⤷ Title: funboxeasy walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 14:47:25 GMT
════════════════════════
⌗ Tags: #oscp #vulnerability #information_security #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 14:47:25 GMT
════════════════════════
⌗ Tags: #oscp #vulnerability #information_security #ethical_hacking #cybersecurity
Medium
🔥funboxeasy walkthrough (Educational & Defensive Analysis)
By cyber_public_school | Cyber Security Researcher
⤷ Title: Information Gathering in Web Security Testing: The Initial Stage that Determines Everything
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:57:36 GMT
════════════════════════
⌗ Tags: #web_security #information_gathering #ethical_hacking
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 13:57:36 GMT
════════════════════════
⌗ Tags: #web_security #information_gathering #ethical_hacking
Medium
Information Gathering in Web Security Testing: The Initial Stage that Determines Everything
In web application security testing, the initial, often overlooked, stage is actually the foundation of the entire testing process…
⤷ Title: Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:03:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:03:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: ClawJacked Vulnerability in OpenClaw Lets Websites Hijack AI Agents
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:39:06 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI Agents #ClawJacked #Cybersecurity #OpenClaw #Peter Steinberger #Privacy #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:39:06 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI Agents #ClawJacked #Cybersecurity #OpenClaw #Peter Steinberger #Privacy #Vulnerability
Hackread
ClawJacked Vulnerability in OpenClaw Lets Websites Hijack AI Agents
Follow us on all social media @Hackread
⤷ Title: CVE-2025–55182 (React2Shell): Vulnerable Docker Container with Deep-Dive Detection/Exploitation…
════════════════════════
𐀪 Author: Josh Beck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:08:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #docker #react #ctf
════════════════════════
𐀪 Author: Josh Beck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:08:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #docker #react #ctf
Medium
CVE-2025–55182 (React2Shell): Vulnerable Docker Container with Deep-Dive Detection/Exploitation…
Docker Container with Walkthrough:
⤷ Title: Exploiting an Exported Android Activity via Intent Injection
════════════════════════
𐀪 Author: Bharathkannan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:50:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_writeup #hacking #android_pentesting
════════════════════════
𐀪 Author: Bharathkannan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:50:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_writeup #hacking #android_pentesting
Medium
Exploiting an Exported Android Activity via Intent Injection
Android applications often rely on Intents for communication between components. While this mechanism is powerful, improper handling of…
⤷ Title: ⏱️️ Timelapse — One Certificate. Full Compromise
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:52:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #bug_bounty_tips #ethical_hacking
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:52:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #bug_bounty_tips #ethical_hacking
Medium
⏱️🕷️ Timelapse — One Certificate. Full Compromise
We’re still on that CRTP learning train — getting reps in and sharpening the process. This time I’m practicing on a box from Hack The Box.
⤷ Title: How the Xbox Was Hacked in the 2000s — And Why the Lessons Still Matter Today
════════════════════════
𐀪 Author: Cordula Boeck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:35:35 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #hacking
════════════════════════
𐀪 Author: Cordula Boeck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:35:35 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #hacking
Medium
How the Xbox Was Hacked in the 2000s — And Why the Lessons Still Matter Today
One of the most surprising lessons from the history of console hacks is this: attackers do not always need sophisticated malware or…
⤷ Title: TryHackMe | Compiled — Write-Up
════════════════════════
𐀪 Author: GHOST PORT
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:06:57 GMT
════════════════════════
⌗ Tags: #thm #hacking #thm_walkthrough #reverse_engineering
════════════════════════
𐀪 Author: GHOST PORT
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:06:57 GMT
════════════════════════
⌗ Tags: #thm #hacking #thm_walkthrough #reverse_engineering
Medium
TryHackMe | Compiled — Write-Up
Challenge Overview
⤷ Title: From Student to Ethical Hacker: My 2026 Journey Into Cybersecurity
════════════════════════
𐀪 Author: Kswzahidali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:37:33 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Kswzahidali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:37:33 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #cybersecurity
Medium
From Student to Ethical Hacker: My 2026 Journey Into Cybersecurity
Introduction
⤷ Title: Read Team
════════════════════════
𐀪 Author: Heavenblack
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:23:13 GMT
════════════════════════
⌗ Tags: #netdiscover #penetration_testing #information_gathering #arp_scan #reconnaissance
════════════════════════
𐀪 Author: Heavenblack
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:23:13 GMT
════════════════════════
⌗ Tags: #netdiscover #penetration_testing #information_gathering #arp_scan #reconnaissance
Medium
Read Team
Curso de penetration testing 1
⤷ Title: Scheme Catcher — AOC Side Quest TryHackme
════════════════════════
𐀪 Author: Jatin Gahlot
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:55:46 GMT
════════════════════════
⌗ Tags: #advent_of_cyber_2025 #cybersecurity #tryhackme #ctf #ctf_writeup
════════════════════════
𐀪 Author: Jatin Gahlot
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:55:46 GMT
════════════════════════
⌗ Tags: #advent_of_cyber_2025 #cybersecurity #tryhackme #ctf #ctf_writeup
Medium
Scheme Catcher — AOC Side Quest TryHackme
Room Access : https://tryhackme.com/room/sq2-aoc2025-JxiOKUSD9R
⤷ Title: APT3 vs APT29: A Comparative Cyber Threat Intelligence Analysis Using MITRE ATT&CK
════════════════════════
𐀪 Author: Pranav More
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:31:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #threat_intelligence #cybercrime #ethical_hacking
════════════════════════
𐀪 Author: Pranav More
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:31:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #threat_intelligence #cybercrime #ethical_hacking
Medium
APT3 vs APT29: A Comparative Cyber Threat Intelligence Analysis Using MITRE ATT&CK
Advanced Persistent Threats (APTs) are among the most sophisticated forms of cyber adversaries. They are typically state-sponsored or…
⤷ Title: Solving a Bugforge Challenge — Exploiting JWT Forging in Sokudo
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:16:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #caido #web_penetration_testing #bugforge
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:16:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #caido #web_penetration_testing #bugforge
Medium
Solving a Bugforge Challenge — Exploiting JWT Forging in Sokudo
Today, I solved another challenge on Bugforge, targeting a web application called Sokudo.
⤷ Title: 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Bug Bounty in 2026: Look for these Bugs!
════════════════════════
𐀪 Author: Jeosantos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:31:07 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #programming #cybersecurity #bugbounty_writeup #bug_bounty
════════════════════════
𐀪 Author: Jeosantos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:31:07 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #programming #cybersecurity #bugbounty_writeup #bug_bounty
Medium
Bug Bounty in 2026: Look for these Bugs!
Bug Bounty is a super competitive field and if you want to stay ahead of other hunters, you need to seriously know what to look for…
⤷ Title: Broken Access Control: From IDOR to Privilege Escalation
════════════════════════
𐀪 Author: vamos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:23:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #broken_access_control #authorization #access_control #web_security
════════════════════════
𐀪 Author: vamos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:23:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #broken_access_control #authorization #access_control #web_security
Medium
Broken Access Control: From IDOR to Privilege Escalation
بسم الله الرحمن الرحيم…وَقُل رَّبِّ زِدْنِى عِلْمًۭ
⤷ Title: Lab: Basic server-side template injection (code context) | PortSwigger
════════════════════════
𐀪 Author: SIGKILLers
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:57:00 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #web_security #bug_bounty #pentesting
════════════════════════
𐀪 Author: SIGKILLers
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:57:00 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #web_security #bug_bounty #pentesting
Medium
Lab: Basic server-side template injection (code context) | PortSwigger
The SSTI vulnerability in the Preferred name
⤷ Title: Mexican Government Data Exposed in AI-Assisted Cyberattack
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:36:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_breach #ai #hacking #security
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:36:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_breach #ai #hacking #security
Medium
Mexican Government Data Exposed in AI-Assisted Cyberattack
Between December 2025 and January 2026, a month-long intrusion campaign against Mexican government infrastructure demonstrated how frontier…
⤷ Title: Threat Actors Build an Active Phishing Empire Targeting Ghana’s Entire Banking Sector
════════════════════════
𐀪 Author: Prince Lassey
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:42:40 GMT
════════════════════════
⌗ Tags: #africa #phishing #cybersecurity #hacking #privacy
════════════════════════
𐀪 Author: Prince Lassey
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:42:40 GMT
════════════════════════
⌗ Tags: #africa #phishing #cybersecurity #hacking #privacy
Medium
Threat Actors Build an Active Phishing Empire Targeting Ghana’s Entire Banking Sector
It started, as most terrible discoveries do, with a suspicious email. This one was polished and professional. It had branding and it had a…
⤷ Title: vtrains:This is a control panel based on Whisper.
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:11:32 GMT
════════════════════════
⌗ Tags: #pentesting #linux #hacking #s_h4ck13 #hacker
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:11:32 GMT
════════════════════════
⌗ Tags: #pentesting #linux #hacking #s_h4ck13 #hacker
Medium
vtrains:This is a control panel based on Whisper.
Install