⤷ Title: Windows Basics
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 11:27:04 GMT
════════════════════════
⌗ Tags: #tryhackme_pre_security #tryhackme_writeup #tryhackme #windows_basic_commands #tryhackme_walkthrough
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 11:27:04 GMT
════════════════════════
⌗ Tags: #tryhackme_pre_security #tryhackme_writeup #tryhackme #windows_basic_commands #tryhackme_walkthrough
Medium
Windows Basics
Learn to navigate Windows, manage files, and use essential system tools.
⤷ Title: Day 9 — Breaking Login With a Single Quote (SQL Injection Begins)
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 11:32:06 GMT
════════════════════════
⌗ Tags: #pentesting #sql_injection #offensive_security #vapt #ethical_hacking
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 11:32:06 GMT
════════════════════════
⌗ Tags: #pentesting #sql_injection #offensive_security #vapt #ethical_hacking
Medium
🚀 Day 9 — Breaking Login With a Single Quote (SQL Injection Begins)
Target Application: https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: From Learning APIs to Protecting Systems: My API Security Journey
════════════════════════
𐀪 Author: Endework abera
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 11:49:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security
════════════════════════
𐀪 Author: Endework abera
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 11:49:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security
Medium
From Learning APIs to Protecting Systems: My API Security Journey
When I first dipped my toes into API security, I thought it was just another checkbox something developers “added on” after building…
⤷ Title: The $2.3 Million Lesson Hidden in 14 Lines of Code
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 11:36:00 GMT
════════════════════════
⌗ Tags: #sass #software_engineering #cyber_security_awareness #bugbounty_writeup #cybersecurity
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 11:36:00 GMT
════════════════════════
⌗ Tags: #sass #software_engineering #cyber_security_awareness #bugbounty_writeup #cybersecurity
Medium
The $2.3 Million Lesson Hidden in 14 Lines of Code
What a real breach taught me about the gap between ‘shipped’ and ‘secure’
⤷ Title: ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:13:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:13:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Paywall Bypass: How Client-Side Trust Led to a Free Premium Upgrade
════════════════════════
𐀪 Author: default_0x
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:28:14 GMT
════════════════════════
⌗ Tags: #jsfilegoldmine #vulnerability #bug_hunting #bypassofpaywall #bug_bounty
════════════════════════
𐀪 Author: default_0x
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:28:14 GMT
════════════════════════
⌗ Tags: #jsfilegoldmine #vulnerability #bug_hunting #bypassofpaywall #bug_bounty
Medium
Paywall Bypass: How Client-Side Trust Led to a Free Premium Upgrade
Recently, I was poking around a standard SaaS note-taking product — let’s call it target.com.
⤷ Title: Hunting in the Dark Forest: How I Uncovered a Private $25M Simulation Fork via an RPC…
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:12:26 GMT
════════════════════════
⌗ Tags: #ethereum #ethical_hacking #web3 #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:12:26 GMT
════════════════════════
⌗ Tags: #ethereum #ethical_hacking #web3 #bug_bounty #cybersecurity
Medium
Hunting in the Dark Forest: How I Uncovered a Private $25M Simulation Fork via an RPC Misconfiguration
Bug bounty hunting in Web3 isn’t just about analyzing smart contracts for reentrancy or logic flaws. Sometimes, the biggest vulnerabilities…
⤷ Title: Recognition and enumeration: the true power of the hacker who understands before acting
════════════════════════
𐀪 Author: Devilman24
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:17:41 GMT
════════════════════════
⌗ Tags: #security #hacking #cybersecurity #information_security #pentesting
════════════════════════
𐀪 Author: Devilman24
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:17:41 GMT
════════════════════════
⌗ Tags: #security #hacking #cybersecurity #information_security #pentesting
Medium
Reconnaissance & énumération : le vrai pouvoir du hacker qui comprend avant d’agir
Reconnaissance & énumération : les fondations que tout le monde oublie
⤷ Title: The Compliance Trap
════════════════════════
𐀪 Author: O. J. Okpabi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:56:05 GMT
════════════════════════
⌗ Tags: #deep_learning #technology #artificial_intelligence #hacking #cybersecurity
════════════════════════
𐀪 Author: O. J. Okpabi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:56:05 GMT
════════════════════════
⌗ Tags: #deep_learning #technology #artificial_intelligence #hacking #cybersecurity
Medium
The Compliance Trap
Why Doing Everything Right Can Still Get You Hacked
⤷ Title: Hacking Blind: Terminating TCP Connections Without Sniffing
════════════════════════
𐀪 Author: Saadan ashraf
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:48:57 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #linux #computer_science #network_security
════════════════════════
𐀪 Author: Saadan ashraf
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:48:57 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #linux #computer_science #network_security
Medium
Hacking Blind: Terminating TCP Connections Without Sniffing
How we replicated advanced, off-path TCP sequence inference attacks using side-channel analysis and binary search algorithms
⤷ Title: Road to Comptia PenTest+ (PT0–003): Tactical Playbook
════════════════════════
𐀪 Author: urhnrblpntstr
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:53:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #comptia_certifications #pt0_003 #productivity #penetration_testing
════════════════════════
𐀪 Author: urhnrblpntstr
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:53:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #comptia_certifications #pt0_003 #productivity #penetration_testing
Medium
Road to CompTIA PenTest+ (PT0–003): Tactical Playbook
Road to CompTIA PenTest+ (PT0–003): Tactical Playbook A personal tactical playbook for aspiring penetration testers There’s a saying in the security world: a great penetration tester isn’t just …
⤷ Title: API Security Is Not a Feature- It’s a Responsibility
════════════════════════
𐀪 Author: Aishat Olayinka Yusuf
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:30:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #api #security
════════════════════════
𐀪 Author: Aishat Olayinka Yusuf
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:30:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #api #security
Medium
API Security Is Not a Feature- It’s a Responsibility
When I first started learning API security, I saw it as a technical layer; something you configure, test, and move on from. Authentication…
⤷ Title: RazorBlack TryHackMe Walkthrough
════════════════════════
𐀪 Author: Contact Aryan Here
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:23:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #oscp #penetration_testing #tryhackme #active_directory
════════════════════════
𐀪 Author: Contact Aryan Here
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:23:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #oscp #penetration_testing #tryhackme #active_directory
Medium
RazorBlack TryHackMe Walkthrough
RazorBlack is a medium-difficulty Active Directory room on TryHackMe that simulates a real-world enterprise environment. This room focuses…
⤷ Title: funboxeasy walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 14:47:25 GMT
════════════════════════
⌗ Tags: #oscp #vulnerability #information_security #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 14:47:25 GMT
════════════════════════
⌗ Tags: #oscp #vulnerability #information_security #ethical_hacking #cybersecurity
Medium
🔥funboxeasy walkthrough (Educational & Defensive Analysis)
By cyber_public_school | Cyber Security Researcher
⤷ Title: Information Gathering in Web Security Testing: The Initial Stage that Determines Everything
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:57:36 GMT
════════════════════════
⌗ Tags: #web_security #information_gathering #ethical_hacking
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:57:36 GMT
════════════════════════
⌗ Tags: #web_security #information_gathering #ethical_hacking
Medium
Information Gathering in Web Security Testing: The Initial Stage that Determines Everything
In web application security testing, the initial, often overlooked, stage is actually the foundation of the entire testing process…
⤷ Title: Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:03:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:03:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: ClawJacked Vulnerability in OpenClaw Lets Websites Hijack AI Agents
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:39:06 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI Agents #ClawJacked #Cybersecurity #OpenClaw #Peter Steinberger #Privacy #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:39:06 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI Agents #ClawJacked #Cybersecurity #OpenClaw #Peter Steinberger #Privacy #Vulnerability
Hackread
ClawJacked Vulnerability in OpenClaw Lets Websites Hijack AI Agents
Follow us on all social media @Hackread
⤷ Title: CVE-2025–55182 (React2Shell): Vulnerable Docker Container with Deep-Dive Detection/Exploitation…
════════════════════════
𐀪 Author: Josh Beck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:08:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #docker #react #ctf
════════════════════════
𐀪 Author: Josh Beck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:08:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #docker #react #ctf
Medium
CVE-2025–55182 (React2Shell): Vulnerable Docker Container with Deep-Dive Detection/Exploitation…
Docker Container with Walkthrough:
⤷ Title: Exploiting an Exported Android Activity via Intent Injection
════════════════════════
𐀪 Author: Bharathkannan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:50:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_writeup #hacking #android_pentesting
════════════════════════
𐀪 Author: Bharathkannan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:50:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_writeup #hacking #android_pentesting
Medium
Exploiting an Exported Android Activity via Intent Injection
Android applications often rely on Intents for communication between components. While this mechanism is powerful, improper handling of…
⤷ Title: ⏱️️ Timelapse — One Certificate. Full Compromise
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:52:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #bug_bounty_tips #ethical_hacking
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:52:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #bug_bounty_tips #ethical_hacking
Medium
⏱️🕷️ Timelapse — One Certificate. Full Compromise
We’re still on that CRTP learning train — getting reps in and sharpening the process. This time I’m practicing on a box from Hack The Box.
⤷ Title: How the Xbox Was Hacked in the 2000s — And Why the Lessons Still Matter Today
════════════════════════
𐀪 Author: Cordula Boeck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:35:35 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #hacking
════════════════════════
𐀪 Author: Cordula Boeck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:35:35 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #hacking
Medium
How the Xbox Was Hacked in the 2000s — And Why the Lessons Still Matter Today
One of the most surprising lessons from the history of console hacks is this: attackers do not always need sophisticated malware or…