⤷ Title: TryHackMe — TakeOver
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:06:10 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #writeup
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:06:10 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #writeup
Medium
TryHackMe — TakeOver
Task 1: Help Us
⤷ Title: Lab: Reflected XSS into a JavaScript string with angle brackets HTML encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:16 GMT
════════════════════════
⌗ Tags: #ctf #xss_attack #hacking #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:16 GMT
════════════════════════
⌗ Tags: #ctf #xss_attack #hacking #bug_bounty #cybersecurity
Medium
Lab: Reflected XSS into a JavaScript string with angle brackets HTML encoded
Lab Overview
⤷ Title: Compile-Time XOR String Encryption
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:48:19 GMT
════════════════════════
⌗ Tags: #hackthebox #programming #reverse_engineering #hacking #malware
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:48:19 GMT
════════════════════════
⌗ Tags: #hackthebox #programming #reverse_engineering #hacking #malware
Medium
Compile-Time XOR String Encryption
Welcome to this new Medium post. In this one, I just created a compile-time XOR string encryption implementation in C++ that hides string…
⤷ Title: Hack The Box vs CRTP: Which One Is Actually Better?
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:31:59 GMT
════════════════════════
⌗ Tags: #pentesting #htb #crt_p #hacking #windows
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:31:59 GMT
════════════════════════
⌗ Tags: #pentesting #htb #crt_p #hacking #windows
Medium
Hack The Box vs CRTP: Which One Is Actually Better?
And do these certs even work?
⤷ Title: Pen-testing a Prod H3C Private Environment in 2026: Complete Redacted Findings & Pentester Playbook
════════════════════════
𐀪 Author: suicidal_teddy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:53 GMT
════════════════════════
⌗ Tags: #hacking #writeup #bug_bounty_writeup #ctf_writeup #h3c
════════════════════════
𐀪 Author: suicidal_teddy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:53 GMT
════════════════════════
⌗ Tags: #hacking #writeup #bug_bounty_writeup #ctf_writeup #h3c
Medium
Pen-testing a Prod H3C Private Environment in 2026: Complete Redacted Findings & Pentester Playbook
Every vulnerability was discovered during an authorized internal assessment of a modern H3C CAS deployment on UniServer hardware with…
⤷ Title: TryHackMe | Offensive Security Intro | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:42:11 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #tryhackme #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:42:11 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #tryhackme #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
Medium
TryHackMe | Offensive Security Intro | WriteUp
Hack your first website (legally in a safe environment) and experience an ethical hacker’s job.
⤷ Title: HackTheBox | Redeemer | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:41:42 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #htb #hackthebox_writeup #hackthebox #ctf
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:41:42 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #htb #hackthebox_writeup #hackthebox #ctf
Medium
HackTheBox | Redeemer | WriteUp
Disclaimer: This writeup is based on a Capture The Flag (CTF) challenge hosted on HackTheBox and it is intended for educational purposes…
⤷ Title: The 50,000-Download Trap: How ‘ambar-src’ Typosquatting Compromised Windows, Linux, and macOS Devs
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:30 +0000
════════════════════════
⌗ Tags: #Malware #ambar_src #Apfell malware #infosec #JavaScript Security #Malicious packages #npm malware #reverse shell #supply chain attack #Tenable Research #Typosquatting
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:30 +0000
════════════════════════
⌗ Tags: #Malware #ambar_src #Apfell malware #infosec #JavaScript Security #Malicious packages #npm malware #reverse shell #supply chain attack #Tenable Research #Typosquatting
Daily CyberSecurity
The 50,000-Download Trap: How 'ambar-src' Typosquatting Compromised Windows, Linux, and macOS Devs
Tenable uncovers "ambar-src," a malicious npm package mimicking "ember-source." It uses preinstall noscripts to deploy reverse shells and Apfell malware.
⤷ Title: The Interview Trap: Malicious Next.js Repositories Weaponize Coding Tests to Hack Developers
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:54 +0000
════════════════════════
⌗ Tags: #Cybercriminals #developer security #infosec #malware #Microsoft Defender #Next.js #npm Security #social engineering #supply chain attack #Technical Interview Scam #VS Code Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:54 +0000
════════════════════════
⌗ Tags: #Cybercriminals #developer security #infosec #malware #Microsoft Defender #Next.js #npm Security #social engineering #supply chain attack #Technical Interview Scam #VS Code Security
Daily CyberSecurity
The Interview Trap: Malicious Next.js Repositories Weaponize Coding Tests to Hack Developers
Microsoft warns of a new campaign targeting engineers via fake Next.js technical assessments. Malware hides in VS Code tasks and npm noscripts to steal secrets.
⤷ Title: Guía de Netcat para Pentesting: Comandos, Reverse Shells y Exfiltración
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #networking #technology #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #networking #technology #cybersecurity #penetration_testing
Medium
Guía de Netcat para Pentesting: Comandos, Reverse Shells y Exfiltración
Domina Netcat para Bug Hunting: desde banners y transferencia de archivos hasta reverse shells y evasión de firewalls.
⤷ Title: Exploiting HTTP request smuggling to bypass front-end security controls, CL.TE vulnerability
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #penetration_testing #pentesting #burpsuite
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #penetration_testing #pentesting #burpsuite
Medium
Exploiting HTTP request smuggling to bypass front-end security controls, CL.TE vulnerability
This writeup demonstrates how to exploit a CL.TE HTTP request smuggling vulnerability to bypass front-end security controls. The…
⤷ Title: Cryptography and Cryptanalysis
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:01:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #cryptography #cybersecurity #cryptography_series #cryptanalysis
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:01:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #cryptography #cybersecurity #cryptography_series #cryptanalysis
Medium
Cryptography and Cryptanalysis
Cryptography in Details Part 2
⤷ Title: Introducing CYBERDUDEBIVASH® Auth Bypass Tester — Premium Edition v1.0.0:
════════════════════════
𐀪 Author: CYBERDUDEBIVASH PVT LTD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 22:58:22 GMT
════════════════════════
⌗ Tags: #cyberdudebivash #auth_bypass #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: CYBERDUDEBIVASH PVT LTD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 22:58:22 GMT
════════════════════════
⌗ Tags: #cyberdudebivash #auth_bypass #cybersecurity #penetration_testing
Medium
Introducing CYBERDUDEBIVASH® Auth Bypass Tester — Premium Edition v1.0.0:
Daily Threat Intel by CyberDudeBivash
Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks.
Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks.
⤷ Title: CTF Game Zone | TryHackMe
════════════════════════
𐀪 Author: Henrique
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:57:17 GMT
════════════════════════
⌗ Tags: #offensive_security #ctf #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: Henrique
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:57:17 GMT
════════════════════════
⌗ Tags: #offensive_security #ctf #tryhackme #tryhackme_walkthrough
Medium
CTF Game Zone | TryHackMe
Máquina: Game Zone Dificuldade: Fácil Plataforma: TryHackMe
⤷ Title: Day 13 : Wordpress HTB room
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:14:49 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #wordpress #pentesting #cybersecurity
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:14:49 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #wordpress #pentesting #cybersecurity
Medium
Day 13 : Wordpress HTB room
Wordpress is the world’s most widely used open-source Content Management System (CMS), powering nearly 40% of all websites. Its flexibility…
⤷ Title: Walkthrough: Web Application Attacks - XSS, SQL Injections, Directory Traversals, and File…
════════════════════════
𐀪 Author: Daryl Brooks
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:44:16 GMT
════════════════════════
⌗ Tags: #stored_xss #local_file_inclusion #sql_injection #directory_traversal #reflected_xss
════════════════════════
𐀪 Author: Daryl Brooks
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:44:16 GMT
════════════════════════
⌗ Tags: #stored_xss #local_file_inclusion #sql_injection #directory_traversal #reflected_xss
Medium
Walkthrough: Web Application Attacks - XSS, SQL Injections, Directory Traversals, and File…
In this project, I discuss and demonstrate a variety of web‑based cyberattacks. To do so, I take on the role of a malicious actor and…
⤷ Title: Fileless Malware Execution Using LOLBins: A Controlled Lab Demonstration
════════════════════════
𐀪 Author: شاہ میر عمران مغل
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:23:18 GMT
════════════════════════
⌗ Tags: #offensive_security #defensive_security #cybersecurity #cybersecurity_awareness #hacking
════════════════════════
𐀪 Author: شاہ میر عمران مغل
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:23:18 GMT
════════════════════════
⌗ Tags: #offensive_security #defensive_security #cybersecurity #cybersecurity_awareness #hacking
Medium
Fileless Malware Execution Using LOLBins: A Controlled Lab Demonstration
Executive Summary
⤷ Title: Most Pentest Reports Answer the Wrong Questions for the Wrong People
════════════════════════
𐀪 Author: Louis Sanchez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:14:40 GMT
════════════════════════
⌗ Tags: #cyber_risk_management #business_strategy #soc2 #penetration_testing #pci_dss
════════════════════════
𐀪 Author: Louis Sanchez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:14:40 GMT
════════════════════════
⌗ Tags: #cyber_risk_management #business_strategy #soc2 #penetration_testing #pci_dss
Medium
Most Pentest Reports Answer the Wrong Questions for the Wrong People
I’ve reviewed hundreds of other vendor penetration reports. Most fail not because the technical work was bad, but because they don’t answer…
⤷ Title: I Built a Tool That Saves and Organizes All My Twitter Bookmarks Automatically (Into Markdown)
════════════════════════
𐀪 Author: Tattva Tarang
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 01:56:00 GMT
════════════════════════
⌗ Tags: #xs #ai_agent #markdown #twitter #ai
════════════════════════
𐀪 Author: Tattva Tarang
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 01:56:00 GMT
════════════════════════
⌗ Tags: #xs #ai_agent #markdown #twitter #ai
Medium
I Built a Tool That Saves and Organizes All My Twitter Bookmarks Automatically (Into Markdown)
I have 2,347 Twitter bookmarks. I know this because I finally counted them yesterday. And you know what? I can’t remember what 90% of them…
⤷ Title: Hackers Impersonate Stripe.net to Hijack the Global Payment Supply Chain
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:25:06 +0000
════════════════════════
⌗ Tags: #Cybercriminals #.NET Security #Financial Cybercrime #infosec #malware #NuGet #Package Impersonation #ReversingLabs #Stripe.net #supply chain attack #Typosquatting
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:25:06 +0000
════════════════════════
⌗ Tags: #Cybercriminals #.NET Security #Financial Cybercrime #infosec #malware #NuGet #Package Impersonation #ReversingLabs #Stripe.net #supply chain attack #Typosquatting
Daily CyberSecurity
Hackers Impersonate Stripe.net to Hijack the Global Payment Supply Chain
ReversingLabs uncovers a malicious NuGet package mimicking Stripe.net. Discover how attackers are targeting the financial sector via supply chain poisoning.
⤷ Title: The Explorer Trap: How Hackers Turn Windows File Explorer into a Silent Portal for Remote Access Trojans
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:17:44 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Async RAT #Cloudflare Tunnel #Cofense Intelligence #infosec #malware #rat #Remote Access Trojan #UNC Paths #WebDAV #Windows File Explorer #XWorm
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:17:44 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Async RAT #Cloudflare Tunnel #Cofense Intelligence #infosec #malware #rat #Remote Access Trojan #UNC Paths #WebDAV #Windows File Explorer #XWorm
Daily CyberSecurity
The Explorer Trap: How Hackers Turn Windows File Explorer into a Silent Portal for Remote Access Trojans
Cofense uncovers a stealthy campaign abusing legacy WebDAV in Windows File Explorer to bypass browsers and EDR, delivering XWorm and Async RAT via UNC paths.