⤷ Title: Command Injection Nedir? DVWA Üzerinde Komut Çalıştırma Senaryosu
════════════════════════
𐀪 Author: Melih Yılmaz
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:28:10 GMT
════════════════════════
⌗ Tags: #command_injection #web_security #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Melih Yılmaz
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 21:28:10 GMT
════════════════════════
⌗ Tags: #command_injection #web_security #ethical_hacking #cybersecurity
Medium
Command Injection
Command Injection Command Injection Nedir? Command Injection (Komut Enjeksiyonu), bir uygulamanın kullanıcıdan aldığı girdiyi yeterli doğrulama ve filtreleme yapmadan sistem kabuğuna (shell) …
⤷ Title: Netcat Guide for Pentesting: Commands, Reverse Shells, and Exfiltration
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:01:03 GMT
════════════════════════
⌗ Tags: #networking #technology #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:01:03 GMT
════════════════════════
⌗ Tags: #networking #technology #hacking #cybersecurity #penetration_testing
Medium
Netcat Guide for Pentesting: Commands, Reverse Shells, and Exfiltration
Master Netcat for Bug Hunting: from banners and file transfers to reverse shells and firewall evasion.
⤷ Title: Redis to SYSTEM—TryHackMe VulnNet: Active
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:38:13 GMT
════════════════════════
⌗ Tags: #penetration_testing #redis #windows_security #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:38:13 GMT
════════════════════════
⌗ Tags: #penetration_testing #redis #windows_security #tryhackme #cybersecurity
Medium
Redis to SYSTEM—TryHackMe VulnNet: Active
Some boxes have one interesting thing. VulnNet: Active had a chain of them. Every step fed directly into the next, and by the end I had a…
⤷ Title: TryHackMe — Intro To Pwntools
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:09:05 GMT
════════════════════════
⌗ Tags: #writeup #ctf_writeup #tryhackme_walkthrough #tryhackme #tryhackme_writeup
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:09:05 GMT
════════════════════════
⌗ Tags: #writeup #ctf_writeup #tryhackme_walkthrough #tryhackme #tryhackme_writeup
Medium
TryHackMe — Intro To Pwntools
Task 1: Introduction
⤷ Title: Kali Linux Serisi#1: Yeni Başlayanlar İçin Kali Linux Nedir ve Neden Kullanılır?
════════════════════════
𐀪 Author: Şüheda Yavuz
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:10:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #kali_linux #bilgi_güvenliği #linux #siber_guvenlik
════════════════════════
𐀪 Author: Şüheda Yavuz
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:10:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #kali_linux #bilgi_güvenliği #linux #siber_guvenlik
Medium
Kali Linux Serisi#1: Yeni Başlayanlar İçin Kali Linux Nedir ve Neden Kullanılır?
Siber Güvenlik dünyasına adım atmak isteyen herkesin yolu bir noktada Kali Linux ile kesişir. Peki Kali Linux nedir? Neden Siber güvenlik…
⤷ Title: File Upload Exploit to Root Access — RootMe TryHackMe
════════════════════════
𐀪 Author: Mohamed Sayed (U S A N)
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:10:30 GMT
════════════════════════
⌗ Tags: #file_upload #rce #compromise #privilege_escalation #web_vulnerabilities
════════════════════════
𐀪 Author: Mohamed Sayed (U S A N)
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:10:30 GMT
════════════════════════
⌗ Tags: #file_upload #rce #compromise #privilege_escalation #web_vulnerabilities
Medium
File Upload Exploit to Root Access — RootMe TryHackMe
Here you can find it RootMe
⤷ Title: Massive SonicWall Reconnaissance Campaign Signals Imminent Ransomware Strikes
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 01:23:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Akira ransomware #Attack surface mapping #CVE_2024_53704 #Fog Ransomware #GreyNoise #infosec #reconnaissance #SonicOS #SonicWall #SSL VPN #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 01:23:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Akira ransomware #Attack surface mapping #CVE_2024_53704 #Fog Ransomware #GreyNoise #infosec #reconnaissance #SonicOS #SonicWall #SSL VPN #threat intelligence
Daily CyberSecurity
Massive SonicWall Reconnaissance Campaign Signals Imminent Ransomware Strikes
GreyNoise detects a coordinated surge in SonicWall reconnaissance. With over 84,000 scans, attackers are mapping VPNs for Akira and Fog ransomware strikes.
⤷ Title: AI-Powered Bug Hunting: 20 Tools to Dominate Your Next Recon
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:27 GMT
════════════════════════
⌗ Tags: #bug_bounty #ai_tools #ai #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:27 GMT
════════════════════════
⌗ Tags: #bug_bounty #ai_tools #ai #ethical_hacking #cybersecurity
Medium
AI-Powered Bug Hunting: 20 Tools to Dominate Your Next Recon
The landscape of vulnerability hunting has fundamentally shifted.
⤷ Title: 13 Dark Web OSINT Tools You’ll Wish You Knew About Sooner
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:42:09 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #hacking #intelligence #darkweb
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:42:09 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #hacking #intelligence #darkweb
Medium
13 Dark Web OSINT Tools You’ll Wish You Knew About Sooner
The dark web can be a rich source of intelligence, but only if you approach it with structure, discipline, and a clear toolkit.
⤷ Title: Phone Numbers Hide DARK SECRETS. This Chrome Hack Exposes Them Instantly!
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:40:39 GMT
════════════════════════
⌗ Tags: #chrome #osint #cyber_security_awareness #hacking #cybersecurity
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:40:39 GMT
════════════════════════
⌗ Tags: #chrome #osint #cyber_security_awareness #hacking #cybersecurity
Medium
Phone Numbers Hide DARK SECRETS. This Chrome Hack Exposes Them Instantly!
Phone numbers are everywhere in investigations, from suspicious calls to fraud leads, but turning a simple digit string into real…
⤷ Title: How I completed eJPTv2 in 6 hours ?Tips and Tricks (2026)
════════════════════════
𐀪 Author: ARoy
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:22 GMT
════════════════════════
⌗ Tags: #ine_security #cybersecurity #infosec #ejpt #my_ejpt_experience
════════════════════════
𐀪 Author: ARoy
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:22 GMT
════════════════════════
⌗ Tags: #ine_security #cybersecurity #infosec #ejpt #my_ejpt_experience
Medium
How I completed eJPTv2 in 6 hours ?Tips and Tricks (2026)
This will be a short list of tips and tricks for those who are going to attempt or are currently attempting the exam, based purely on my…
⤷ Title: Top 10 Skills Every Ethical Hacker Must Master
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:40:20 GMT
════════════════════════
⌗ Tags: #tech #ethical_hacking #roadmaps #cybersecurity #infosec
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:40:20 GMT
════════════════════════
⌗ Tags: #tech #ethical_hacking #roadmaps #cybersecurity #infosec
Medium
Top 10 Skills Every Ethical Hacker Must Master
A Complete Roadmap for Beginners to Think, Hack and Defend Like a Pro
⤷ Title: What is OS command injection?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:48:51 GMT
════════════════════════
⌗ Tags: #binaryshield #cybersecurity #penetration_testing #os_command_injection #ethical_hacking
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:48:51 GMT
════════════════════════
⌗ Tags: #binaryshield #cybersecurity #penetration_testing #os_command_injection #ethical_hacking
Medium
What is OS command injection?
1. What it is (very simple, no jargon)
⤷ Title: What are JWT vulnerabilities?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:48:14 GMT
════════════════════════
⌗ Tags: #jwt #cybersecurity #binaryshield #penetration_testing #ethical_hacking
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:48:14 GMT
════════════════════════
⌗ Tags: #jwt #cybersecurity #binaryshield #penetration_testing #ethical_hacking
Medium
What are JWT vulnerabilities?
🟡 1. What it is (very simple definition)
⤷ Title: ️ Unearthing the Truth in DC-1 | From Drupalgeddon to Root ️
════════════════════════
𐀪 Author: Nicholas Mullenski
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:50 GMT
════════════════════════
⌗ Tags: #technology #penetration_testing #offsec #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Nicholas Mullenski
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:50 GMT
════════════════════════
⌗ Tags: #technology #penetration_testing #offsec #cybersecurity #ethical_hacking
Medium
🛡️ Unearthing the Truth in DC-1 | From Drupalgeddon to Root 🛡️
From unpatched CMS flaws to SUID privilege escalation, we sweep the house to find every hidden flag. 100% completion rooted in precision…
⤷ Title: Ensuring Windows Security
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:48 GMT
════════════════════════
⌗ Tags: #windows_security #cybersecurity #penetration_testing #microsoft_windows_series #windows
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:48 GMT
════════════════════════
⌗ Tags: #windows_security #cybersecurity #penetration_testing #microsoft_windows_series #windows
Medium
Ensuring Windows Security
Microsoft Windows Complete Guide Part 7
⤷ Title: We Thought It Was Just a Slow Computer… — Until the Ransomware Note Appeared
════════════════════════
𐀪 Author: WEBULITY
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:56:38 GMT
════════════════════════
⌗ Tags: #ai_agent #technology #ethical_hacking #blockchain_technology #ransomware
════════════════════════
𐀪 Author: WEBULITY
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:56:38 GMT
════════════════════════
⌗ Tags: #ai_agent #technology #ethical_hacking #blockchain_technology #ransomware
Medium
We Thought It Was Just a Slow Computer… — Until the Ransomware Note Appeared
Last Tuesday, a UK-based accounting firm logged in like any other morning.
⤷ Title: Securing AI-Powered APIs: What API Security Looks Like in the Age of LLMs
════════════════════════
𐀪 Author: Maryblessing
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:19:33 GMT
════════════════════════
⌗ Tags: #api_security #llm #ai #cybersecurity #api
════════════════════════
𐀪 Author: Maryblessing
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:19:33 GMT
════════════════════════
⌗ Tags: #api_security #llm #ai #cybersecurity #api
Medium
Securing AI-Powered APIs: What API Security Looks Like in the Age of LLMs
Introduction
⤷ Title: Critical CISA Advisory Unmasks Severe Flaws in EV2GO Charging Networks
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:50:05 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA advisory #Critical Infrastructure #CVE_2026_24731 #EV Charging Security #EV2GO #ICS #ICSA_26_057_04 #industrial control systems #infosec #OCPP #WebSocket Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:50:05 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA advisory #Critical Infrastructure #CVE_2026_24731 #EV Charging Security #EV2GO #ICS #ICSA_26_057_04 #industrial control systems #infosec #OCPP #WebSocket Vulnerability
Daily CyberSecurity
Critical CISA Advisory Unmasks Severe Flaws in EV2GO Charging Networks
CISA issues an urgent ICS advisory (ICSA-26-057-04) for the EV2GO charging platform. Critical 9.4 severity flaws allow for session hijacking and station impersonation.
⤷ Title: Lab: DOM XSS in document.write sink using source location.search inside a select element
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:39:16 GMT
════════════════════════
⌗ Tags: #xss_attack #hacking #cybersecurity #ctf #bug_bounty
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:39:16 GMT
════════════════════════
⌗ Tags: #xss_attack #hacking #cybersecurity #ctf #bug_bounty
Medium
Lab: DOM XSS in document.write sink using source location.search inside a select element
Lab Overview
⤷ Title: Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:27:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:27:00 +0530
════════════════════════
⌗ Tags: No_Tags