⤷ Title: Authentication Bypass | TryHackMe Write-up
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:00:30 GMT
════════════════════════
⌗ Tags: #tryhackme #authenticity #ctf_writeup #farro #security
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:00:30 GMT
════════════════════════
⌗ Tags: #tryhackme #authenticity #ctf_writeup #farro #security
Medium
Authentication Bypass | TryHackMe Write-up
Non-members are welcome to access the full story here.
⤷ Title: Advent of The Relics 2 — Operation Winter Blackout
════════════════════════
𐀪 Author: Firman Maulana
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 08:13:14 GMT
════════════════════════
⌗ Tags: #forensik_digital #advent_of_the_relics_2 #hackthebox_writeup
════════════════════════
𐀪 Author: Firman Maulana
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 08:13:14 GMT
════════════════════════
⌗ Tags: #forensik_digital #advent_of_the_relics_2 #hackthebox_writeup
Medium
Advent of The Relics 2 — Operation Winter Blackout
Penulis: Firman Maulana
⤷ Title: सायबर सुरक्षा आणि एथिकल हॅकिंग: डिजिटल युगातील अभेद्य कवच
════════════════════════
𐀪 Author: Smit Shah
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 07:37:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #intelligence
════════════════════════
𐀪 Author: Smit Shah
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 07:37:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #intelligence
Medium
सायबर सुरक्षा आणि एथिकल हॅकिंग: डिजिटल युगातील अभेद्य कवच
आजच्या पूर्णपणे डिजिटलाइज्ड जगामध्ये डेटा हा ‘नवे तेल’ (New Oil) मानला जातो, परंतु या डेटाची सुरक्षा करणे हे तंत्रज्ञान क्षेत्रापुढील…
⤷ Title: ethical hacking
════════════════════════
𐀪 Author: Aathiraks
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:59:26 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Aathiraks
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:59:26 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
ethical hacking
ethical hacking course in trivandrum
⤷ Title: Clicks for Cash: How X’s Revenue Programme Is Fuelling a Fake News Economy
════════════════════════
𐀪 Author: Francis Oyelami
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 08:49:32 GMT
════════════════════════
⌗ Tags: #revenue #social_media #xs
════════════════════════
𐀪 Author: Francis Oyelami
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 08:49:32 GMT
════════════════════════
⌗ Tags: #revenue #social_media #xs
Medium
Clicks for Cash: How X’s Revenue Programme Is Fuelling a Fake News Economy
Clicks for Cash: How X’s Revenue Programme Is Fuelling a Fake News Economy How creator payouts on X are rewarding misinformation — and what it means for real people and communities Imagine being …
⤷ Title: Security Best Practices: Protecting Your Application
════════════════════════
𐀪 Author: Yakhilesh
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 07:20:54 GMT
════════════════════════
⌗ Tags: #software_development #xss_vulnerability #ssrf_attack #security
════════════════════════
𐀪 Author: Yakhilesh
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 07:20:54 GMT
════════════════════════
⌗ Tags: #software_development #xss_vulnerability #ssrf_attack #security
Medium
Security Best Practices: Protecting Your Application
When Security Feels Overwhelming
⤷ Title: Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:26:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:26:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Breaking Authentication — Part 4
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:22:46 GMT
════════════════════════
⌗ Tags: #security #hacking #cybersecurity #bug_bounty #business
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:22:46 GMT
════════════════════════
⌗ Tags: #security #hacking #cybersecurity #bug_bounty #business
Medium
Breaking Authentication — Part 4
Breaking Authentication — Part 4
⤷ Title: When a Report Generator Lets You Write the Query (in Production)
════════════════════════
𐀪 Author: Jobson
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:16:20 GMT
════════════════════════
⌗ Tags: #vulnerability #sql_injection #hacking #bug_bounty #penetration_testing
════════════════════════
𐀪 Author: Jobson
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:16:20 GMT
════════════════════════
⌗ Tags: #vulnerability #sql_injection #hacking #bug_bounty #penetration_testing
Medium
When a Report Generator Lets You Write the Query (in Production)
Hello world, I’m back with something that piqued my interest.
⤷ Title: The 3 Filters That Turn LeakRadar Into a Bug Bounty Weapon
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:01:00 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #bug_bounty_tips #infosec #bug_bounty
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:01:00 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #bug_bounty_tips #infosec #bug_bounty
Medium
The 3 Filters That Turn LeakRadar Into a Bug Bounty Weapon
LeakRadar has 283 billion credentials. Most are noise.
⤷ Title: Shady Oaks Financial writeup (BFLA) (Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:58:46 GMT
════════════════════════
⌗ Tags: #hacking #ctf #ctf_writeup
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:58:46 GMT
════════════════════════
⌗ Tags: #hacking #ctf #ctf_writeup
Medium
Shady Oaks Financial writeup (BFLA) (Bugforge)
Step 1: Register & Upgrade
⤷ Title: Cloning a Bank UI Won’t Hack It! Here’s Why.
════════════════════════
𐀪 Author: Rishabh Srivastava
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:44:33 GMT
════════════════════════
⌗ Tags: #web_development #csrf #hacking #security #banking
════════════════════════
𐀪 Author: Rishabh Srivastava
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:44:33 GMT
════════════════════════
⌗ Tags: #web_development #csrf #hacking #security #banking
Medium
Cloning a Bank UI Won’t Hack It! Here’s Why.
We’ve all seen it.
Someone says:
“What if I clone the exact UI of a bank application, and try to host it on similar URL and starts to send…
Someone says:
“What if I clone the exact UI of a bank application, and try to host it on similar URL and starts to send…
⤷ Title: Certified Ethical Hacking
════════════════════════
𐀪 Author: Gigadexterity
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:41:01 GMT
════════════════════════
⌗ Tags: #ethical_hacking #malware #ai #hacking
════════════════════════
𐀪 Author: Gigadexterity
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:41:01 GMT
════════════════════════
⌗ Tags: #ethical_hacking #malware #ai #hacking
Medium
Certified Ethical Hacking
In today’s hyper-connected world, information security is no longer optional — it’s critical. Organizations face a growing number of cyber…
⤷ Title: Wiz Cloud Hunting Games Challenge Writeup: A Complete Cloud Attack Chain
════════════════════════
𐀪 Author: Bpple
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:26:15 GMT
════════════════════════
⌗ Tags: #hacking #security #web_development #aws #cloud_computing
════════════════════════
𐀪 Author: Bpple
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:26:15 GMT
════════════════════════
⌗ Tags: #hacking #security #web_development #aws #cloud_computing
Medium
Wiz Cloud Hunting Games Challenge Writeup: A Complete Cloud Attack Chain
Wiz’s cloud security challenge is of excellent quality. The challenges in this CTF chain together into a complete attack chain, covering…
⤷ Title: Strong Passwords vs Weak Passwords: The Small Habit That Prevents Big Breaches
════════════════════════
𐀪 Author: Rela Lumbini
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:45:55 GMT
════════════════════════
⌗ Tags: #digital_security #strong_password #weak_passwords #infosec_write_ups #infosec
════════════════════════
𐀪 Author: Rela Lumbini
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:45:55 GMT
════════════════════════
⌗ Tags: #digital_security #strong_password #weak_passwords #infosec_write_ups #infosec
Medium
Strong Passwords vs Weak Passwords: The Small Habit That Prevents Big Breaches
In cybersecurity discussions, we often hear about malware, ransomware, zero-day vulnerabilities, and advanced attacks.
⤷ Title: Incident Response and Digital Forensics in Cybersecurity
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:38:17 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity_online #ethical_hacking_course #codered_pro_cybersecurity
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:38:17 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity_online #ethical_hacking_course #codered_pro_cybersecurity
Medium
Incident Response and Digital Forensics in Cybersecurity
Introduction
⤷ Title: SQL Injection Vulnerability in Appointment Check-In Endpoint — Patient Queue Management System…
════════════════════════
𐀪 Author: Ravi Pipalwa
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:23:33 GMT
════════════════════════
⌗ Tags: #web_application_security #penetration_testing #sql_injection #cve #cve_hunting
════════════════════════
𐀪 Author: Ravi Pipalwa
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:23:33 GMT
════════════════════════
⌗ Tags: #web_application_security #penetration_testing #sql_injection #cve #cve_hunting
Medium
SQL Injection Vulnerability in Appointment Check-In Endpoint — Patient Queue Management System…
Overview
⤷ Title: Stored Cross-Site Scripting (XSS) in Reservation Management — SourceCodester Resort Reservation…
════════════════════════
𐀪 Author: Ravi Pipalwa
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:12:49 GMT
════════════════════════
⌗ Tags: #cve #xss_attack #cross_site_noscripting #cve_hunting #penetration_testing
════════════════════════
𐀪 Author: Ravi Pipalwa
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:12:49 GMT
════════════════════════
⌗ Tags: #cve #xss_attack #cross_site_noscripting #cve_hunting #penetration_testing
Medium
Stored Cross-Site Scripting (XSS) in Reservation Management — SourceCodester Resort Reservation…
Overview
⤷ Title: Authentication Bypass | TryHackMe Write-up | Farros
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:00:30 GMT
════════════════════════
⌗ Tags: #tryhackme #authenticity #ctf_writeup #farro #security
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:00:30 GMT
════════════════════════
⌗ Tags: #tryhackme #authenticity #ctf_writeup #farro #security
Medium
Authentication Bypass | TryHackMe Write-up
Non-members are welcome to access the full story here.
⤷ Title: 1.Scope, Legality, and Ethics of Ethical Hacking
════════════════════════
𐀪 Author: Waqashk
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:47:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Waqashk
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:47:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
1.Scope, Legality, and Ethics of Ethical Hacking
Scope of Ethical Hacking:
⤷ Title: SOC336 — Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025–21298)
════════════════════════
𐀪 Author: Pablo Rodriguez Sanz
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:44:06 GMT
════════════════════════
⌗ Tags: #soc_analyst #blue_team #rce #lets_defend
════════════════════════
𐀪 Author: Pablo Rodriguez Sanz
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:44:06 GMT
════════════════════════
⌗ Tags: #soc_analyst #blue_team #rce #lets_defend
Medium
SOC336 — Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025–21298)
Scenario