⤷ Title: Ottergram writeup (BAC) (Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:31:40 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #ctf
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:31:40 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #ctf
Medium
Ottergram writeup (BAC) (Bugforge)
Step 1: Register and comment
⤷ Title: The Cryptography Paradox: Why Do You Have to Share Your "Private" Key? (Key Escrow)
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:38:39 GMT
════════════════════════
⌗ Tags: #information_security #infosec #cybersecurity #cryptography #programming
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:38:39 GMT
════════════════════════
⌗ Tags: #information_security #infosec #cybersecurity #cryptography #programming
Medium
The Cryptography Paradox: Why Do You Have to Share Your "Private" Key? (Key Escrow)
🔴Note: This article is about the reason why we share our private keys! In the later articles, we will talk about mathematics and algorithm…
⤷ Title: How I Exploited an Exposed Redis Server on HTB’s Redeemer Machine
════════════════════════
𐀪 Author: Omar Abdelmetaal
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:00:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #nmap #htb_writeup #htb
════════════════════════
𐀪 Author: Omar Abdelmetaal
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:00:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #nmap #htb_writeup #htb
Medium
How I Exploited an Exposed Redis Server on HTB’s Redeemer Machine
In this walkthrough, I’ll share my approach to solving the Redeemer machine on Hack The Box, a Linux target designed to teach the basics of…
⤷ Title: Dancing with SMB: Exploring Misconfigured Windows Shares on HTB
════════════════════════
𐀪 Author: Omar Abdelmetaal
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:15:56 GMT
════════════════════════
⌗ Tags: #smb #penetration_testing #htb_writeup #htb #cybersecurity
════════════════════════
𐀪 Author: Omar Abdelmetaal
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:15:56 GMT
════════════════════════
⌗ Tags: #smb #penetration_testing #htb_writeup #htb #cybersecurity
Medium
Dancing with SMB: Exploring Misconfigured Windows Shares on HTB
Windows file sharing can be convenient, but a misconfigured Server Message Block service can turn it into an easy target. In this HTB lab…
⤷ Title: TryHackMe FREE CTF Walkthrough- Love at First Breach 2026: Valenfind
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:32:47 GMT
════════════════════════
⌗ Tags: #lfi #tryhackme_walkthrough #valenfind #love_at_first_breach_2026 #tryhackme
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:32:47 GMT
════════════════════════
⌗ Tags: #lfi #tryhackme_walkthrough #valenfind #love_at_first_breach_2026 #tryhackme
Medium
TryHackMe CTF Walkthrough- Love at First Breach 2026: Valenfind
Difficulty: Medium | Category: Web
⤷ Title: TryHackMe — DogCat Writeup
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:05:33 GMT
════════════════════════
⌗ Tags: #linux #ctf #cybersecurity #tryhackme #ethical_hacking
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:05:33 GMT
════════════════════════
⌗ Tags: #linux #ctf #cybersecurity #tryhackme #ethical_hacking
Medium
TryHackMe — DogCat Writeup
My first Medium difficulty machine - covering LFI, Log Poisoning, RCE, Privilege Escalation, and Docker Escape.
⤷ Title: Solving a Bugforge Challenge — Exploiting Role Tampering in Shady Oaks Financial
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:45:15 GMT
════════════════════════
⌗ Tags: #caido #cybersecurity #privilege_escalation #bugforge #ethical_hacking
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:45:15 GMT
════════════════════════
⌗ Tags: #caido #cybersecurity #privilege_escalation #bugforge #ethical_hacking
Medium
Solving a Bugforge Challenge — Exploiting Role Tampering in Shady Oaks Financial
Today, I solved another challenge on Bugforge, targeting a financial trading web application called Shady Oaks Financial.
⤷ Title: Day 10 — Dumping Passwords With UNION (SQL Injection Escalates)
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:41:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #sql_injection #pentesting #ethical_hacking #vapt
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:41:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #sql_injection #pentesting #ethical_hacking #vapt
Medium
🚀 Day 10 — Dumping Passwords With UNION (SQL Injection Escalates)
Target Application: https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: Network Pivoting Explained for OSCP | Step-by-Step Walkthrough
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:19:00 GMT
════════════════════════
⌗ Tags: #vulnerability #ethical_hacking #oscp #information_security #cybersecurity
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:19:00 GMT
════════════════════════
⌗ Tags: #vulnerability #ethical_hacking #oscp #information_security #cybersecurity
Medium
🔥Network Pivoting Explained for OSCP | Step-by-Step Walkthrough
By cyber_public_school | Cyber Security Researcher
⤷ Title: Metasploit Tutorial for Beginners: Gain Remote Access in 10 Minutes
════════════════════════
𐀪 Author: The SecOps Lead
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:18:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #kali_linux #ethical_hacking #remote_access #metasploit
════════════════════════
𐀪 Author: The SecOps Lead
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:18:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #kali_linux #ethical_hacking #remote_access #metasploit
Medium
Metasploit Tutorial for Beginners: Gain Remote Access in 10 Minutes
If you are new to cybersecurity, the first time you open Metasploit Framework it can feel overwhelming.
⤷ Title: Extracting Installed Applications (APK) from Android
════════════════════════
𐀪 Author: Ch. Thedorou
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:35:19 GMT
════════════════════════
⌗ Tags: #mobile_hacking #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Ch. Thedorou
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:35:19 GMT
════════════════════════
⌗ Tags: #mobile_hacking #penetration_testing #bug_bounty
Medium
Extracting Installed Applications (APK) from Android
Hello, in today’s article, we will learn how to manually extract APK files from an Android device. Then, we will automate the process to…
⤷ Title: The-Ultimate-Nuclei-Guide For Hackers In 2026:-
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:01:00 GMT
════════════════════════
⌗ Tags: #ai #nucleus #cybersecurity #bug_bounty #generative_ai_tools
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:01:00 GMT
════════════════════════
⌗ Tags: #ai #nucleus #cybersecurity #bug_bounty #generative_ai_tools
Medium
The-Ultimate-Nuclei-Guide For Hackers In 2026:-
This Scanner That Changed Everything…
⤷ Title: Prompt Injection Is the New SQL Injection
════════════════════════
𐀪 Author: Tara Prasad Routray
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:13:45 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #software_development #cybersecurity #software_engineering #hacking
════════════════════════
𐀪 Author: Tara Prasad Routray
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:13:45 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #software_development #cybersecurity #software_engineering #hacking
Medium
Prompt Injection Is the New SQL Injection
LLM-powered systems are repeating a classic security mistake: merging untrusted input with executable logic, and attackers are already…
⤷ Title: New Wave of “gov-*.bond” Domains Registered — Coordinated Phishing Infrastructure?
════════════════════════
𐀪 Author: Natasha Fuller / Founder of weAFAR Global Justice
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:18:57 GMT
════════════════════════
⌗ Tags: #infosec #phishing #cybersecurity #threat_intelligence #online_fraud
════════════════════════
𐀪 Author: Natasha Fuller / Founder of weAFAR Global Justice
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:18:57 GMT
════════════════════════
⌗ Tags: #infosec #phishing #cybersecurity #threat_intelligence #online_fraud
Medium
🚨 New Wave of “gov-*.bond” Domains Registered — Coordinated Phishing Infrastructure?
Over the past weeks, I have been tracking a cluster of suspicious domains using the pattern:
⤷ Title: TryHackMe: Offensive Security Intro Walkthrough
════════════════════════
𐀪 Author: Nadeenmoreb
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:54:04 GMT
════════════════════════
⌗ Tags: #penetration_testing #tryhackme_walkthrough #offensive_security #cybersecurity #red_team
════════════════════════
𐀪 Author: Nadeenmoreb
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:54:04 GMT
════════════════════════
⌗ Tags: #penetration_testing #tryhackme_walkthrough #offensive_security #cybersecurity #red_team
Medium
TryHackMe: Offensive Security Intro Walkthrough
Tryhackme is your way to go if you want to start learning ethical hacking, not only it gives a blend of both theoretical and practical…
⤷ Title: ChatGPT as a Covert C2 Channel
════════════════════════
𐀪 Author: Eslam Hussein
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:51:39 GMT
════════════════════════
⌗ Tags: #information_security #red_teaming #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Eslam Hussein
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:51:39 GMT
════════════════════════
⌗ Tags: #information_security #red_teaming #penetration_testing #cybersecurity
Medium
ChatGPT as a Covert C2 Channel
The Challenge: Data Exfiltration with Zero External Connectivity
⤷ Title: TryHackMe FREE CTF Walkthrough- Love at First Breach 2026: Hidden Deep into my Heart
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:10:15 GMT
════════════════════════
⌗ Tags: #robotstxt #tryhackme #tryhackme_walkthrough #love_at_first_breach_2026 #ctf_walkthrough
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:10:15 GMT
════════════════════════
⌗ Tags: #robotstxt #tryhackme #tryhackme_walkthrough #love_at_first_breach_2026 #ctf_walkthrough
Medium
TryHackMe CTF Walkthrough- Love at First Breach 2026: Hidden Deep into my Heart
Difficulty: Easy | Category: Web
⤷ Title: TryHackMe “Blue” Room Writeup
════════════════════════
𐀪 Author: Shreya Dutta
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:05:24 GMT
════════════════════════
⌗ Tags: #eternalblue #tryhackme_walkthrough #tryhackme #ctf_writeup #windows
════════════════════════
𐀪 Author: Shreya Dutta
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:05:24 GMT
════════════════════════
⌗ Tags: #eternalblue #tryhackme_walkthrough #tryhackme #ctf_writeup #windows
Medium
TryHackMe “Blue” RoomWriteup
Historical Context — Blue / EternalBlue
⤷ Title: Day 14 : Hacking wordpress HTB skill assessment
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:43:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox #hackthebox_writeup #wordpress
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:43:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox #hackthebox_writeup #wordpress
Medium
Day 14 : Hacking wordpress HTB skill assessment
Hello, today is the final assessment for hacking wordpress, we’ll try to use everything we learnt during the last days.
⤷ Title: Brutus — HackTheBox
════════════════════════
𐀪 Author: Yrddry
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:42:29 GMT
════════════════════════
⌗ Tags: #digital_forensics #log_analysis #hackthebox #hackthebox_writeup #cybersecurity
════════════════════════
𐀪 Author: Yrddry
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:42:29 GMT
════════════════════════
⌗ Tags: #digital_forensics #log_analysis #hackthebox #hackthebox_writeup #cybersecurity
Medium
Brutus — HackTheBox
This writeup explores a compromised Confluence server scenario, focusing on the critical role of auth.log and wtmp artifacts. Beyond simple…
⤷ Title: The Reality of Blockchain in Global Supply Chains
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:50:44 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #information_security #blockchain_technology #cyber_security_awareness
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:50:44 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #information_security #blockchain_technology #cyber_security_awareness
Medium
The Reality of Blockchain in Global Supply Chains
If you have ever ordered a product from overseas, you might think the hardest part of its journey is crossing the ocean. In reality, the…