⤷ Title: What are CORS vulnerabilities (cross-origin resource sharing)?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:51:55 GMT
════════════════════════
⌗ Tags: #binaryshield #ethical_hacking #cors #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:51:55 GMT
════════════════════════
⌗ Tags: #binaryshield #ethical_hacking #cors #cybersecurity #penetration_testing
Medium
What are CORS vulnerabilities (cross-origin resource sharing)?
1. What it is (very simple definition)
⤷ Title: Inside a Full Internal Penetration Test: How Four Critical Vulnerabilities Led to Complete Root…
════════════════════════
𐀪 Author: Oluwatobi Adeyemi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:08:55 GMT
════════════════════════
⌗ Tags: #information_security #penetration_testing #cybersecurity #ethical_hacking #linux
════════════════════════
𐀪 Author: Oluwatobi Adeyemi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:08:55 GMT
════════════════════════
⌗ Tags: #information_security #penetration_testing #cybersecurity #ethical_hacking #linux
Medium
🔥 Inside a Full Internal Penetration Test: How Four Critical Vulnerabilities Led to Complete Root Compromise (With Kill‑Chain,…
Most internal networks are one outdated service away from complete compromise. In this article, I walk through how four overlooked…
⤷ Title: F5 BIG-IP PROMO CODES @ UDEMY LATEST NEW
════════════════════════
𐀪 Author: DeepDive4learn
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 15:13:07 GMT
════════════════════════
⌗ Tags: #machine_learning #web_development #cybersecurity #penetration_testing #web3
════════════════════════
𐀪 Author: DeepDive4learn
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 15:13:07 GMT
════════════════════════
⌗ Tags: #machine_learning #web_development #cybersecurity #penetration_testing #web3
Medium
F5 BIG-IP PROMO CODES @ UDEMY LATEST NEW
🚀🌟F5 BIG-IP PROMO CODES @ UDEMY LATEST NEW🌟🚀 — DeepDive2Learn (wordpress.com)
⤷ Title: picoCTF | Ph4nt0m 1ntrud3r
════════════════════════
𐀪 Author: M.Daffa Hakiki
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:25:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #ethical_hacking #picoctf
════════════════════════
𐀪 Author: M.Daffa Hakiki
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:25:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #ethical_hacking #picoctf
Medium
picoCTF | Ph4nt0m 1ntrud3r
Seseorang yang dijuluki “Ph4nt0m” baru saja meluncurkan serangan senyap ke dalam server kita. Pertahanan perimeter telah jebol, dan aset…
⤷ Title: Day 11 — Extracting Data Without Seeing It (Boolean-Based Blind SQL Injection)
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 15:15:13 GMT
════════════════════════
⌗ Tags: #sql_injection #ethical_hacking #vapt #ctf #pentesting
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 15:15:13 GMT
════════════════════════
⌗ Tags: #sql_injection #ethical_hacking #vapt #ctf #pentesting
Medium
🚀 Day 11 — Extracting Data Without Seeing It (Boolean-Based Blind SQL Injection)
Target Application: https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: API SECURITY CONTROLS - Part7
════════════════════════
𐀪 Author: crązŷrąiɲ
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:48:50 GMT
════════════════════════
⌗ Tags: #api_security
════════════════════════
𐀪 Author: crązŷrąiɲ
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:48:50 GMT
════════════════════════
⌗ Tags: #api_security
Medium
API SECURITY CONTROLS - Part7
Comparison & Decision Guide
⤷ Title: How I Found 4 Vulnerabilities in 3 Days — Beginner Journey
════════════════════════
𐀪 Author: MhndFi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:24:35 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #web_security #infosec #cybersecurity
════════════════════════
𐀪 Author: MhndFi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:24:35 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #web_security #infosec #cybersecurity
Medium
How I Found 4 Vulnerabilities in 3 Days — Beginner Journey
This is the story of how I submitted 4 vulnerability reports to Target’s HackerOne program in just 3 days, using a methodical approach and…
⤷ Title: Backend Mastery: The Real Bug Bounty Superpower (2026 Guide)
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:16:52 GMT
════════════════════════
⌗ Tags: #programming #technology #bug_bounty_tips #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:16:52 GMT
════════════════════════
⌗ Tags: #programming #technology #bug_bounty_tips #bug_bounty #cybersecurity
Medium
Backend Mastery: The Real Bug Bounty Superpower (2026 Guide)
You’ve learned XSS. You know SQL injection basics. You’ve automated recon.
⤷ Title: A Practical Guide to Finding Broken Access Control (BAC)
════════════════════════
𐀪 Author: NullSec
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:44:53 GMT
════════════════════════
⌗ Tags: #broken_access_control #bug_bounty_tips #abc #web_app_pentesting #bug_bounty
════════════════════════
𐀪 Author: NullSec
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:44:53 GMT
════════════════════════
⌗ Tags: #broken_access_control #bug_bounty_tips #abc #web_app_pentesting #bug_bounty
Medium
A Practical Guide to Finding Broken Access Control (BAC)
With Real Testing Examples
⤷ Title: Running Multiple Bug Bounty Targets at the Same Time — Is It Legal?
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:37:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #vulnerability #hacking #security
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:37:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #vulnerability #hacking #security
Medium
Running Multiple Bug Bounty Targets at the Same Time — Is It Legal?
Running Multiple Bug Bounty Targets at the Same Time — Is It Legal?
⤷ Title: Cyber Threat Profiles of Iranian Threat Actors & Iranian Cyber Proxies
════════════════════════
𐀪 Author: SIMKRA
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:40:47 GMT
════════════════════════
⌗ Tags: #war #information_security #threat_intelligence #hacking #cybersecurity
════════════════════════
𐀪 Author: SIMKRA
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:40:47 GMT
════════════════════════
⌗ Tags: #war #information_security #threat_intelligence #hacking #cybersecurity
Medium
Cyber Threat Profiles of Iranian Threat Actors & Iranian Cyber Proxies
Axis of Resistance / Islamic Resistance
⤷ Title: Mitigating Risk in Mendix Applications
════════════════════════
𐀪 Author: Thijs de Jong
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:25:37 GMT
════════════════════════
⌗ Tags: #software_development #hacking #security #low_code #mendix
════════════════════════
𐀪 Author: Thijs de Jong
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:25:37 GMT
════════════════════════
⌗ Tags: #software_development #hacking #security #low_code #mendix
Medium
Mitigating Risk in Mendix Applications
A Practical Security Guide for Developers
⤷ Title: The Edge AI Paradox: Why “Privacy-First” Devices Are a Hacker’s Best Friend
════════════════════════
𐀪 Author: Jose Baena Cobos
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:04:32 GMT
════════════════════════
⌗ Tags: #cloud_computing #machine_learning #ai #hacking #cybersecurity
════════════════════════
𐀪 Author: Jose Baena Cobos
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:04:32 GMT
════════════════════════
⌗ Tags: #cloud_computing #machine_learning #ai #hacking #cybersecurity
Medium
The Edge AI Paradox: Why “Privacy-First” Devices Are a Hacker’s Best Friend
We moved AI from the cloud to our devices to protect our privacy. We might have just handed attackers the ultimate skeleton key
⤷ Title: One Time Pad (OTP): The Unbreakable Cipher
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:26:06 GMT
════════════════════════
⌗ Tags: #cryptography #programming #cybersecurity #information_security #infosec
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:26:06 GMT
════════════════════════
⌗ Tags: #cryptography #programming #cybersecurity #information_security #infosec
Medium
One Time Pad (OTP): The Unbreakable Cipher
(Subnoscript: Exploring Perfect Secrecy, True Randomness, and why OTP is actually a Secret Sharing mechanism)
⤷ Title: From EAP to NTLM: What Happens After 802.1X Reaches the Server
════════════════════════
𐀪 Author: winnietheSUii
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:08:44 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #network_security #computer_networking
════════════════════════
𐀪 Author: winnietheSUii
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:08:44 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #network_security #computer_networking
Medium
From EAP to NTLM: What Happens After 802.1X Reaches the Server
I recently built a FreeRADIUS + Samba Active Directory setup for a university network project.
⤷ Title: Simple Hack-The-Box Security Architecture Takeaways (Part 1)
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:20:04 GMT
════════════════════════
⌗ Tags: #web_services #penetration_testing #api #hackthebox
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:20:04 GMT
════════════════════════
⌗ Tags: #web_services #penetration_testing #api #hackthebox
Medium
Simple Hack-The-Box Security Architecture Takeaways (Part 1)
How HTB CTF exploits teach us architecture.
⤷ Title: Dc4 Write-up
════════════════════════
𐀪 Author: Tugrulakagunduz
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:15:20 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #ctf_writeup #exploit #cybersecurity
════════════════════════
𐀪 Author: Tugrulakagunduz
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:15:20 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #ctf_writeup #exploit #cybersecurity
Medium
Dc4 Write-up
Keşif aşamasında yapılan taramalar sonucunda, hedef makinenin (192.168.1.144) 80 numaralı portunda bir web servisinin çalıştığı tespit…
⤷ Title: RootMe — TryHackMe Walkthrough | Complete Beginner-Friendly Write-Up
════════════════════════
𐀪 Author: Sneha
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:14:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Sneha
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:14:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing
Medium
RootMe — TryHackMe Walkthrough | Complete Beginner-Friendly Write-Up
Room: RootMe
⤷ Title: Client-Server Basics
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:59:33 GMT
════════════════════════
⌗ Tags: #client_server_basics #tryhackme
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:59:33 GMT
════════════════════════
⌗ Tags: #client_server_basics #tryhackme
Medium
Client-Server Basics
“Client-Server Basics” is published by Mujahid Hasan.
⤷ Title: Certified THM SEC1 with the (almost) chaos
════════════════════════
𐀪 Author: Chananya Choosak
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:29:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #sec1
════════════════════════
𐀪 Author: Chananya Choosak
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:29:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #sec1
Medium
Certified THM SEC1 with the (almost) chaos
ท่ามกลางวงการสอบ Certification ทั้งสาย Hands-on ก็ดี หรือสาย Management ไปจนสำหรับ Beginner ที่เพิ่งเข้ามาในวงการ ก็ล้วนมีสนามใบ Cert…
⤷ Title: From Drupal RCE to Root: DC-1 Walkthrough (Vulnhub)
════════════════════════
𐀪 Author: Satyamsatyarthi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:19:23 GMT
════════════════════════
⌗ Tags: #hacking #vulnhub_walkthrough #cybersecurity #privilege_escalation #labs
════════════════════════
𐀪 Author: Satyamsatyarthi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:19:23 GMT
════════════════════════
⌗ Tags: #hacking #vulnhub_walkthrough #cybersecurity #privilege_escalation #labs
Medium
From Drupal RCE to Root: DC-1 Walkthrough (Vulnhub)
DC‑1 is a beginner‑friendly boot2root machine from VulnHub designed to test web exploitation, credential extraction, password cracking, and…