⤷ Title: Wordpress: CVE-2021–29447 (THM) Tryhackme Write-Up With Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:16:32 GMT
════════════════════════
⌗ Tags: #hacking #wordpress #cybersecurity #tryhackme #vulnerability
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:16:32 GMT
════════════════════════
⌗ Tags: #hacking #wordpress #cybersecurity #tryhackme #vulnerability
Medium
Wordpress: CVE-2021–29447 (THM) Tryhackme Write-Up With Answer
Denoscription : Vulnerability allow a authenticated user whith low privilages upload a malicious WAV file that could lead to remote arbitrary…
⤷ Title: Cross-Site Scripting (XSS) Attack Lab: A Hands-On Journey Through Client-Side Exploitation
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:59:38 GMT
════════════════════════
⌗ Tags: #ethical_hacking #penetration_testing #web_development #cybersecurity #javanoscript
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:59:38 GMT
════════════════════════
⌗ Tags: #ethical_hacking #penetration_testing #web_development #cybersecurity #javanoscript
Medium
Cross-Site Scripting (XSS) Attack Lab: A Hands-On Journey Through Client-Side Exploitation
Comprehensive walkthrough of XSS exploitation techniques, from cookie theft to malicious redirection
⤷ Title: INE-Web Application Penetration Testing CTF 1 by Singkhon
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:41:00 GMT
════════════════════════
⌗ Tags: #coding #ctf #cybersecurity #penetration_testing #programming
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:41:00 GMT
════════════════════════
⌗ Tags: #coding #ctf #cybersecurity #penetration_testing #programming
Medium
INE-Web Application Penetration Testing CTF 1 by Singkhon
Hello, my name is Singkhon. After completing the eJPT course, I would like to share my methods and approaches for solving each CTF problem…
⤷ Title: SQL Injection Attack Lab: A Hands-On Journey Through Database Exploitation
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:24:11 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #sql #ethical_hacking #web_development
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:24:11 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #sql #ethical_hacking #web_development
Medium
SQL Injection Attack Lab: A Hands-On Journey Through Database Exploitation
Comprehensive walkthrough of SQL injection techniques, schema enumeration, data extraction, and hash cracking.
⤷ Title: I Roasted a Service Account and Walked Out with the Whole Domain: TryHackMe Attacktive Directory
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:14:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #tryhackme #active_directory #penetration_testing
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:14:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #tryhackme #active_directory #penetration_testing
Medium
I Roasted a Service Account and Walked Out with the Whole Domain: TryHackMe Attacktive Directory
Every Active Directory lab I’ve done has taught me something new. My home lab taught me how to build a domain and tear it apart. The…
⤷ Title: Prompt Engineering for Hackers
════════════════════════
𐀪 Author: Spectat0rguy
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 22:29:43 GMT
════════════════════════
⌗ Tags: #infosec #hacking #bug_bounty #information_security #cybersecurity
════════════════════════
𐀪 Author: Spectat0rguy
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 22:29:43 GMT
════════════════════════
⌗ Tags: #infosec #hacking #bug_bounty #information_security #cybersecurity
Medium
Prompt Engineering for Hackers
The Unfair Advantage in Modern Bug Bounty
⤷ Title: Find An Interesting Account Take-Over Vulnerability.
════════════════════════
𐀪 Author: Md Nawshad Ahmmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:44:12 GMT
════════════════════════
⌗ Tags: #bug_bounty #account_takeover #research_reports
════════════════════════
𐀪 Author: Md Nawshad Ahmmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:44:12 GMT
════════════════════════
⌗ Tags: #bug_bounty #account_takeover #research_reports
Medium
Find An Interesting Account Take-Over Vulnerability.
Account Takeover via Email Change Token Parameter(newUid) Manipulation
🔥1
⤷ Title: Cómo una API mal diseñada expuso los datos de todos los usuarios: IDOR, contraseñas en texto plano…
════════════════════════
𐀪 Author: C37webak1ix
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:38:05 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #web_security #ethical_hacking #api_security
════════════════════════
𐀪 Author: C37webak1ix
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:38:05 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #web_security #ethical_hacking #api_security
Medium
Cómo una API mal diseñada expuso los datos de todos los usuarios: IDOR, contraseñas en texto plano y más
Un caso real de cómo NO diseñar la seguridad de una aplicación
⤷ Title: The Day Admin Access Became an Organisation Takeover
════════════════════════
𐀪 Author: Kaivalya Gurav
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:38:03 GMT
════════════════════════
⌗ Tags: #infosec #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking
════════════════════════
𐀪 Author: Kaivalya Gurav
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:38:03 GMT
════════════════════════
⌗ Tags: #infosec #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking
Medium
The Day Admin Access Became an Organisation Takeover
Who am i
⤷ Title: ROT13 in terminal
════════════════════════
𐀪 Author: Abderrahim Aoudj
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:55:10 GMT
════════════════════════
⌗ Tags: #infosec #linux #cybersecurity #capture_the_flag
════════════════════════
𐀪 Author: Abderrahim Aoudj
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:55:10 GMT
════════════════════════
⌗ Tags: #infosec #linux #cybersecurity #capture_the_flag
Medium
ROT13 in terminal
Starting point with level 10 :
⤷ Title: Escape_202
════════════════════════
𐀪 Author: MS.Jix
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 22:16:27 GMT
════════════════════════
⌗ Tags: #linux_security #capture_the_flag #cybersecurity #web_security #ethical_hacking
════════════════════════
𐀪 Author: MS.Jix
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 22:16:27 GMT
════════════════════════
⌗ Tags: #linux_security #capture_the_flag #cybersecurity #web_security #ethical_hacking
Medium
Escape_202
http://cybertalents.com/challenges/web/escape_202
⤷ Title: Ethical Hacking
════════════════════════
𐀪 Author: Anas
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:51:42 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Anas
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:51:42 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
Ethical Hacking
Today I began expanding my knowledge in Ethical Hacking and Cybersecurity, focusing on how attackers operate and how organizations defend…
⤷ Title: Command Injection Nedir? DVWA Üzerinde Komut Çalıştırma Senaryosu
════════════════════════
𐀪 Author: Melih Yılmaz
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:28:10 GMT
════════════════════════
⌗ Tags: #command_injection #web_security #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Melih Yılmaz
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:28:10 GMT
════════════════════════
⌗ Tags: #command_injection #web_security #ethical_hacking #cybersecurity
Medium
Command Injection
Command Injection Command Injection Nedir? Command Injection (Komut Enjeksiyonu), bir uygulamanın kullanıcıdan aldığı girdiyi yeterli doğrulama ve filtreleme yapmadan sistem kabuğuna (shell) …
⤷ Title: Netcat Guide for Pentesting: Commands, Reverse Shells, and Exfiltration
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:01:03 GMT
════════════════════════
⌗ Tags: #networking #technology #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:01:03 GMT
════════════════════════
⌗ Tags: #networking #technology #hacking #cybersecurity #penetration_testing
Medium
Netcat Guide for Pentesting: Commands, Reverse Shells, and Exfiltration
Master Netcat for Bug Hunting: from banners and file transfers to reverse shells and firewall evasion.
⤷ Title: Redis to SYSTEM—TryHackMe VulnNet: Active
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:38:13 GMT
════════════════════════
⌗ Tags: #penetration_testing #redis #windows_security #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:38:13 GMT
════════════════════════
⌗ Tags: #penetration_testing #redis #windows_security #tryhackme #cybersecurity
Medium
Redis to SYSTEM—TryHackMe VulnNet: Active
Some boxes have one interesting thing. VulnNet: Active had a chain of them. Every step fed directly into the next, and by the end I had a…
⤷ Title: TryHackMe — Intro To Pwntools
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:09:05 GMT
════════════════════════
⌗ Tags: #writeup #ctf_writeup #tryhackme_walkthrough #tryhackme #tryhackme_writeup
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:09:05 GMT
════════════════════════
⌗ Tags: #writeup #ctf_writeup #tryhackme_walkthrough #tryhackme #tryhackme_writeup
Medium
TryHackMe — Intro To Pwntools
Task 1: Introduction
⤷ Title: Kali Linux Serisi#1: Yeni Başlayanlar İçin Kali Linux Nedir ve Neden Kullanılır?
════════════════════════
𐀪 Author: Şüheda Yavuz
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:10:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #kali_linux #bilgi_güvenliği #linux #siber_guvenlik
════════════════════════
𐀪 Author: Şüheda Yavuz
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:10:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #kali_linux #bilgi_güvenliği #linux #siber_guvenlik
Medium
Kali Linux Serisi#1: Yeni Başlayanlar İçin Kali Linux Nedir ve Neden Kullanılır?
Siber Güvenlik dünyasına adım atmak isteyen herkesin yolu bir noktada Kali Linux ile kesişir. Peki Kali Linux nedir? Neden Siber güvenlik…
⤷ Title: File Upload Exploit to Root Access — RootMe TryHackMe
════════════════════════
𐀪 Author: Mohamed Sayed (U S A N)
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:10:30 GMT
════════════════════════
⌗ Tags: #file_upload #rce #compromise #privilege_escalation #web_vulnerabilities
════════════════════════
𐀪 Author: Mohamed Sayed (U S A N)
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:10:30 GMT
════════════════════════
⌗ Tags: #file_upload #rce #compromise #privilege_escalation #web_vulnerabilities
Medium
File Upload Exploit to Root Access — RootMe TryHackMe
Here you can find it RootMe
⤷ Title: Massive SonicWall Reconnaissance Campaign Signals Imminent Ransomware Strikes
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 01:23:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Akira ransomware #Attack surface mapping #CVE_2024_53704 #Fog Ransomware #GreyNoise #infosec #reconnaissance #SonicOS #SonicWall #SSL VPN #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 01:23:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Akira ransomware #Attack surface mapping #CVE_2024_53704 #Fog Ransomware #GreyNoise #infosec #reconnaissance #SonicOS #SonicWall #SSL VPN #threat intelligence
Daily CyberSecurity
Massive SonicWall Reconnaissance Campaign Signals Imminent Ransomware Strikes
GreyNoise detects a coordinated surge in SonicWall reconnaissance. With over 84,000 scans, attackers are mapping VPNs for Akira and Fog ransomware strikes.
⤷ Title: AI-Powered Bug Hunting: 20 Tools to Dominate Your Next Recon
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:27 GMT
════════════════════════
⌗ Tags: #bug_bounty #ai_tools #ai #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:27 GMT
════════════════════════
⌗ Tags: #bug_bounty #ai_tools #ai #ethical_hacking #cybersecurity
Medium
AI-Powered Bug Hunting: 20 Tools to Dominate Your Next Recon
The landscape of vulnerability hunting has fundamentally shifted.
⤷ Title: 13 Dark Web OSINT Tools You’ll Wish You Knew About Sooner
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:42:09 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #hacking #intelligence #darkweb
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:42:09 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #hacking #intelligence #darkweb
Medium
13 Dark Web OSINT Tools You’ll Wish You Knew About Sooner
The dark web can be a rich source of intelligence, but only if you approach it with structure, discipline, and a clear toolkit.