⤷ Title: How to Identify Industry-Oriented Cyber Security Programs.
════════════════════════
𐀪 Author: logging security
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 11:17:42 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #ethical_hacking #cybersecurity_awareness
════════════════════════
𐀪 Author: logging security
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 11:17:42 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #ethical_hacking #cybersecurity_awareness
Medium
How to Identify Industry-Oriented Cyber Security Programs.
Choosing the right cybersecurity program can shape your entire career because it’s about investing in your future. Today, many students…
⤷ Title: DVWA: Command Injection Vulnerability (Low Security)
════════════════════════
𐀪 Author: Kamal S
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:33:54 GMT
════════════════════════
⌗ Tags: #bug_bounty #pentesting #dvwa #command_injection #owasp
════════════════════════
𐀪 Author: Kamal S
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:33:54 GMT
════════════════════════
⌗ Tags: #bug_bounty #pentesting #dvwa #command_injection #owasp
Medium
DVWA: Command Injection Vulnerability (Low Security)
Command Injection is one of the most critical web application vulnerability because it allows an attacker to execute operating system…
⤷ Title: Lab: DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:58:02 GMT
════════════════════════
⌗ Tags: #ctf #javanoscript #hacking #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:58:02 GMT
════════════════════════
⌗ Tags: #ctf #javanoscript #hacking #cybersecurity #bug_bounty
Medium
Lab: DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded
Lab Overview
⤷ Title: PyRIT Ship — Linux version
════════════════════════
𐀪 Author: 喂美女你好!
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:11:48 GMT
════════════════════════
⌗ Tags: #offensive_security #ai #application_security
════════════════════════
𐀪 Author: 喂美女你好!
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:11:48 GMT
════════════════════════
⌗ Tags: #offensive_security #ai #application_security
Medium
PyRIT Ship — Linux version
This is the Linux version of https://youtu.be/lkCnueQhbss?si=3Nx1KaOg08zTzEXd which sets up PyRIT & PyRIT-Ship for Burpsuite.
⤷ Title: Ottergram writeup (BAC) (Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:31:40 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #ctf
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:31:40 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #ctf
Medium
Ottergram writeup (BAC) (Bugforge)
Step 1: Register and comment
⤷ Title: The Cryptography Paradox: Why Do You Have to Share Your "Private" Key? (Key Escrow)
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:38:39 GMT
════════════════════════
⌗ Tags: #information_security #infosec #cybersecurity #cryptography #programming
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:38:39 GMT
════════════════════════
⌗ Tags: #information_security #infosec #cybersecurity #cryptography #programming
Medium
The Cryptography Paradox: Why Do You Have to Share Your "Private" Key? (Key Escrow)
🔴Note: This article is about the reason why we share our private keys! In the later articles, we will talk about mathematics and algorithm…
⤷ Title: How I Exploited an Exposed Redis Server on HTB’s Redeemer Machine
════════════════════════
𐀪 Author: Omar Abdelmetaal
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:00:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #nmap #htb_writeup #htb
════════════════════════
𐀪 Author: Omar Abdelmetaal
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:00:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #nmap #htb_writeup #htb
Medium
How I Exploited an Exposed Redis Server on HTB’s Redeemer Machine
In this walkthrough, I’ll share my approach to solving the Redeemer machine on Hack The Box, a Linux target designed to teach the basics of…
⤷ Title: Dancing with SMB: Exploring Misconfigured Windows Shares on HTB
════════════════════════
𐀪 Author: Omar Abdelmetaal
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:15:56 GMT
════════════════════════
⌗ Tags: #smb #penetration_testing #htb_writeup #htb #cybersecurity
════════════════════════
𐀪 Author: Omar Abdelmetaal
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:15:56 GMT
════════════════════════
⌗ Tags: #smb #penetration_testing #htb_writeup #htb #cybersecurity
Medium
Dancing with SMB: Exploring Misconfigured Windows Shares on HTB
Windows file sharing can be convenient, but a misconfigured Server Message Block service can turn it into an easy target. In this HTB lab…
⤷ Title: TryHackMe FREE CTF Walkthrough- Love at First Breach 2026: Valenfind
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:32:47 GMT
════════════════════════
⌗ Tags: #lfi #tryhackme_walkthrough #valenfind #love_at_first_breach_2026 #tryhackme
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:32:47 GMT
════════════════════════
⌗ Tags: #lfi #tryhackme_walkthrough #valenfind #love_at_first_breach_2026 #tryhackme
Medium
TryHackMe CTF Walkthrough- Love at First Breach 2026: Valenfind
Difficulty: Medium | Category: Web
⤷ Title: TryHackMe — DogCat Writeup
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:05:33 GMT
════════════════════════
⌗ Tags: #linux #ctf #cybersecurity #tryhackme #ethical_hacking
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:05:33 GMT
════════════════════════
⌗ Tags: #linux #ctf #cybersecurity #tryhackme #ethical_hacking
Medium
TryHackMe — DogCat Writeup
My first Medium difficulty machine - covering LFI, Log Poisoning, RCE, Privilege Escalation, and Docker Escape.
⤷ Title: Solving a Bugforge Challenge — Exploiting Role Tampering in Shady Oaks Financial
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:45:15 GMT
════════════════════════
⌗ Tags: #caido #cybersecurity #privilege_escalation #bugforge #ethical_hacking
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:45:15 GMT
════════════════════════
⌗ Tags: #caido #cybersecurity #privilege_escalation #bugforge #ethical_hacking
Medium
Solving a Bugforge Challenge — Exploiting Role Tampering in Shady Oaks Financial
Today, I solved another challenge on Bugforge, targeting a financial trading web application called Shady Oaks Financial.
⤷ Title: Day 10 — Dumping Passwords With UNION (SQL Injection Escalates)
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:41:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #sql_injection #pentesting #ethical_hacking #vapt
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:41:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #sql_injection #pentesting #ethical_hacking #vapt
Medium
🚀 Day 10 — Dumping Passwords With UNION (SQL Injection Escalates)
Target Application: https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: Network Pivoting Explained for OSCP | Step-by-Step Walkthrough
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:19:00 GMT
════════════════════════
⌗ Tags: #vulnerability #ethical_hacking #oscp #information_security #cybersecurity
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:19:00 GMT
════════════════════════
⌗ Tags: #vulnerability #ethical_hacking #oscp #information_security #cybersecurity
Medium
🔥Network Pivoting Explained for OSCP | Step-by-Step Walkthrough
By cyber_public_school | Cyber Security Researcher
⤷ Title: Metasploit Tutorial for Beginners: Gain Remote Access in 10 Minutes
════════════════════════
𐀪 Author: The SecOps Lead
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:18:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #kali_linux #ethical_hacking #remote_access #metasploit
════════════════════════
𐀪 Author: The SecOps Lead
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:18:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #kali_linux #ethical_hacking #remote_access #metasploit
Medium
Metasploit Tutorial for Beginners: Gain Remote Access in 10 Minutes
If you are new to cybersecurity, the first time you open Metasploit Framework it can feel overwhelming.
⤷ Title: Extracting Installed Applications (APK) from Android
════════════════════════
𐀪 Author: Ch. Thedorou
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:35:19 GMT
════════════════════════
⌗ Tags: #mobile_hacking #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Ch. Thedorou
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:35:19 GMT
════════════════════════
⌗ Tags: #mobile_hacking #penetration_testing #bug_bounty
Medium
Extracting Installed Applications (APK) from Android
Hello, in today’s article, we will learn how to manually extract APK files from an Android device. Then, we will automate the process to…
⤷ Title: The-Ultimate-Nuclei-Guide For Hackers In 2026:-
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:01:00 GMT
════════════════════════
⌗ Tags: #ai #nucleus #cybersecurity #bug_bounty #generative_ai_tools
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:01:00 GMT
════════════════════════
⌗ Tags: #ai #nucleus #cybersecurity #bug_bounty #generative_ai_tools
Medium
The-Ultimate-Nuclei-Guide For Hackers In 2026:-
This Scanner That Changed Everything…
⤷ Title: Prompt Injection Is the New SQL Injection
════════════════════════
𐀪 Author: Tara Prasad Routray
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:13:45 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #software_development #cybersecurity #software_engineering #hacking
════════════════════════
𐀪 Author: Tara Prasad Routray
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:13:45 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #software_development #cybersecurity #software_engineering #hacking
Medium
Prompt Injection Is the New SQL Injection
LLM-powered systems are repeating a classic security mistake: merging untrusted input with executable logic, and attackers are already…
⤷ Title: New Wave of “gov-*.bond” Domains Registered — Coordinated Phishing Infrastructure?
════════════════════════
𐀪 Author: Natasha Fuller / Founder of weAFAR Global Justice
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:18:57 GMT
════════════════════════
⌗ Tags: #infosec #phishing #cybersecurity #threat_intelligence #online_fraud
════════════════════════
𐀪 Author: Natasha Fuller / Founder of weAFAR Global Justice
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:18:57 GMT
════════════════════════
⌗ Tags: #infosec #phishing #cybersecurity #threat_intelligence #online_fraud
Medium
🚨 New Wave of “gov-*.bond” Domains Registered — Coordinated Phishing Infrastructure?
Over the past weeks, I have been tracking a cluster of suspicious domains using the pattern:
⤷ Title: TryHackMe: Offensive Security Intro Walkthrough
════════════════════════
𐀪 Author: Nadeenmoreb
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:54:04 GMT
════════════════════════
⌗ Tags: #penetration_testing #tryhackme_walkthrough #offensive_security #cybersecurity #red_team
════════════════════════
𐀪 Author: Nadeenmoreb
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:54:04 GMT
════════════════════════
⌗ Tags: #penetration_testing #tryhackme_walkthrough #offensive_security #cybersecurity #red_team
Medium
TryHackMe: Offensive Security Intro Walkthrough
Tryhackme is your way to go if you want to start learning ethical hacking, not only it gives a blend of both theoretical and practical…
⤷ Title: ChatGPT as a Covert C2 Channel
════════════════════════
𐀪 Author: Eslam Hussein
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:51:39 GMT
════════════════════════
⌗ Tags: #information_security #red_teaming #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Eslam Hussein
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:51:39 GMT
════════════════════════
⌗ Tags: #information_security #red_teaming #penetration_testing #cybersecurity
Medium
ChatGPT as a Covert C2 Channel
The Challenge: Data Exfiltration with Zero External Connectivity
⤷ Title: TryHackMe FREE CTF Walkthrough- Love at First Breach 2026: Hidden Deep into my Heart
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:10:15 GMT
════════════════════════
⌗ Tags: #robotstxt #tryhackme #tryhackme_walkthrough #love_at_first_breach_2026 #ctf_walkthrough
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:10:15 GMT
════════════════════════
⌗ Tags: #robotstxt #tryhackme #tryhackme_walkthrough #love_at_first_breach_2026 #ctf_walkthrough
Medium
TryHackMe CTF Walkthrough- Love at First Breach 2026: Hidden Deep into my Heart
Difficulty: Easy | Category: Web