⤷ Title: Understanding Ahmia Dark Web Search and How It Indexes Onion Sites
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 21:08:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #darkweb #osint #infosec
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 21:08:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #darkweb #osint #infosec
Medium
Understanding Ahmia Dark Web Search and How It Indexes Onion Sites
Many people assume that dark web search engines function like Google. In reality, indexing onion services comes with technical, ethical…
⤷ Title: Cross-Site Request Forgery (CSRF) Attack Lab: A Hands-On Journey Through Request Manipulation
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:02:57 GMT
════════════════════════
⌗ Tags: #web_development #ethical_hacking #penetration_testing #javanoscript #cybersecurity
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:02:57 GMT
════════════════════════
⌗ Tags: #web_development #ethical_hacking #penetration_testing #javanoscript #cybersecurity
Medium
Cross-Site Request Forgery (CSRF) Attack Lab: A Hands-On Journey Through Request Manipulation
Comprehensive walkthrough of CSRF exploitation techniques, from API endpoint discovery to chaining XSS for account takeover
⤷ Title: IDOR | TryHackMe Write-up | Farros
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:00:54 GMT
════════════════════════
⌗ Tags: #tryhackme #security #walktrough #ctf #farro
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:00:54 GMT
════════════════════════
⌗ Tags: #tryhackme #security #walktrough #ctf #farro
Medium
IDOR | TryHackMe Write-up | Farros
Non-members are welcome to access the full story here.
⤷ Title: Day 15: Let’s get back to enumeration (HTB Nmap room) pt.1
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:24:50 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox_writeup #nmap #hackthebox #cybersecurity
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:24:50 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox_writeup #nmap #hackthebox #cybersecurity
Medium
Day 15: Let’s get back to enumeration (HTB Nmap room) pt.1
During a penetration test, we have different phases : planning & reconnaissance, scanning/ enumeration, exploitation…
⤷ Title: Hacked Through a Fish Tank: The Uncomfortable Truth About Modern Cybersecurity in 2026
════════════════════════
𐀪 Author: Talal Abbasi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 00:46:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #data_privacy #infosec #cve
════════════════════════
𐀪 Author: Talal Abbasi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 00:46:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #data_privacy #infosec #cve
Medium
Hacked Through a Fish Tank: The Uncomfortable Truth About Modern Cybersecurity in 2026
What a casino thermometer, a forgotten password, and 75 zero-days tell us about the world we are actually living in
⤷ Title: Digital Decapitation: U.S.–Israeli Cyber-Kinetic Integration Against the Iranian State
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:28:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #cyberattack #cyber #donald_trump
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:28:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #cyberattack #cyber #donald_trump
Medium
Digital Decapitation: U.S.–Israeli Cyber-Kinetic Integration Against the Iranian State
The military operations that commenced on February 28, 2026, represent a foundational shift in modern warfare doctrine, moving from an era…
⤷ Title: Hijacking an admin account through a “support access” feature
════════════════════════
𐀪 Author: OopsSec Store
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:48 GMT
════════════════════════
⌗ Tags: #web_development #programming #cybersecurity #hacking #technology
════════════════════════
𐀪 Author: OopsSec Store
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:48 GMT
════════════════════════
⌗ Tags: #web_development #programming #cybersecurity #hacking #technology
Medium
Hijacking an admin account through a “support access” feature
One extra parameter in the request body is all it takes to own the admin.
⤷ Title: HackTheBox Blocky Writeup: From Source Code Credentials to Root
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:36:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #hackthebox #ethical_hacking #ctf_writeup
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:36:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #hackthebox #ethical_hacking #ctf_writeup
Medium
HTB Blocky
I applied various techniques like WordPress enumeration, JAR file credential extraction, and sudo binary privilege escalation via GFTObins.
⤷ Title: Cookie Tossing Attack PoC:
════════════════════════
𐀪 Author: Bazil Brohi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:20:28 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #cybersecurity #offensive_security #penetration_testing
════════════════════════
𐀪 Author: Bazil Brohi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:20:28 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #cybersecurity #offensive_security #penetration_testing
Medium
Cookie Tossing Attack PoC:
I was studying from the Web Hacking Arsenal Book by Rafay Baloch when I was introduced to two interesting vulnerabilities pertaining to…
⤷ Title: Insufficient Input Validation Attack Lab: A Hands-On Journey Through File Upload Bypass Techniques
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:40 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #penetration_testing #web_development #javanoscript
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:40 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #penetration_testing #web_development #javanoscript
Medium
Insufficient Input Validation Attack Lab: A Hands-On Journey Through File Upload Bypass Techniques
Comprehensive walkthrough of bypassing file upload restrictions using console noscripts and HTML manipulation
⤷ Title: NETSEC THM- Writeup
════════════════════════
𐀪 Author: Cybernerddd
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 01:20:05 GMT
════════════════════════
⌗ Tags: #netsec #tryhackme_walkthrough #ctf_writeup #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Cybernerddd
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 01:20:05 GMT
════════════════════════
⌗ Tags: #netsec #tryhackme_walkthrough #ctf_writeup #cybersecurity #ethical_hacking
Medium
NETSEC THM- Writeup
In this lab, I explored how full-range enumeration, service analysis, and credential attacks can uncover hidden services and sensitive…
⤷ Title: How Hackers Actually Break Into Accounts
════════════════════════
𐀪 Author: TechTales
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:02:49 GMT
════════════════════════
⌗ Tags: #technology #tech #cybersecurity #social_media #hacking
════════════════════════
𐀪 Author: TechTales
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:02:49 GMT
════════════════════════
⌗ Tags: #technology #tech #cybersecurity #social_media #hacking
Medium
How Hackers Actually Break Into Accounts
Your account doesn’t get hacked like in those dramatic movie scenes
⤷ Title: 3 Projects to Get You Into IT Security
════════════════════════
𐀪 Author: Eric Smith
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 03:33:02 GMT
════════════════════════
⌗ Tags: #infosecurity #infosec #cybersecurity #it_career #information_security
════════════════════════
𐀪 Author: Eric Smith
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 03:33:02 GMT
════════════════════════
⌗ Tags: #infosecurity #infosec #cybersecurity #it_career #information_security
Medium
3 Projects to Get You Into IT Security
Discover 3 infosec projects that are under $100 to get you started in Cybersecurity or Infosecurity by giving you hands-on experience to…
⤷ Title: TryHackMe
════════════════════════
𐀪 Author: Ravi Modhvadiya
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:17:05 GMT
════════════════════════
⌗ Tags: #tryhackme_pre_security #tryhackme_walkthrough #cybersecurity #tryhackme
════════════════════════
𐀪 Author: Ravi Modhvadiya
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:17:05 GMT
════════════════════════
⌗ Tags: #tryhackme_pre_security #tryhackme_walkthrough #cybersecurity #tryhackme
Medium
TryHackMe
Pre Security (New)
⤷ Title: Understanding React2Shell (CVE-2025–55182)
════════════════════════
𐀪 Author: Indigo Shadow
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:45:15 GMT
════════════════════════
⌗ Tags: #ethical_hacking #react2shell #cve202555182 #react_server_component #javanoscript_nextjs
════════════════════════
𐀪 Author: Indigo Shadow
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:45:15 GMT
════════════════════════
⌗ Tags: #ethical_hacking #react2shell #cve202555182 #react_server_component #javanoscript_nextjs
Medium
Understanding React2Shell (CVE-2025–55182)
The Critical RCE in React Server Components
⤷ Title: Host Header Injection: The Quiet Vulnerability That Breaks Trust
════════════════════════
𐀪 Author: Purushotham.R
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:23:22 GMT
════════════════════════
⌗ Tags: #bug_bounty #application_security #cybersecurity #web_security
════════════════════════
𐀪 Author: Purushotham.R
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:23:22 GMT
════════════════════════
⌗ Tags: #bug_bounty #application_security #cybersecurity #web_security
Medium
Host Header Injection: The Quiet Vulnerability That Breaks Trust
Most developers obsess over SQL injection, XSS, and authentication bypasses.
⤷ Title: “Stop Using Google for Recon. Seriously.”
════════════════════════
𐀪 Author: Pushkar Padhye
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 05:58:44 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #programming #hacking #bug_bounty
════════════════════════
𐀪 Author: Pushkar Padhye
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 05:58:44 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #programming #hacking #bug_bounty
Medium
“Stop Using Google for Recon. Seriously.”
The Search Engine Nobody Uses (But Should) — Bing for Bug Bounty
⤷ Title: Bug Bounty Platforms: How to Choose the Right Programs (And Avoid Instant Rejection)
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 05:39:37 GMT
════════════════════════
⌗ Tags: #hacking #vulnerability #bug_bounty #cybersecurity #security
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 05:39:37 GMT
════════════════════════
⌗ Tags: #hacking #vulnerability #bug_bounty #cybersecurity #security
Medium
🎯 Bug Bounty Platforms: How to Choose the Right Programs (And Avoid Instant Rejection)
🎯 Bug Bounty Platforms: How to Choose the Right Programs (And Avoid Instant Rejection)
⤷ Title: SAST vs DAST vs SCA — The Security Trio Every DevOps Engineer Must Understand
════════════════════════
𐀪 Author: TechwidSush
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:22:55 GMT
════════════════════════
⌗ Tags: #security #devsecops #cloud_security #application_security #devsecops_solutions
════════════════════════
𐀪 Author: TechwidSush
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:22:55 GMT
════════════════════════
⌗ Tags: #security #devsecops #cloud_security #application_security #devsecops_solutions
Medium
SAST vs DAST vs SCA — The Security Trio Every DevOps Engineer Must Understand
Application Security is often ignored in traditional development workflows. But in today’s world, where applications are constantly exposed…
⤷ Title: Your Small Business Will Be Hacked. The Only Question Is When.
════════════════════════
𐀪 Author: Karan Dhillon
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:53:30 GMT
════════════════════════
⌗ Tags: #security #business #small_business #hacking #cyber_security_awareness
════════════════════════
𐀪 Author: Karan Dhillon
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:53:30 GMT
════════════════════════
⌗ Tags: #security #business #small_business #hacking #cyber_security_awareness
Medium
Your Small Business Will Be Hacked. The Only Question Is When.
Most small business owners believe they are too small to be targeted.
⤷ Title: No rate limit on forget/reset password leads to email triggering
════════════════════════
𐀪 Author: Arif Hossain
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:40:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Arif Hossain
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:40:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking
Medium
No rate limit on forget/reset password leads to email triggering
Steps To Reproduce