⤷ Title: Recognition and enumeration: the true power of the hacker who understands before acting
════════════════════════
𐀪 Author: Devilman24
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:17:41 GMT
════════════════════════
⌗ Tags: #security #hacking #cybersecurity #information_security #pentesting
════════════════════════
𐀪 Author: Devilman24
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:17:41 GMT
════════════════════════
⌗ Tags: #security #hacking #cybersecurity #information_security #pentesting
Medium
Reconnaissance & énumération : le vrai pouvoir du hacker qui comprend avant d’agir
Reconnaissance & énumération : les fondations que tout le monde oublie
⤷ Title: The Compliance Trap
════════════════════════
𐀪 Author: O. J. Okpabi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:56:05 GMT
════════════════════════
⌗ Tags: #deep_learning #technology #artificial_intelligence #hacking #cybersecurity
════════════════════════
𐀪 Author: O. J. Okpabi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:56:05 GMT
════════════════════════
⌗ Tags: #deep_learning #technology #artificial_intelligence #hacking #cybersecurity
Medium
The Compliance Trap
Why Doing Everything Right Can Still Get You Hacked
⤷ Title: Hacking Blind: Terminating TCP Connections Without Sniffing
════════════════════════
𐀪 Author: Saadan ashraf
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:48:57 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #linux #computer_science #network_security
════════════════════════
𐀪 Author: Saadan ashraf
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:48:57 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #linux #computer_science #network_security
Medium
Hacking Blind: Terminating TCP Connections Without Sniffing
How we replicated advanced, off-path TCP sequence inference attacks using side-channel analysis and binary search algorithms
⤷ Title: Road to Comptia PenTest+ (PT0–003): Tactical Playbook
════════════════════════
𐀪 Author: urhnrblpntstr
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:53:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #comptia_certifications #pt0_003 #productivity #penetration_testing
════════════════════════
𐀪 Author: urhnrblpntstr
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:53:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #comptia_certifications #pt0_003 #productivity #penetration_testing
Medium
Road to CompTIA PenTest+ (PT0–003): Tactical Playbook
Road to CompTIA PenTest+ (PT0–003): Tactical Playbook A personal tactical playbook for aspiring penetration testers There’s a saying in the security world: a great penetration tester isn’t just …
⤷ Title: API Security Is Not a Feature- It’s a Responsibility
════════════════════════
𐀪 Author: Aishat Olayinka Yusuf
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:30:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #api #security
════════════════════════
𐀪 Author: Aishat Olayinka Yusuf
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:30:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #api #security
Medium
API Security Is Not a Feature- It’s a Responsibility
When I first started learning API security, I saw it as a technical layer; something you configure, test, and move on from. Authentication…
⤷ Title: RazorBlack TryHackMe Walkthrough
════════════════════════
𐀪 Author: Contact Aryan Here
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:23:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #oscp #penetration_testing #tryhackme #active_directory
════════════════════════
𐀪 Author: Contact Aryan Here
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:23:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #oscp #penetration_testing #tryhackme #active_directory
Medium
RazorBlack TryHackMe Walkthrough
RazorBlack is a medium-difficulty Active Directory room on TryHackMe that simulates a real-world enterprise environment. This room focuses…
⤷ Title: funboxeasy walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 14:47:25 GMT
════════════════════════
⌗ Tags: #oscp #vulnerability #information_security #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 14:47:25 GMT
════════════════════════
⌗ Tags: #oscp #vulnerability #information_security #ethical_hacking #cybersecurity
Medium
🔥funboxeasy walkthrough (Educational & Defensive Analysis)
By cyber_public_school | Cyber Security Researcher
⤷ Title: Information Gathering in Web Security Testing: The Initial Stage that Determines Everything
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:57:36 GMT
════════════════════════
⌗ Tags: #web_security #information_gathering #ethical_hacking
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:57:36 GMT
════════════════════════
⌗ Tags: #web_security #information_gathering #ethical_hacking
Medium
Information Gathering in Web Security Testing: The Initial Stage that Determines Everything
In web application security testing, the initial, often overlooked, stage is actually the foundation of the entire testing process…
⤷ Title: Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:03:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:03:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: ClawJacked Vulnerability in OpenClaw Lets Websites Hijack AI Agents
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:39:06 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI Agents #ClawJacked #Cybersecurity #OpenClaw #Peter Steinberger #Privacy #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:39:06 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI Agents #ClawJacked #Cybersecurity #OpenClaw #Peter Steinberger #Privacy #Vulnerability
Hackread
ClawJacked Vulnerability in OpenClaw Lets Websites Hijack AI Agents
Follow us on all social media @Hackread
⤷ Title: CVE-2025–55182 (React2Shell): Vulnerable Docker Container with Deep-Dive Detection/Exploitation…
════════════════════════
𐀪 Author: Josh Beck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:08:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #docker #react #ctf
════════════════════════
𐀪 Author: Josh Beck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:08:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #docker #react #ctf
Medium
CVE-2025–55182 (React2Shell): Vulnerable Docker Container with Deep-Dive Detection/Exploitation…
Docker Container with Walkthrough:
⤷ Title: Exploiting an Exported Android Activity via Intent Injection
════════════════════════
𐀪 Author: Bharathkannan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:50:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_writeup #hacking #android_pentesting
════════════════════════
𐀪 Author: Bharathkannan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:50:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_writeup #hacking #android_pentesting
Medium
Exploiting an Exported Android Activity via Intent Injection
Android applications often rely on Intents for communication between components. While this mechanism is powerful, improper handling of…
⤷ Title: ⏱️️ Timelapse — One Certificate. Full Compromise
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:52:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #bug_bounty_tips #ethical_hacking
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:52:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #bug_bounty_tips #ethical_hacking
Medium
⏱️🕷️ Timelapse — One Certificate. Full Compromise
We’re still on that CRTP learning train — getting reps in and sharpening the process. This time I’m practicing on a box from Hack The Box.
⤷ Title: How the Xbox Was Hacked in the 2000s — And Why the Lessons Still Matter Today
════════════════════════
𐀪 Author: Cordula Boeck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:35:35 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #hacking
════════════════════════
𐀪 Author: Cordula Boeck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:35:35 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #hacking
Medium
How the Xbox Was Hacked in the 2000s — And Why the Lessons Still Matter Today
One of the most surprising lessons from the history of console hacks is this: attackers do not always need sophisticated malware or…
⤷ Title: TryHackMe | Compiled — Write-Up
════════════════════════
𐀪 Author: GHOST PORT
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:06:57 GMT
════════════════════════
⌗ Tags: #thm #hacking #thm_walkthrough #reverse_engineering
════════════════════════
𐀪 Author: GHOST PORT
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:06:57 GMT
════════════════════════
⌗ Tags: #thm #hacking #thm_walkthrough #reverse_engineering
Medium
TryHackMe | Compiled — Write-Up
Challenge Overview
⤷ Title: From Student to Ethical Hacker: My 2026 Journey Into Cybersecurity
════════════════════════
𐀪 Author: Kswzahidali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:37:33 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Kswzahidali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:37:33 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #cybersecurity
Medium
From Student to Ethical Hacker: My 2026 Journey Into Cybersecurity
Introduction
⤷ Title: Read Team
════════════════════════
𐀪 Author: Heavenblack
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:23:13 GMT
════════════════════════
⌗ Tags: #netdiscover #penetration_testing #information_gathering #arp_scan #reconnaissance
════════════════════════
𐀪 Author: Heavenblack
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:23:13 GMT
════════════════════════
⌗ Tags: #netdiscover #penetration_testing #information_gathering #arp_scan #reconnaissance
Medium
Read Team
Curso de penetration testing 1
⤷ Title: Scheme Catcher — AOC Side Quest TryHackme
════════════════════════
𐀪 Author: Jatin Gahlot
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:55:46 GMT
════════════════════════
⌗ Tags: #advent_of_cyber_2025 #cybersecurity #tryhackme #ctf #ctf_writeup
════════════════════════
𐀪 Author: Jatin Gahlot
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:55:46 GMT
════════════════════════
⌗ Tags: #advent_of_cyber_2025 #cybersecurity #tryhackme #ctf #ctf_writeup
Medium
Scheme Catcher — AOC Side Quest TryHackme
Room Access : https://tryhackme.com/room/sq2-aoc2025-JxiOKUSD9R
⤷ Title: APT3 vs APT29: A Comparative Cyber Threat Intelligence Analysis Using MITRE ATT&CK
════════════════════════
𐀪 Author: Pranav More
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:31:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #threat_intelligence #cybercrime #ethical_hacking
════════════════════════
𐀪 Author: Pranav More
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:31:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #threat_intelligence #cybercrime #ethical_hacking
Medium
APT3 vs APT29: A Comparative Cyber Threat Intelligence Analysis Using MITRE ATT&CK
Advanced Persistent Threats (APTs) are among the most sophisticated forms of cyber adversaries. They are typically state-sponsored or…
⤷ Title: Solving a Bugforge Challenge — Exploiting JWT Forging in Sokudo
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:16:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #caido #web_penetration_testing #bugforge
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:16:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #caido #web_penetration_testing #bugforge
Medium
Solving a Bugforge Challenge — Exploiting JWT Forging in Sokudo
Today, I solved another challenge on Bugforge, targeting a web application called Sokudo.
⤷ Title: 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags