⤷ Title: Guía de Netcat para Pentesting: Comandos, Reverse Shells y Exfiltración
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #networking #technology #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #networking #technology #cybersecurity #penetration_testing
Medium
Guía de Netcat para Pentesting: Comandos, Reverse Shells y Exfiltración
Domina Netcat para Bug Hunting: desde banners y transferencia de archivos hasta reverse shells y evasión de firewalls.
⤷ Title: Exploiting HTTP request smuggling to bypass front-end security controls, CL.TE vulnerability
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #penetration_testing #pentesting #burpsuite
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #penetration_testing #pentesting #burpsuite
Medium
Exploiting HTTP request smuggling to bypass front-end security controls, CL.TE vulnerability
This writeup demonstrates how to exploit a CL.TE HTTP request smuggling vulnerability to bypass front-end security controls. The…
⤷ Title: Cryptography and Cryptanalysis
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:01:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #cryptography #cybersecurity #cryptography_series #cryptanalysis
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:01:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #cryptography #cybersecurity #cryptography_series #cryptanalysis
Medium
Cryptography and Cryptanalysis
Cryptography in Details Part 2
⤷ Title: Introducing CYBERDUDEBIVASH® Auth Bypass Tester — Premium Edition v1.0.0:
════════════════════════
𐀪 Author: CYBERDUDEBIVASH PVT LTD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 22:58:22 GMT
════════════════════════
⌗ Tags: #cyberdudebivash #auth_bypass #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: CYBERDUDEBIVASH PVT LTD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 22:58:22 GMT
════════════════════════
⌗ Tags: #cyberdudebivash #auth_bypass #cybersecurity #penetration_testing
Medium
Introducing CYBERDUDEBIVASH® Auth Bypass Tester — Premium Edition v1.0.0:
Daily Threat Intel by CyberDudeBivash
Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks.
Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks.
⤷ Title: CTF Game Zone | TryHackMe
════════════════════════
𐀪 Author: Henrique
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:57:17 GMT
════════════════════════
⌗ Tags: #offensive_security #ctf #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: Henrique
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:57:17 GMT
════════════════════════
⌗ Tags: #offensive_security #ctf #tryhackme #tryhackme_walkthrough
Medium
CTF Game Zone | TryHackMe
Máquina: Game Zone Dificuldade: Fácil Plataforma: TryHackMe
⤷ Title: Day 13 : Wordpress HTB room
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:14:49 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #wordpress #pentesting #cybersecurity
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:14:49 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #wordpress #pentesting #cybersecurity
Medium
Day 13 : Wordpress HTB room
Wordpress is the world’s most widely used open-source Content Management System (CMS), powering nearly 40% of all websites. Its flexibility…
⤷ Title: Walkthrough: Web Application Attacks - XSS, SQL Injections, Directory Traversals, and File…
════════════════════════
𐀪 Author: Daryl Brooks
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:44:16 GMT
════════════════════════
⌗ Tags: #stored_xss #local_file_inclusion #sql_injection #directory_traversal #reflected_xss
════════════════════════
𐀪 Author: Daryl Brooks
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:44:16 GMT
════════════════════════
⌗ Tags: #stored_xss #local_file_inclusion #sql_injection #directory_traversal #reflected_xss
Medium
Walkthrough: Web Application Attacks - XSS, SQL Injections, Directory Traversals, and File…
In this project, I discuss and demonstrate a variety of web‑based cyberattacks. To do so, I take on the role of a malicious actor and…
⤷ Title: Fileless Malware Execution Using LOLBins: A Controlled Lab Demonstration
════════════════════════
𐀪 Author: شاہ میر عمران مغل
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:23:18 GMT
════════════════════════
⌗ Tags: #offensive_security #defensive_security #cybersecurity #cybersecurity_awareness #hacking
════════════════════════
𐀪 Author: شاہ میر عمران مغل
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:23:18 GMT
════════════════════════
⌗ Tags: #offensive_security #defensive_security #cybersecurity #cybersecurity_awareness #hacking
Medium
Fileless Malware Execution Using LOLBins: A Controlled Lab Demonstration
Executive Summary
⤷ Title: Most Pentest Reports Answer the Wrong Questions for the Wrong People
════════════════════════
𐀪 Author: Louis Sanchez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:14:40 GMT
════════════════════════
⌗ Tags: #cyber_risk_management #business_strategy #soc2 #penetration_testing #pci_dss
════════════════════════
𐀪 Author: Louis Sanchez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 02:14:40 GMT
════════════════════════
⌗ Tags: #cyber_risk_management #business_strategy #soc2 #penetration_testing #pci_dss
Medium
Most Pentest Reports Answer the Wrong Questions for the Wrong People
I’ve reviewed hundreds of other vendor penetration reports. Most fail not because the technical work was bad, but because they don’t answer…
⤷ Title: I Built a Tool That Saves and Organizes All My Twitter Bookmarks Automatically (Into Markdown)
════════════════════════
𐀪 Author: Tattva Tarang
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 01:56:00 GMT
════════════════════════
⌗ Tags: #xs #ai_agent #markdown #twitter #ai
════════════════════════
𐀪 Author: Tattva Tarang
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 01:56:00 GMT
════════════════════════
⌗ Tags: #xs #ai_agent #markdown #twitter #ai
Medium
I Built a Tool That Saves and Organizes All My Twitter Bookmarks Automatically (Into Markdown)
I have 2,347 Twitter bookmarks. I know this because I finally counted them yesterday. And you know what? I can’t remember what 90% of them…
⤷ Title: Hackers Impersonate Stripe.net to Hijack the Global Payment Supply Chain
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:25:06 +0000
════════════════════════
⌗ Tags: #Cybercriminals #.NET Security #Financial Cybercrime #infosec #malware #NuGet #Package Impersonation #ReversingLabs #Stripe.net #supply chain attack #Typosquatting
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:25:06 +0000
════════════════════════
⌗ Tags: #Cybercriminals #.NET Security #Financial Cybercrime #infosec #malware #NuGet #Package Impersonation #ReversingLabs #Stripe.net #supply chain attack #Typosquatting
Daily CyberSecurity
Hackers Impersonate Stripe.net to Hijack the Global Payment Supply Chain
ReversingLabs uncovers a malicious NuGet package mimicking Stripe.net. Discover how attackers are targeting the financial sector via supply chain poisoning.
⤷ Title: The Explorer Trap: How Hackers Turn Windows File Explorer into a Silent Portal for Remote Access Trojans
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:17:44 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Async RAT #Cloudflare Tunnel #Cofense Intelligence #infosec #malware #rat #Remote Access Trojan #UNC Paths #WebDAV #Windows File Explorer #XWorm
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:17:44 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Async RAT #Cloudflare Tunnel #Cofense Intelligence #infosec #malware #rat #Remote Access Trojan #UNC Paths #WebDAV #Windows File Explorer #XWorm
Daily CyberSecurity
The Explorer Trap: How Hackers Turn Windows File Explorer into a Silent Portal for Remote Access Trojans
Cofense uncovers a stealthy campaign abusing legacy WebDAV in Windows File Explorer to bypass browsers and EDR, delivering XWorm and Async RAT via UNC paths.
⤷ Title: Critical XSS Flaw in RustFS Exposes S3 Storage to Total Admin Account Takeovers
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 03:50:52 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Account Takeover #ATO #Cloud Security #CVE_2026_27822 #infosec #Object Storage #Patch Alert #Rust Programming #RustFS #S3 Storage #Stored XSS
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 03:50:52 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Account Takeover #ATO #Cloud Security #CVE_2026_27822 #infosec #Object Storage #Patch Alert #Rust Programming #RustFS #S3 Storage #Stored XSS
Daily CyberSecurity
Critical XSS Flaw in RustFS Exposes S3 Storage to Total Admin Account Takeovers
RustFS patches a critical 9.1 CVSS XSS flaw (CVE-2026-27822). Attackers can steal S3 credentials via a malicious file preview. Update to 1.0.0-alpha.83 now!
⤷ Title: Beyond Ukraine: Mercenary Akula Spearphishing Hits European Finance with Russian Remote Admin Tools
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 03:40:30 +0000
════════════════════════
⌗ Tags: #Cybercriminals #BlueVoyant #cyber_espionage #European Finance #infosec #living_off_the_land #Mercenary Akula #Remote Manipulator System #RMS #Spearphishing #UAC_0050
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 03:40:30 +0000
════════════════════════
⌗ Tags: #Cybercriminals #BlueVoyant #cyber_espionage #European Finance #infosec #living_off_the_land #Mercenary Akula #Remote Manipulator System #RMS #Spearphishing #UAC_0050
Daily CyberSecurity
Beyond Ukraine: Mercenary Akula Spearphishing Hits European Finance with Russian Remote Admin Tools
BlueVoyant uncovers a shift in Mercenary Akula (UAC-0050) tactics, targeting European financial institutions via spoofed judicial lures and RMS malware.
⤷ Title: Unmasking 1Campaign: The Professionalized ‘Cloaking’ Service Powering Global Malvertising Scams
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 03:17:40 +0000
════════════════════════
⌗ Tags: #Cybercriminals #1Campaign #Ad Fraud #Cloaking #crypto drainer #Cybercrime #DuppyMeister #Google Ads #infosec #Malvertising #phishing #Varonis Threat Labs
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 03:17:40 +0000
════════════════════════
⌗ Tags: #Cybercriminals #1Campaign #Ad Fraud #Cloaking #crypto drainer #Cybercrime #DuppyMeister #Google Ads #infosec #Malvertising #phishing #Varonis Threat Labs
Daily CyberSecurity
Unmasking 1Campaign: The Professionalized 'Cloaking' Service Powering Global Malvertising Scams
Varonis uncovers 1Campaign, a sophisticated tool by 'DuppyMeister' that helps hackers bypass Google Ads security to deliver phishing and crypto drainers.
⤷ Title: Vulnhub: Jangow: 1.0.1 Walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 03:31:43 GMT
════════════════════════
⌗ Tags: #vulnhub_walkthrough #vulnhub #ctf #cybersecurity
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 03:31:43 GMT
════════════════════════
⌗ Tags: #vulnhub_walkthrough #vulnhub #ctf #cybersecurity
Medium
Vulnhub: Jangow: 1.0.1 Walkthrough
Machine details
⤷ Title: Ethical Hacking Course in Calicut
════════════════════════
𐀪 Author: Jhoninternship
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:57:10 GMT
════════════════════════
⌗ Tags: #education #calicut #ethical_hacking #whitehat
════════════════════════
𐀪 Author: Jhoninternship
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:57:10 GMT
════════════════════════
⌗ Tags: #education #calicut #ethical_hacking #whitehat
Medium
Ethical Hacking Course in Calicut
We believe education is the foundation of a successful career. Our Cyber Security Course in Calicut is designed to provide students with…
⤷ Title: The “Skeleton Key” AI Jailbreak That Can Break Guardrails
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:13:45 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #technology #ai_security #artificial_intelligence
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 04:13:45 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #technology #ai_security #artificial_intelligence
Medium
The “Skeleton Key” AI Jailbreak That Can Break Guardrails
AI models don’t always get hacked the traditional way.
⤷ Title: Tutorial Instalasi Kali Linux di Oracle VirtualBox
════════════════════════
𐀪 Author: Wiyandra Syaiful Abidin
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 03:41:41 GMT
════════════════════════
⌗ Tags: #virtualbox #oracle #virtual_machine #ethical_hacking #kali_linux
════════════════════════
𐀪 Author: Wiyandra Syaiful Abidin
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 03:41:41 GMT
════════════════════════
⌗ Tags: #virtualbox #oracle #virtual_machine #ethical_hacking #kali_linux
Medium
Tutorial Instalasi Kali Linux di Oracle VirtualBox
Kali Linux adalah sistem operasi berbasis Debian yang banyak digunakan untuk penetration testing dan ethical hacking. VirtualBox adalah…
⤷ Title: Anatomy of a Cloud Native Attack: How We Pwned Kubernetes for $100k
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 05:02:39 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking #cybersecurity
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 05:02:39 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking #cybersecurity
Medium
💰 Anatomy of a Cloud Native Attack: How We Pwned Kubernetes for $100k
TL;DR: The Ultimate Cloud Hack Chain
⤷ Title: What Hackers Talk About at 2 AM: Using Dark Web Forums for Recon ️
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 05:01:14 GMT
════════════════════════
⌗ Tags: #hacking #info_sec_writeups #cybersecurity #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 05:01:14 GMT
════════════════════════
⌗ Tags: #hacking #info_sec_writeups #cybersecurity #bug_bounty #bug_bounty_tips
Medium
What Hackers Talk About at 2 AM: Using Dark Web Forums for Recon 🕶️🧭
Free Link 🎈