⤷ Title: Day 10 — Dumping Passwords With UNION (SQL Injection Escalates)
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:41:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #sql_injection #pentesting #ethical_hacking #vapt
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:41:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #sql_injection #pentesting #ethical_hacking #vapt
Medium
🚀 Day 10 — Dumping Passwords With UNION (SQL Injection Escalates)
Target Application: https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: Network Pivoting Explained for OSCP | Step-by-Step Walkthrough
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:19:00 GMT
════════════════════════
⌗ Tags: #vulnerability #ethical_hacking #oscp #information_security #cybersecurity
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:19:00 GMT
════════════════════════
⌗ Tags: #vulnerability #ethical_hacking #oscp #information_security #cybersecurity
Medium
🔥Network Pivoting Explained for OSCP | Step-by-Step Walkthrough
By cyber_public_school | Cyber Security Researcher
⤷ Title: Metasploit Tutorial for Beginners: Gain Remote Access in 10 Minutes
════════════════════════
𐀪 Author: The SecOps Lead
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:18:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #kali_linux #ethical_hacking #remote_access #metasploit
════════════════════════
𐀪 Author: The SecOps Lead
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:18:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #kali_linux #ethical_hacking #remote_access #metasploit
Medium
Metasploit Tutorial for Beginners: Gain Remote Access in 10 Minutes
If you are new to cybersecurity, the first time you open Metasploit Framework it can feel overwhelming.
⤷ Title: Extracting Installed Applications (APK) from Android
════════════════════════
𐀪 Author: Ch. Thedorou
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:35:19 GMT
════════════════════════
⌗ Tags: #mobile_hacking #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Ch. Thedorou
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:35:19 GMT
════════════════════════
⌗ Tags: #mobile_hacking #penetration_testing #bug_bounty
Medium
Extracting Installed Applications (APK) from Android
Hello, in today’s article, we will learn how to manually extract APK files from an Android device. Then, we will automate the process to…
⤷ Title: The-Ultimate-Nuclei-Guide For Hackers In 2026:-
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:01:00 GMT
════════════════════════
⌗ Tags: #ai #nucleus #cybersecurity #bug_bounty #generative_ai_tools
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:01:00 GMT
════════════════════════
⌗ Tags: #ai #nucleus #cybersecurity #bug_bounty #generative_ai_tools
Medium
The-Ultimate-Nuclei-Guide For Hackers In 2026:-
This Scanner That Changed Everything…
⤷ Title: Prompt Injection Is the New SQL Injection
════════════════════════
𐀪 Author: Tara Prasad Routray
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:13:45 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #software_development #cybersecurity #software_engineering #hacking
════════════════════════
𐀪 Author: Tara Prasad Routray
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:13:45 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #software_development #cybersecurity #software_engineering #hacking
Medium
Prompt Injection Is the New SQL Injection
LLM-powered systems are repeating a classic security mistake: merging untrusted input with executable logic, and attackers are already…
⤷ Title: New Wave of “gov-*.bond” Domains Registered — Coordinated Phishing Infrastructure?
════════════════════════
𐀪 Author: Natasha Fuller / Founder of weAFAR Global Justice
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:18:57 GMT
════════════════════════
⌗ Tags: #infosec #phishing #cybersecurity #threat_intelligence #online_fraud
════════════════════════
𐀪 Author: Natasha Fuller / Founder of weAFAR Global Justice
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:18:57 GMT
════════════════════════
⌗ Tags: #infosec #phishing #cybersecurity #threat_intelligence #online_fraud
Medium
🚨 New Wave of “gov-*.bond” Domains Registered — Coordinated Phishing Infrastructure?
Over the past weeks, I have been tracking a cluster of suspicious domains using the pattern:
⤷ Title: TryHackMe: Offensive Security Intro Walkthrough
════════════════════════
𐀪 Author: Nadeenmoreb
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:54:04 GMT
════════════════════════
⌗ Tags: #penetration_testing #tryhackme_walkthrough #offensive_security #cybersecurity #red_team
════════════════════════
𐀪 Author: Nadeenmoreb
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:54:04 GMT
════════════════════════
⌗ Tags: #penetration_testing #tryhackme_walkthrough #offensive_security #cybersecurity #red_team
Medium
TryHackMe: Offensive Security Intro Walkthrough
Tryhackme is your way to go if you want to start learning ethical hacking, not only it gives a blend of both theoretical and practical…
⤷ Title: ChatGPT as a Covert C2 Channel
════════════════════════
𐀪 Author: Eslam Hussein
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:51:39 GMT
════════════════════════
⌗ Tags: #information_security #red_teaming #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Eslam Hussein
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:51:39 GMT
════════════════════════
⌗ Tags: #information_security #red_teaming #penetration_testing #cybersecurity
Medium
ChatGPT as a Covert C2 Channel
The Challenge: Data Exfiltration with Zero External Connectivity
⤷ Title: TryHackMe FREE CTF Walkthrough- Love at First Breach 2026: Hidden Deep into my Heart
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:10:15 GMT
════════════════════════
⌗ Tags: #robotstxt #tryhackme #tryhackme_walkthrough #love_at_first_breach_2026 #ctf_walkthrough
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:10:15 GMT
════════════════════════
⌗ Tags: #robotstxt #tryhackme #tryhackme_walkthrough #love_at_first_breach_2026 #ctf_walkthrough
Medium
TryHackMe CTF Walkthrough- Love at First Breach 2026: Hidden Deep into my Heart
Difficulty: Easy | Category: Web
⤷ Title: TryHackMe “Blue” Room Writeup
════════════════════════
𐀪 Author: Shreya Dutta
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:05:24 GMT
════════════════════════
⌗ Tags: #eternalblue #tryhackme_walkthrough #tryhackme #ctf_writeup #windows
════════════════════════
𐀪 Author: Shreya Dutta
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:05:24 GMT
════════════════════════
⌗ Tags: #eternalblue #tryhackme_walkthrough #tryhackme #ctf_writeup #windows
Medium
TryHackMe “Blue” RoomWriteup
Historical Context — Blue / EternalBlue
⤷ Title: Day 14 : Hacking wordpress HTB skill assessment
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:43:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox #hackthebox_writeup #wordpress
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:43:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox #hackthebox_writeup #wordpress
Medium
Day 14 : Hacking wordpress HTB skill assessment
Hello, today is the final assessment for hacking wordpress, we’ll try to use everything we learnt during the last days.
⤷ Title: Brutus — HackTheBox
════════════════════════
𐀪 Author: Yrddry
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:42:29 GMT
════════════════════════
⌗ Tags: #digital_forensics #log_analysis #hackthebox #hackthebox_writeup #cybersecurity
════════════════════════
𐀪 Author: Yrddry
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:42:29 GMT
════════════════════════
⌗ Tags: #digital_forensics #log_analysis #hackthebox #hackthebox_writeup #cybersecurity
Medium
Brutus — HackTheBox
This writeup explores a compromised Confluence server scenario, focusing on the critical role of auth.log and wtmp artifacts. Beyond simple…
⤷ Title: The Reality of Blockchain in Global Supply Chains
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:50:44 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #information_security #blockchain_technology #cyber_security_awareness
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 16:50:44 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #information_security #blockchain_technology #cyber_security_awareness
Medium
The Reality of Blockchain in Global Supply Chains
If you have ever ordered a product from overseas, you might think the hardest part of its journey is crossing the ocean. In reality, the…
⤷ Title: ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:51:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:51:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Exploring Burpsuite MCP Server: Connecting WSL to Burpsuite MCP Server
════════════════════════
𐀪 Author: Ayyubnoezher
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 18:38:40 GMT
════════════════════════
⌗ Tags: #penetration_testing #wsl_2 #kali_linux #mcp_server #burpsuite_extension
════════════════════════
𐀪 Author: Ayyubnoezher
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 18:38:40 GMT
════════════════════════
⌗ Tags: #penetration_testing #wsl_2 #kali_linux #mcp_server #burpsuite_extension
Medium
Exploring Burpsuite MCP Server: Connecting WSL to Burpsuite MCP Server
Disclaimer
⤷ Title: CRTP Outside CRTP: Do the Skills Survive in the Wild?
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 17:24:15 GMT
════════════════════════
⌗ Tags: #kerberos #red_team #penetration_testing #bloodhound #crt_p
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 17:24:15 GMT
════════════════════════
⌗ Tags: #kerberos #red_team #penetration_testing #bloodhound #crt_p
Medium
CRTP Outside CRTP: Do the Skills Survive in the Wild?
Passing CRTP proves you can execute the path. It does not prove the path exists.
⤷ Title: TryHackMe CTF Walkthrough- Love at First Breach 2026: Hidden Deep into my Heart
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:10:15 GMT
════════════════════════
⌗ Tags: #robotstxt #tryhackme #tryhackme_walkthrough #love_at_first_breach_2026 #ctf_walkthrough
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 15:10:15 GMT
════════════════════════
⌗ Tags: #robotstxt #tryhackme #tryhackme_walkthrough #love_at_first_breach_2026 #ctf_walkthrough
Medium
TryHackMe CTF Walkthrough- Love at First Breach 2026: Hidden Deep into my Heart
Difficulty: Easy | Category: Web
⤷ Title: TryHackMe CTF Walkthrough- Love at First Breach 2026: Valenfind
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:32:47 GMT
════════════════════════
⌗ Tags: #lfi #tryhackme_walkthrough #valenfind #love_at_first_breach_2026 #tryhackme
════════════════════════
𐀪 Author: Hibullahi AbdulAzeez
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:32:47 GMT
════════════════════════
⌗ Tags: #lfi #tryhackme_walkthrough #valenfind #love_at_first_breach_2026 #tryhackme
Medium
TryHackMe CTF Walkthrough- Love at First Breach 2026: Valenfind
Difficulty: Medium | Category: Web
⤷ Title: Critical Web3 Vulnerability: Full Account Takeover via Arbitrary Internal Self-Calls in Smart…
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 19:04:04 GMT
════════════════════════
⌗ Tags: #web3_security #smart_contracts #solidity #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 19:04:04 GMT
════════════════════════
⌗ Tags: #web3_security #smart_contracts #solidity #bug_bounty #cybersecurity
Medium
Critical Web3 Vulnerability: Full Account Takeover via Arbitrary Internal Self-Calls in Smart Wallets
How a missing target validation led to a complete compromise of a modular smart contract wallet.
⤷ Title: Does Your App Reveal Its Server Header? You Might Be Helping Attackers
════════════════════════
𐀪 Author: SmartScanner
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 20:51:00 GMT
════════════════════════
⌗ Tags: #hacking #devops #servers #web_development #security
════════════════════════
𐀪 Author: SmartScanner
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 20:51:00 GMT
════════════════════════
⌗ Tags: #hacking #devops #servers #web_development #security
Medium
Does Your App Reveal Its Server Header? You Might Be Helping Attackers
Most developers focus on fixing SQL injection, XSS, and authentication bugs.