⤷ Title: Wizer #61 Write Up
════════════════════════
𐀪 Author: Jeff Maley
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:19:07 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #web_penetration_testing #penetration_testing #information_security
════════════════════════
𐀪 Author: Jeff Maley
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:19:07 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #web_penetration_testing #penetration_testing #information_security
Medium
Wizer #61 Write Up
Wizer hosts CTF challenges on https://wizer-ctf.com and we’ll be looking at #61 today. Like most of the challenges, this one is based on…
⤷ Title: Learning Exploit Active Directory
════════════════════════
𐀪 Author: Moci
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:02:22 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #active_directory #cybersecurity #exploitation
════════════════════════
𐀪 Author: Moci
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:02:22 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #active_directory #cybersecurity #exploitation
Medium
Learning Exploit Active Directory
🎯 Overview
⤷ Title: Try Hack Me- HTTP in Detail Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:48:14 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #tryhackme_writeup #cybersecurity
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:48:14 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #tryhackme_writeup #cybersecurity
Medium
Try Hack Me- HTTP in Detail Walkthrough
Hello, stranger — let’s begin.
⤷ Title: Beyond Web Apps: A Complete Guide to Thick Client Application Security Testing
════════════════════════
𐀪 Author: Pratik Solanki
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:37:23 GMT
════════════════════════
⌗ Tags: #penetration_testing #thick_client_security #thick_client_pentesting #thick_client
════════════════════════
𐀪 Author: Pratik Solanki
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:37:23 GMT
════════════════════════
⌗ Tags: #penetration_testing #thick_client_security #thick_client_pentesting #thick_client
Medium
Beyond Web Apps: A Complete Guide to Thick Client Application Security Testing
Thick Client Application Security Testing
⤷ Title: TryHackMe -Room Team Writeup
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:17:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #linux #ctf #ethical_hacking
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:17:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #linux #ctf #ethical_hacking
Medium
TryHackMe -Room Team Writeup
Difficulty: Easy | Tags: FTP, LFI, SSH, Privilege Escalation
⤷ Title: TryHackMe: Offensive Security Intro Walkthrough
════════════════════════
𐀪 Author: hazmatmonstarrr
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:38:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #tryhackme_writeup
════════════════════════
𐀪 Author: hazmatmonstarrr
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:38:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #tryhackme_writeup
Medium
TryHackMe: Offensive Security Intro Walkthrough
This walkthrough documents my journey to completing the Offensive Security Intro room and serves as a guide for you! #win-win
⤷ Title: The Rise of Agentic AI: Why Automated Pentesting Is Our Best Defense
════════════════════════
𐀪 Author: Len Noe
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:43:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #ethical_hacking #artificial_intelligence #machine_learning
════════════════════════
𐀪 Author: Len Noe
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:43:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #ethical_hacking #artificial_intelligence #machine_learning
Medium
The Rise of Agentic AI: Why Automated Pentesting Is Our Best Defense
Fighting AI with AI
⤷ Title: We learned that ethical hacking is not about breaking systems for harm, but about protecting…
════════════════════════
𐀪 Author: Jksantak
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:00:51 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Jksantak
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:00:51 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
We learned that ethical hacking is not about breaking systems for harm, but about protecting…
We learned that ethical hacking is not about breaking systems for harm, but about protecting digital environments by identifying weaknesses before attackers exploit them. Understanding the hacker …
⤷ Title: DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:41:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:41:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: ShinyHunters Leak 2M Records From Dutch Telecom Odido, Claim 21M Stolen
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:01:32 +0000
════════════════════════
⌗ Tags: #Data Breaches #Cyber Crime #Security #Cyber Attack #Cybersecurity #data breach #Netherlands #Odido #Privacy #ShinyHunters
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:01:32 +0000
════════════════════════
⌗ Tags: #Data Breaches #Cyber Crime #Security #Cyber Attack #Cybersecurity #data breach #Netherlands #Odido #Privacy #ShinyHunters
Hackread
ShinyHunters Leak 2M Records From Dutch Telecom Odido, Claim 21M Stolen
ShinyHunters hackers leak 2 million records from Dutch telecom Odido after ransom refusal, claiming up to 21 million customer records were stolen in the breach.
⤷ Title: ClawJacked Vulnerability in OpenClaw Could Let Websites Hijack AI Agents
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:39:06 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI Agents #ClawJacked #Cybersecurity #OpenClaw #Peter Steinberger #Privacy #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:39:06 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI Agents #ClawJacked #Cybersecurity #OpenClaw #Peter Steinberger #Privacy #Vulnerability
Hackread
ClawJacked Vulnerability in OpenClaw Could Let Websites Hijack AI Agents
Follow us on all social media @Hackread
⤷ Title: PortSwigger Access Control Vulnerabilities Lab Notes
════════════════════════
𐀪 Author: Emre A.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:17:24 GMT
════════════════════════
⌗ Tags: #portswigger #bug_bounty #access_control #web_security
════════════════════════
𐀪 Author: Emre A.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:17:24 GMT
════════════════════════
⌗ Tags: #portswigger #bug_bounty #access_control #web_security
Medium
PortSwigger Access Control Vulnerabilities Lab Notes
Lab: Unprotected admin functionality
⤷ Title: Most Beginner Bug Bounty Hunters Never Turn Pro — Here’s the Complete Blueprint That Actually…
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:08:09 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #earn_money_online #business #earnings
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:08:09 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #earn_money_online #business #earnings
Medium
Most Beginner Bug Bounty Hunters Never Turn Pro — Here’s the Complete Blueprint That Actually Explains Why (2026 Edition)
Introduction: The Graveyard of Almost-Pro Hunters
⤷ Title: Consistent Bug Bounty Income Is Not About Finding More Bugs — Here’s the Strategic Blueprint That…
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:08:00 GMT
════════════════════════
⌗ Tags: #earnings #bug_bounty #business #bug_bounty_tips #make_money_online
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:08:00 GMT
════════════════════════
⌗ Tags: #earnings #bug_bounty #business #bug_bounty_tips #make_money_online
Medium
Consistent Bug Bounty Income Is Not About Finding More Bugs — Here’s the Strategic Blueprint That Changes Everything in 2026
Introduction: The Hunter Who Found Everything and Earned Nothing
⤷ Title: Setting up OWASP BLT on the go! Fast and Free.
════════════════════════
𐀪 Author: Chigorin
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:19:45 GMT
════════════════════════
⌗ Tags: #google_summer_of_code #gsoc #hacking #owasp #cloud
════════════════════════
𐀪 Author: Chigorin
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:19:45 GMT
════════════════════════
⌗ Tags: #google_summer_of_code #gsoc #hacking #owasp #cloud
Medium
Setting up OWASP BLT on the go! Fast and Free.
OWASP BLT is becoming an increasingly popular platform for bug reporting and remediation with that we also need an on-the-go setup and for…
⤷ Title: Wordpress: CVE-2021–29447 (THM) Tryhackme Write-Up With Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:16:32 GMT
════════════════════════
⌗ Tags: #hacking #wordpress #cybersecurity #tryhackme #vulnerability
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:16:32 GMT
════════════════════════
⌗ Tags: #hacking #wordpress #cybersecurity #tryhackme #vulnerability
Medium
Wordpress: CVE-2021–29447 (THM) Tryhackme Write-Up With Answer
Denoscription : Vulnerability allow a authenticated user whith low privilages upload a malicious WAV file that could lead to remote arbitrary…
⤷ Title: Cross-Site Scripting (XSS) Attack Lab: A Hands-On Journey Through Client-Side Exploitation
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:59:38 GMT
════════════════════════
⌗ Tags: #ethical_hacking #penetration_testing #web_development #cybersecurity #javanoscript
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:59:38 GMT
════════════════════════
⌗ Tags: #ethical_hacking #penetration_testing #web_development #cybersecurity #javanoscript
Medium
Cross-Site Scripting (XSS) Attack Lab: A Hands-On Journey Through Client-Side Exploitation
Comprehensive walkthrough of XSS exploitation techniques, from cookie theft to malicious redirection
⤷ Title: INE-Web Application Penetration Testing CTF 1 by Singkhon
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:41:00 GMT
════════════════════════
⌗ Tags: #coding #ctf #cybersecurity #penetration_testing #programming
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:41:00 GMT
════════════════════════
⌗ Tags: #coding #ctf #cybersecurity #penetration_testing #programming
Medium
INE-Web Application Penetration Testing CTF 1 by Singkhon
Hello, my name is Singkhon. After completing the eJPT course, I would like to share my methods and approaches for solving each CTF problem…
⤷ Title: SQL Injection Attack Lab: A Hands-On Journey Through Database Exploitation
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:24:11 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #sql #ethical_hacking #web_development
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:24:11 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #sql #ethical_hacking #web_development
Medium
SQL Injection Attack Lab: A Hands-On Journey Through Database Exploitation
Comprehensive walkthrough of SQL injection techniques, schema enumeration, data extraction, and hash cracking.
⤷ Title: I Roasted a Service Account and Walked Out with the Whole Domain: TryHackMe Attacktive Directory
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:14:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #tryhackme #active_directory #penetration_testing
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:14:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #tryhackme #active_directory #penetration_testing
Medium
I Roasted a Service Account and Walked Out with the Whole Domain: TryHackMe Attacktive Directory
Every Active Directory lab I’ve done has taught me something new. My home lab taught me how to build a domain and tear it apart. The…
⤷ Title: Prompt Engineering for Hackers
════════════════════════
𐀪 Author: Spectat0rguy
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 22:29:43 GMT
════════════════════════
⌗ Tags: #infosec #hacking #bug_bounty #information_security #cybersecurity
════════════════════════
𐀪 Author: Spectat0rguy
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 22:29:43 GMT
════════════════════════
⌗ Tags: #infosec #hacking #bug_bounty #information_security #cybersecurity
Medium
Prompt Engineering for Hackers
The Unfair Advantage in Modern Bug Bounty