⤷ Title: IoT Hacking: Your Smart Home is a Security Nightmare
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 19:53:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #iot #hacking #security #ethical_hacking
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 19:53:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #iot #hacking #security #ethical_hacking
Medium
IoT Hacking: Your Smart Home is a Security Nightmare
Behind every “Smart” device is a “Dumb” security mistake. Here is why the Internet of Things is the Wild West of 2026.
⤷ Title: TryHackMe — The Hacker Methodology
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 19:43:56 GMT
════════════════════════
⌗ Tags: #ctf_writeup #tryhackme_walkthrough #tryhackme #writeup #tryhackme_writeup
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 19:43:56 GMT
════════════════════════
⌗ Tags: #ctf_writeup #tryhackme_walkthrough #tryhackme #writeup #tryhackme_writeup
Medium
TryHackMe — The Hacker Methodology
Task 1: Methodology Outline
⤷ Title: Linux Privilege Escalation For Beginners That You Need to Know
════════════════════════
𐀪 Author: Azzam Mohammed (WHHacker)
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 20:53:35 GMT
════════════════════════
⌗ Tags: #privilege_escalation #linux_priv_esc #penetration_testing #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Azzam Mohammed (WHHacker)
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 20:53:35 GMT
════════════════════════
⌗ Tags: #privilege_escalation #linux_priv_esc #penetration_testing #cybersecurity #ethical_hacking
Medium
Linux Privilege Escalation For Beginners That You Need to Know
When conducting a penetration test, gaining initial access to a Linux machine is only half the job.
⤷ Title: Lookup writeup THM (español)
════════════════════════
𐀪 Author: Us0lfr
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 19:53:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #ethical_hacking #tryhackme_writeup #pentesting
════════════════════════
𐀪 Author: Us0lfr
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 19:53:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #ethical_hacking #tryhackme_writeup #pentesting
Medium
Lookup writeup THM (español)
25/02/2026
⤷ Title: How I Saved $1 Million by Moving Load Balancing Off F5 - One Cluster at a Time
════════════════════════
𐀪 Author: Pooja Chandolu
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 21:34:45 GMT
════════════════════════
⌗ Tags: #firewall #application_security #load_balancing #cost_optimization #f5
════════════════════════
𐀪 Author: Pooja Chandolu
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 21:34:45 GMT
════════════════════════
⌗ Tags: #firewall #application_security #load_balancing #cost_optimization #f5
Medium
How I Saved $1 Million by Moving Load Balancing Off F5 - One Cluster at a Time
There's a particular kind of organizational debt that nobody talks about: the infrastructure you inherit that works perfectly fine but…
⤷ Title: I Shouldn’t Be Sharing This: The 2026 Google Dork Bible That Still Finds Leaks Big Tech Hides
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 21:11:37 GMT
════════════════════════
⌗ Tags: #osint #hacking #hacking_tools #google_dork #infosec
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 21:11:37 GMT
════════════════════════
⌗ Tags: #osint #hacking #hacking_tools #google_dork #infosec
Medium
I Shouldn’t Be Sharing This: The 2026 Google Dork Bible That Still Finds Leaks Big Tech Hides
A compliance report from a mid sized fintech company is sitting in a public index right now.
⤷ Title: Understanding Ahmia Dark Web Search and How It Indexes Onion Sites
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 21:08:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #darkweb #osint #infosec
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 21:08:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #darkweb #osint #infosec
Medium
Understanding Ahmia Dark Web Search and How It Indexes Onion Sites
Many people assume that dark web search engines function like Google. In reality, indexing onion services comes with technical, ethical…
⤷ Title: Cross-Site Request Forgery (CSRF) Attack Lab: A Hands-On Journey Through Request Manipulation
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:02:57 GMT
════════════════════════
⌗ Tags: #web_development #ethical_hacking #penetration_testing #javanoscript #cybersecurity
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:02:57 GMT
════════════════════════
⌗ Tags: #web_development #ethical_hacking #penetration_testing #javanoscript #cybersecurity
Medium
Cross-Site Request Forgery (CSRF) Attack Lab: A Hands-On Journey Through Request Manipulation
Comprehensive walkthrough of CSRF exploitation techniques, from API endpoint discovery to chaining XSS for account takeover
⤷ Title: IDOR | TryHackMe Write-up | Farros
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:00:54 GMT
════════════════════════
⌗ Tags: #tryhackme #security #walktrough #ctf #farro
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:00:54 GMT
════════════════════════
⌗ Tags: #tryhackme #security #walktrough #ctf #farro
Medium
IDOR | TryHackMe Write-up | Farros
Non-members are welcome to access the full story here.
⤷ Title: Day 15: Let’s get back to enumeration (HTB Nmap room) pt.1
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:24:50 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox_writeup #nmap #hackthebox #cybersecurity
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:24:50 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox_writeup #nmap #hackthebox #cybersecurity
Medium
Day 15: Let’s get back to enumeration (HTB Nmap room) pt.1
During a penetration test, we have different phases : planning & reconnaissance, scanning/ enumeration, exploitation…
⤷ Title: Hacked Through a Fish Tank: The Uncomfortable Truth About Modern Cybersecurity in 2026
════════════════════════
𐀪 Author: Talal Abbasi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 00:46:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #data_privacy #infosec #cve
════════════════════════
𐀪 Author: Talal Abbasi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 00:46:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #data_privacy #infosec #cve
Medium
Hacked Through a Fish Tank: The Uncomfortable Truth About Modern Cybersecurity in 2026
What a casino thermometer, a forgotten password, and 75 zero-days tell us about the world we are actually living in
⤷ Title: Digital Decapitation: U.S.–Israeli Cyber-Kinetic Integration Against the Iranian State
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:28:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #cyberattack #cyber #donald_trump
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:28:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #cyberattack #cyber #donald_trump
Medium
Digital Decapitation: U.S.–Israeli Cyber-Kinetic Integration Against the Iranian State
The military operations that commenced on February 28, 2026, represent a foundational shift in modern warfare doctrine, moving from an era…
⤷ Title: Hijacking an admin account through a “support access” feature
════════════════════════
𐀪 Author: OopsSec Store
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:48 GMT
════════════════════════
⌗ Tags: #web_development #programming #cybersecurity #hacking #technology
════════════════════════
𐀪 Author: OopsSec Store
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:48 GMT
════════════════════════
⌗ Tags: #web_development #programming #cybersecurity #hacking #technology
Medium
Hijacking an admin account through a “support access” feature
One extra parameter in the request body is all it takes to own the admin.
⤷ Title: HackTheBox Blocky Writeup: From Source Code Credentials to Root
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:36:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #hackthebox #ethical_hacking #ctf_writeup
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:36:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #hackthebox #ethical_hacking #ctf_writeup
Medium
HTB Blocky
I applied various techniques like WordPress enumeration, JAR file credential extraction, and sudo binary privilege escalation via GFTObins.
⤷ Title: Cookie Tossing Attack PoC:
════════════════════════
𐀪 Author: Bazil Brohi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:20:28 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #cybersecurity #offensive_security #penetration_testing
════════════════════════
𐀪 Author: Bazil Brohi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:20:28 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #cybersecurity #offensive_security #penetration_testing
Medium
Cookie Tossing Attack PoC:
I was studying from the Web Hacking Arsenal Book by Rafay Baloch when I was introduced to two interesting vulnerabilities pertaining to…
⤷ Title: Insufficient Input Validation Attack Lab: A Hands-On Journey Through File Upload Bypass Techniques
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:40 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #penetration_testing #web_development #javanoscript
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:40 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #penetration_testing #web_development #javanoscript
Medium
Insufficient Input Validation Attack Lab: A Hands-On Journey Through File Upload Bypass Techniques
Comprehensive walkthrough of bypassing file upload restrictions using console noscripts and HTML manipulation
⤷ Title: NETSEC THM- Writeup
════════════════════════
𐀪 Author: Cybernerddd
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 01:20:05 GMT
════════════════════════
⌗ Tags: #netsec #tryhackme_walkthrough #ctf_writeup #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Cybernerddd
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 01:20:05 GMT
════════════════════════
⌗ Tags: #netsec #tryhackme_walkthrough #ctf_writeup #cybersecurity #ethical_hacking
Medium
NETSEC THM- Writeup
In this lab, I explored how full-range enumeration, service analysis, and credential attacks can uncover hidden services and sensitive…