⤷ Title: picoCTF | Ph4nt0m 1ntrud3r
════════════════════════
𐀪 Author: M.Daffa Hakiki
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:25:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #ethical_hacking #picoctf
════════════════════════
𐀪 Author: M.Daffa Hakiki
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:25:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #ethical_hacking #picoctf
Medium
picoCTF | Ph4nt0m 1ntrud3r
Seseorang yang dijuluki “Ph4nt0m” baru saja meluncurkan serangan senyap ke dalam server kita. Pertahanan perimeter telah jebol, dan aset…
⤷ Title: Day 11 — Extracting Data Without Seeing It (Boolean-Based Blind SQL Injection)
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 15:15:13 GMT
════════════════════════
⌗ Tags: #sql_injection #ethical_hacking #vapt #ctf #pentesting
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 15:15:13 GMT
════════════════════════
⌗ Tags: #sql_injection #ethical_hacking #vapt #ctf #pentesting
Medium
🚀 Day 11 — Extracting Data Without Seeing It (Boolean-Based Blind SQL Injection)
Target Application: https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: API SECURITY CONTROLS - Part7
════════════════════════
𐀪 Author: crązŷrąiɲ
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:48:50 GMT
════════════════════════
⌗ Tags: #api_security
════════════════════════
𐀪 Author: crązŷrąiɲ
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:48:50 GMT
════════════════════════
⌗ Tags: #api_security
Medium
API SECURITY CONTROLS - Part7
Comparison & Decision Guide
⤷ Title: How I Found 4 Vulnerabilities in 3 Days — Beginner Journey
════════════════════════
𐀪 Author: MhndFi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:24:35 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #web_security #infosec #cybersecurity
════════════════════════
𐀪 Author: MhndFi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:24:35 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #web_security #infosec #cybersecurity
Medium
How I Found 4 Vulnerabilities in 3 Days — Beginner Journey
This is the story of how I submitted 4 vulnerability reports to Target’s HackerOne program in just 3 days, using a methodical approach and…
⤷ Title: Backend Mastery: The Real Bug Bounty Superpower (2026 Guide)
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:16:52 GMT
════════════════════════
⌗ Tags: #programming #technology #bug_bounty_tips #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:16:52 GMT
════════════════════════
⌗ Tags: #programming #technology #bug_bounty_tips #bug_bounty #cybersecurity
Medium
Backend Mastery: The Real Bug Bounty Superpower (2026 Guide)
You’ve learned XSS. You know SQL injection basics. You’ve automated recon.
⤷ Title: A Practical Guide to Finding Broken Access Control (BAC)
════════════════════════
𐀪 Author: NullSec
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:44:53 GMT
════════════════════════
⌗ Tags: #broken_access_control #bug_bounty_tips #abc #web_app_pentesting #bug_bounty
════════════════════════
𐀪 Author: NullSec
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:44:53 GMT
════════════════════════
⌗ Tags: #broken_access_control #bug_bounty_tips #abc #web_app_pentesting #bug_bounty
Medium
A Practical Guide to Finding Broken Access Control (BAC)
With Real Testing Examples
⤷ Title: Running Multiple Bug Bounty Targets at the Same Time — Is It Legal?
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:37:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #vulnerability #hacking #security
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:37:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #vulnerability #hacking #security
Medium
Running Multiple Bug Bounty Targets at the Same Time — Is It Legal?
Running Multiple Bug Bounty Targets at the Same Time — Is It Legal?
⤷ Title: Cyber Threat Profiles of Iranian Threat Actors & Iranian Cyber Proxies
════════════════════════
𐀪 Author: SIMKRA
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:40:47 GMT
════════════════════════
⌗ Tags: #war #information_security #threat_intelligence #hacking #cybersecurity
════════════════════════
𐀪 Author: SIMKRA
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:40:47 GMT
════════════════════════
⌗ Tags: #war #information_security #threat_intelligence #hacking #cybersecurity
Medium
Cyber Threat Profiles of Iranian Threat Actors & Iranian Cyber Proxies
Axis of Resistance / Islamic Resistance
⤷ Title: Mitigating Risk in Mendix Applications
════════════════════════
𐀪 Author: Thijs de Jong
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:25:37 GMT
════════════════════════
⌗ Tags: #software_development #hacking #security #low_code #mendix
════════════════════════
𐀪 Author: Thijs de Jong
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:25:37 GMT
════════════════════════
⌗ Tags: #software_development #hacking #security #low_code #mendix
Medium
Mitigating Risk in Mendix Applications
A Practical Security Guide for Developers
⤷ Title: The Edge AI Paradox: Why “Privacy-First” Devices Are a Hacker’s Best Friend
════════════════════════
𐀪 Author: Jose Baena Cobos
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:04:32 GMT
════════════════════════
⌗ Tags: #cloud_computing #machine_learning #ai #hacking #cybersecurity
════════════════════════
𐀪 Author: Jose Baena Cobos
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:04:32 GMT
════════════════════════
⌗ Tags: #cloud_computing #machine_learning #ai #hacking #cybersecurity
Medium
The Edge AI Paradox: Why “Privacy-First” Devices Are a Hacker’s Best Friend
We moved AI from the cloud to our devices to protect our privacy. We might have just handed attackers the ultimate skeleton key
⤷ Title: One Time Pad (OTP): The Unbreakable Cipher
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:26:06 GMT
════════════════════════
⌗ Tags: #cryptography #programming #cybersecurity #information_security #infosec
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:26:06 GMT
════════════════════════
⌗ Tags: #cryptography #programming #cybersecurity #information_security #infosec
Medium
One Time Pad (OTP): The Unbreakable Cipher
(Subnoscript: Exploring Perfect Secrecy, True Randomness, and why OTP is actually a Secret Sharing mechanism)
⤷ Title: From EAP to NTLM: What Happens After 802.1X Reaches the Server
════════════════════════
𐀪 Author: winnietheSUii
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:08:44 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #network_security #computer_networking
════════════════════════
𐀪 Author: winnietheSUii
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:08:44 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #network_security #computer_networking
Medium
From EAP to NTLM: What Happens After 802.1X Reaches the Server
I recently built a FreeRADIUS + Samba Active Directory setup for a university network project.
⤷ Title: Simple Hack-The-Box Security Architecture Takeaways (Part 1)
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:20:04 GMT
════════════════════════
⌗ Tags: #web_services #penetration_testing #api #hackthebox
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:20:04 GMT
════════════════════════
⌗ Tags: #web_services #penetration_testing #api #hackthebox
Medium
Simple Hack-The-Box Security Architecture Takeaways (Part 1)
How HTB CTF exploits teach us architecture.
⤷ Title: Dc4 Write-up
════════════════════════
𐀪 Author: Tugrulakagunduz
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:15:20 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #ctf_writeup #exploit #cybersecurity
════════════════════════
𐀪 Author: Tugrulakagunduz
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:15:20 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #ctf_writeup #exploit #cybersecurity
Medium
Dc4 Write-up
Keşif aşamasında yapılan taramalar sonucunda, hedef makinenin (192.168.1.144) 80 numaralı portunda bir web servisinin çalıştığı tespit…
⤷ Title: RootMe — TryHackMe Walkthrough | Complete Beginner-Friendly Write-Up
════════════════════════
𐀪 Author: Sneha
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:14:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Sneha
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:14:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing
Medium
RootMe — TryHackMe Walkthrough | Complete Beginner-Friendly Write-Up
Room: RootMe
⤷ Title: Client-Server Basics
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:59:33 GMT
════════════════════════
⌗ Tags: #client_server_basics #tryhackme
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:59:33 GMT
════════════════════════
⌗ Tags: #client_server_basics #tryhackme
Medium
Client-Server Basics
“Client-Server Basics” is published by Mujahid Hasan.
⤷ Title: Certified THM SEC1 with the (almost) chaos
════════════════════════
𐀪 Author: Chananya Choosak
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:29:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #sec1
════════════════════════
𐀪 Author: Chananya Choosak
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:29:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #sec1
Medium
Certified THM SEC1 with the (almost) chaos
ท่ามกลางวงการสอบ Certification ทั้งสาย Hands-on ก็ดี หรือสาย Management ไปจนสำหรับ Beginner ที่เพิ่งเข้ามาในวงการ ก็ล้วนมีสนามใบ Cert…
⤷ Title: From Drupal RCE to Root: DC-1 Walkthrough (Vulnhub)
════════════════════════
𐀪 Author: Satyamsatyarthi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:19:23 GMT
════════════════════════
⌗ Tags: #hacking #vulnhub_walkthrough #cybersecurity #privilege_escalation #labs
════════════════════════
𐀪 Author: Satyamsatyarthi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:19:23 GMT
════════════════════════
⌗ Tags: #hacking #vulnhub_walkthrough #cybersecurity #privilege_escalation #labs
Medium
From Drupal RCE to Root: DC-1 Walkthrough (Vulnhub)
DC‑1 is a beginner‑friendly boot2root machine from VulnHub designed to test web exploitation, credential extraction, password cracking, and…
⤷ Title: Poster Postgres RDBMS (THM) Tryhackme WriteUp Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 19:58:11 GMT
════════════════════════
⌗ Tags: #hacking #rdbms #tryhackme #postgresql #coding
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 19:58:11 GMT
════════════════════════
⌗ Tags: #hacking #rdbms #tryhackme #postgresql #coding
Medium
Poster Postgres RDBMS (THM) Tryhackme WriteUp Answer
Denoscription : The sys admin set up a rdbms in a safe way.
⤷ Title: 10 Administrator-to-SYSTEM Privilege Escalation Techniques Every Red Teamer MUST Master
════════════════════════
𐀪 Author: Candy Wong
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:11:45 GMT
════════════════════════
⌗ Tags: #offensive_security #hacking #privilege_escalation #red_team #post_exploitation
════════════════════════
𐀪 Author: Candy Wong
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:11:45 GMT
════════════════════════
⌗ Tags: #offensive_security #hacking #privilege_escalation #red_team #post_exploitation
Medium
10 Administrator-to-SYSTEM Privilege Escalation Techniques Every Red Teamer MUST Master
Having local admin is not the end goal. NT AUTHORITY\SYSTEM is. This deep technical breakdown covers 10 battle-tested methods — from Potato…
⤷ Title: The Anatomy of an Insecure Web App: Lessons from a Penetration Test
════════════════════════
𐀪 Author: Joseph Oxan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:51:29 GMT
════════════════════════
⌗ Tags: #ethical_hacking #web_security #penetration_testing #web_development #cybersecurity
════════════════════════
𐀪 Author: Joseph Oxan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:51:29 GMT
════════════════════════
⌗ Tags: #ethical_hacking #web_security #penetration_testing #web_development #cybersecurity
Medium
The Anatomy of an Insecure Web App: Lessons from a Penetration Test
In the world of cybersecurity, we often talk about “best practices” in the abstract. But what does a truly vulnerable application look like…