⤷ Title: 13 Dark Web OSINT Tools You’ll Wish You Knew About Sooner
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:42:09 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #hacking #intelligence #darkweb
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:42:09 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #hacking #intelligence #darkweb
Medium
13 Dark Web OSINT Tools You’ll Wish You Knew About Sooner
The dark web can be a rich source of intelligence, but only if you approach it with structure, discipline, and a clear toolkit.
⤷ Title: Phone Numbers Hide DARK SECRETS. This Chrome Hack Exposes Them Instantly!
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:40:39 GMT
════════════════════════
⌗ Tags: #chrome #osint #cyber_security_awareness #hacking #cybersecurity
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:40:39 GMT
════════════════════════
⌗ Tags: #chrome #osint #cyber_security_awareness #hacking #cybersecurity
Medium
Phone Numbers Hide DARK SECRETS. This Chrome Hack Exposes Them Instantly!
Phone numbers are everywhere in investigations, from suspicious calls to fraud leads, but turning a simple digit string into real…
⤷ Title: How I completed eJPTv2 in 6 hours ?Tips and Tricks (2026)
════════════════════════
𐀪 Author: ARoy
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:22 GMT
════════════════════════
⌗ Tags: #ine_security #cybersecurity #infosec #ejpt #my_ejpt_experience
════════════════════════
𐀪 Author: ARoy
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:22 GMT
════════════════════════
⌗ Tags: #ine_security #cybersecurity #infosec #ejpt #my_ejpt_experience
Medium
How I completed eJPTv2 in 6 hours ?Tips and Tricks (2026)
This will be a short list of tips and tricks for those who are going to attempt or are currently attempting the exam, based purely on my…
⤷ Title: Top 10 Skills Every Ethical Hacker Must Master
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:40:20 GMT
════════════════════════
⌗ Tags: #tech #ethical_hacking #roadmaps #cybersecurity #infosec
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:40:20 GMT
════════════════════════
⌗ Tags: #tech #ethical_hacking #roadmaps #cybersecurity #infosec
Medium
Top 10 Skills Every Ethical Hacker Must Master
A Complete Roadmap for Beginners to Think, Hack and Defend Like a Pro
⤷ Title: What is OS command injection?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:48:51 GMT
════════════════════════
⌗ Tags: #binaryshield #cybersecurity #penetration_testing #os_command_injection #ethical_hacking
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:48:51 GMT
════════════════════════
⌗ Tags: #binaryshield #cybersecurity #penetration_testing #os_command_injection #ethical_hacking
Medium
What is OS command injection?
1. What it is (very simple, no jargon)
⤷ Title: What are JWT vulnerabilities?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:48:14 GMT
════════════════════════
⌗ Tags: #jwt #cybersecurity #binaryshield #penetration_testing #ethical_hacking
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:48:14 GMT
════════════════════════
⌗ Tags: #jwt #cybersecurity #binaryshield #penetration_testing #ethical_hacking
Medium
What are JWT vulnerabilities?
🟡 1. What it is (very simple definition)
⤷ Title: ️ Unearthing the Truth in DC-1 | From Drupalgeddon to Root ️
════════════════════════
𐀪 Author: Nicholas Mullenski
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:50 GMT
════════════════════════
⌗ Tags: #technology #penetration_testing #offsec #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Nicholas Mullenski
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:50 GMT
════════════════════════
⌗ Tags: #technology #penetration_testing #offsec #cybersecurity #ethical_hacking
Medium
🛡️ Unearthing the Truth in DC-1 | From Drupalgeddon to Root 🛡️
From unpatched CMS flaws to SUID privilege escalation, we sweep the house to find every hidden flag. 100% completion rooted in precision…
⤷ Title: Ensuring Windows Security
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:48 GMT
════════════════════════
⌗ Tags: #windows_security #cybersecurity #penetration_testing #microsoft_windows_series #windows
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:48 GMT
════════════════════════
⌗ Tags: #windows_security #cybersecurity #penetration_testing #microsoft_windows_series #windows
Medium
Ensuring Windows Security
Microsoft Windows Complete Guide Part 7
⤷ Title: We Thought It Was Just a Slow Computer… — Until the Ransomware Note Appeared
════════════════════════
𐀪 Author: WEBULITY
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:56:38 GMT
════════════════════════
⌗ Tags: #ai_agent #technology #ethical_hacking #blockchain_technology #ransomware
════════════════════════
𐀪 Author: WEBULITY
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:56:38 GMT
════════════════════════
⌗ Tags: #ai_agent #technology #ethical_hacking #blockchain_technology #ransomware
Medium
We Thought It Was Just a Slow Computer… — Until the Ransomware Note Appeared
Last Tuesday, a UK-based accounting firm logged in like any other morning.
⤷ Title: Securing AI-Powered APIs: What API Security Looks Like in the Age of LLMs
════════════════════════
𐀪 Author: Maryblessing
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:19:33 GMT
════════════════════════
⌗ Tags: #api_security #llm #ai #cybersecurity #api
════════════════════════
𐀪 Author: Maryblessing
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:19:33 GMT
════════════════════════
⌗ Tags: #api_security #llm #ai #cybersecurity #api
Medium
Securing AI-Powered APIs: What API Security Looks Like in the Age of LLMs
Introduction
⤷ Title: Critical CISA Advisory Unmasks Severe Flaws in EV2GO Charging Networks
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:50:05 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA advisory #Critical Infrastructure #CVE_2026_24731 #EV Charging Security #EV2GO #ICS #ICSA_26_057_04 #industrial control systems #infosec #OCPP #WebSocket Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:50:05 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA advisory #Critical Infrastructure #CVE_2026_24731 #EV Charging Security #EV2GO #ICS #ICSA_26_057_04 #industrial control systems #infosec #OCPP #WebSocket Vulnerability
Daily CyberSecurity
Critical CISA Advisory Unmasks Severe Flaws in EV2GO Charging Networks
CISA issues an urgent ICS advisory (ICSA-26-057-04) for the EV2GO charging platform. Critical 9.4 severity flaws allow for session hijacking and station impersonation.
⤷ Title: Lab: DOM XSS in document.write sink using source location.search inside a select element
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:39:16 GMT
════════════════════════
⌗ Tags: #xss_attack #hacking #cybersecurity #ctf #bug_bounty
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:39:16 GMT
════════════════════════
⌗ Tags: #xss_attack #hacking #cybersecurity #ctf #bug_bounty
Medium
Lab: DOM XSS in document.write sink using source location.search inside a select element
Lab Overview
⤷ Title: Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:27:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:27:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Google Groups OSINT for Pentesting
════════════════════════
𐀪 Author: Abhirup Konwar
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:10:27 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #hacking #osint #osint_tool
════════════════════════
𐀪 Author: Abhirup Konwar
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:10:27 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #hacking #osint #osint_tool
Medium
Google Groups OSINT for Pentesting
Passive recon techniques to increase vulnerability attack surface
⤷ Title: What is Bug Bounty And How Real Hackers Find Bugs
════════════════════════
𐀪 Author: Novashield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:28:52 GMT
════════════════════════
⌗ Tags: #bug_bounty #vulnerability #hacker #cyber_security_awareness #privacy
════════════════════════
𐀪 Author: Novashield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:28:52 GMT
════════════════════════
⌗ Tags: #bug_bounty #vulnerability #hacker #cyber_security_awareness #privacy
Medium
What is Bug Bounty And How Real Hackers Find Bugs
Bug bounty, as the name suggests, is a program in which ethical hackers try to identify vulnerabilities and threats in an application…
⤷ Title: The path to the core
════════════════════════
𐀪 Author: Progsky
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:49:27 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Progsky
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:49:27 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ethical_hacking
Medium
The path to the core
What can be done at the application level? Execute an unprivileged processor command, access a user memory cell, or make a system call…
⤷ Title: I tried to solve the ctf challenge about finding the flag by logging into a user whose password is…
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:22:58 GMT
════════════════════════
⌗ Tags: #cookies #web_exploitation #burpsuite #hacking #ctf
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:22:58 GMT
════════════════════════
⌗ Tags: #cookies #web_exploitation #burpsuite #hacking #ctf
Medium
I tried to solve the ctf challenge about finding the flag by logging into a user whose password is very secure
Here I use the challenge from PicoCTF
⤷ Title: The Immutable Command: An Exhaustive Analysis of Aeternum C2, Blockchain Infrastructure Abuse, and…
════════════════════════
𐀪 Author: Rakibul Hasan Sagor
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:00:54 GMT
════════════════════════
⌗ Tags: #data_breach #hacking
════════════════════════
𐀪 Author: Rakibul Hasan Sagor
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:00:54 GMT
════════════════════════
⌗ Tags: #data_breach #hacking
Medium
The Immutable Command: An Exhaustive Analysis of Aeternum C2, Blockchain Infrastructure Abuse, and…
The structural architecture of cybercrime is undergoing a profound and irreversible metamorphosis. For over two decades, the operational…
⤷ Title: TryHackMe — Walking An Application (Walkthrough)
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:08:24 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #tryhackme_pentest #walking_an_application
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:08:24 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #tryhackme_pentest #walking_an_application
Medium
TryHackMe — Walking An Application (Walkthrough)
In this room, we will learn how to manually review a web application for security issues using only the in-built tools in our browser.
⤷ Title: TryHackMe Pre Security (SEC0) Exam Review
════════════════════════
𐀪 Author: Rich
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:00:19 GMT
════════════════════════
⌗ Tags: #certification #tryhackme #cybersecurity #hands_on_learning #tryhackme_challenge
════════════════════════
𐀪 Author: Rich
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:00:19 GMT
════════════════════════
⌗ Tags: #certification #tryhackme #cybersecurity #hands_on_learning #tryhackme_challenge
Medium
TryHackMe Pre Security (SEC0) Exam Review
TL;DR This is my review of TryHackMe’s brand new Pre Security (SEC0) exam.
⤷ Title: Advent of The Relics 2 — Operation Winter Blackout
════════════════════════
𐀪 Author: Dimas Adrian
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:24:56 GMT
════════════════════════
⌗ Tags: #investigation #cybercrime #hackthebox_writeup #cybersecurity #hackthebox
════════════════════════
𐀪 Author: Dimas Adrian
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:24:56 GMT
════════════════════════
⌗ Tags: #investigation #cybercrime #hackthebox_writeup #cybersecurity #hackthebox
Medium
Advent of The Relics 2 — Operation Winter Blackout
After dealing with the phising incident in AoTR, things escalated quickly.