Web Application Attacks - XSS, SQL Injections, Directory Traversals, and File…
════════════════════════
𐀪 Author: Daryl Brooks
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:44:16 GMT
════════════════════════
⌗ Tags: #stored_xss #local_file_inclusion #sql_injection #directory_traversal #reflected_xss
════════════════════════
𐀪 Author: Daryl Brooks
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:44:16 GMT
════════════════════════
⌗ Tags: #stored_xss #local_file_inclusion #sql_injection #directory_traversal #reflected_xss
Medium
Walkthrough: Web Application Attacks - XSS, SQL Injections, Directory Traversals, and File…
In this project, I discuss and demonstrate a variety of web‑based cyberattacks. To do so, I take on the role of a malicious actor and…
⤷ Title: Fileless Malware Execution Using LOLBins: A Controlled Lab Demonstration
════════════════════════
𐀪 Author: شاہ میر عمران مغل
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:23:18 GMT
════════════════════════
⌗ Tags: #offensive_security #defensive_security #cybersecurity #cybersecurity_awareness #hacking
════════════════════════
𐀪 Author: شاہ میر عمران مغل
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:23:18 GMT
════════════════════════
⌗ Tags: #offensive_security #defensive_security #cybersecurity #cybersecurity_awareness #hacking
Medium
Fileless Malware Execution Using LOLBins: A Controlled Lab Demonstration
Executive Summary
⤷ Title: Most Pentest Reports Answer the Wrong Questions for the Wrong People
════════════════════════
𐀪 Author: Louis Sanchez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:14:40 GMT
════════════════════════
⌗ Tags: #cyber_risk_management #business_strategy #soc2 #penetration_testing #pci_dss
════════════════════════
𐀪 Author: Louis Sanchez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:14:40 GMT
════════════════════════
⌗ Tags: #cyber_risk_management #business_strategy #soc2 #penetration_testing #pci_dss
Medium
Most Pentest Reports Answer the Wrong Questions for the Wrong People
I’ve reviewed hundreds of other vendor penetration reports. Most fail not because the technical work was bad, but because they don’t answer…