⤷ Title: Simple Hack-The-Box Security Architecture Takeaways (Part 1)
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:20:04 GMT
════════════════════════
⌗ Tags: #web_services #penetration_testing #api #hackthebox
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 18:20:04 GMT
════════════════════════
⌗ Tags: #web_services #penetration_testing #api #hackthebox
Medium
Simple Hack-The-Box Security Architecture Takeaways (Part 1)
How HTB CTF exploits teach us architecture.
⤷ Title: Dc4 Write-up
════════════════════════
𐀪 Author: Tugrulakagunduz
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:15:20 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #ctf_writeup #exploit #cybersecurity
════════════════════════
𐀪 Author: Tugrulakagunduz
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:15:20 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #ctf_writeup #exploit #cybersecurity
Medium
Dc4 Write-up
Keşif aşamasında yapılan taramalar sonucunda, hedef makinenin (192.168.1.144) 80 numaralı portunda bir web servisinin çalıştığı tespit…
⤷ Title: RootMe — TryHackMe Walkthrough | Complete Beginner-Friendly Write-Up
════════════════════════
𐀪 Author: Sneha
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:14:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Sneha
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:14:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing
Medium
RootMe — TryHackMe Walkthrough | Complete Beginner-Friendly Write-Up
Room: RootMe
⤷ Title: Client-Server Basics
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:59:33 GMT
════════════════════════
⌗ Tags: #client_server_basics #tryhackme
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:59:33 GMT
════════════════════════
⌗ Tags: #client_server_basics #tryhackme
Medium
Client-Server Basics
“Client-Server Basics” is published by Mujahid Hasan.
⤷ Title: Certified THM SEC1 with the (almost) chaos
════════════════════════
𐀪 Author: Chananya Choosak
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:29:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #sec1
════════════════════════
𐀪 Author: Chananya Choosak
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 17:29:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #sec1
Medium
Certified THM SEC1 with the (almost) chaos
ท่ามกลางวงการสอบ Certification ทั้งสาย Hands-on ก็ดี หรือสาย Management ไปจนสำหรับ Beginner ที่เพิ่งเข้ามาในวงการ ก็ล้วนมีสนามใบ Cert…
⤷ Title: From Drupal RCE to Root: DC-1 Walkthrough (Vulnhub)
════════════════════════
𐀪 Author: Satyamsatyarthi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:19:23 GMT
════════════════════════
⌗ Tags: #hacking #vulnhub_walkthrough #cybersecurity #privilege_escalation #labs
════════════════════════
𐀪 Author: Satyamsatyarthi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:19:23 GMT
════════════════════════
⌗ Tags: #hacking #vulnhub_walkthrough #cybersecurity #privilege_escalation #labs
Medium
From Drupal RCE to Root: DC-1 Walkthrough (Vulnhub)
DC‑1 is a beginner‑friendly boot2root machine from VulnHub designed to test web exploitation, credential extraction, password cracking, and…
⤷ Title: Poster Postgres RDBMS (THM) Tryhackme WriteUp Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 19:58:11 GMT
════════════════════════
⌗ Tags: #hacking #rdbms #tryhackme #postgresql #coding
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 19:58:11 GMT
════════════════════════
⌗ Tags: #hacking #rdbms #tryhackme #postgresql #coding
Medium
Poster Postgres RDBMS (THM) Tryhackme WriteUp Answer
Denoscription : The sys admin set up a rdbms in a safe way.
⤷ Title: 10 Administrator-to-SYSTEM Privilege Escalation Techniques Every Red Teamer MUST Master
════════════════════════
𐀪 Author: Candy Wong
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:11:45 GMT
════════════════════════
⌗ Tags: #offensive_security #hacking #privilege_escalation #red_team #post_exploitation
════════════════════════
𐀪 Author: Candy Wong
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 16:11:45 GMT
════════════════════════
⌗ Tags: #offensive_security #hacking #privilege_escalation #red_team #post_exploitation
Medium
10 Administrator-to-SYSTEM Privilege Escalation Techniques Every Red Teamer MUST Master
Having local admin is not the end goal. NT AUTHORITY\SYSTEM is. This deep technical breakdown covers 10 battle-tested methods — from Potato…
⤷ Title: The Anatomy of an Insecure Web App: Lessons from a Penetration Test
════════════════════════
𐀪 Author: Joseph Oxan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:51:29 GMT
════════════════════════
⌗ Tags: #ethical_hacking #web_security #penetration_testing #web_development #cybersecurity
════════════════════════
𐀪 Author: Joseph Oxan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:51:29 GMT
════════════════════════
⌗ Tags: #ethical_hacking #web_security #penetration_testing #web_development #cybersecurity
Medium
The Anatomy of an Insecure Web App: Lessons from a Penetration Test
In the world of cybersecurity, we often talk about “best practices” in the abstract. But what does a truly vulnerable application look like…
⤷ Title: Learning how real attacks start with misconfigurations, not exploits
════════════════════════
𐀪 Author: Yağız Kırnapcı
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:21:46 GMT
════════════════════════
⌗ Tags: #networking #cybersecurity #information_security #penetration_testing #linux
════════════════════════
𐀪 Author: Yağız Kırnapcı
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:21:46 GMT
════════════════════════
⌗ Tags: #networking #cybersecurity #information_security #penetration_testing #linux
Medium
My First Real Enumeration — Understanding Anonymous FTP
Learning why real breaches often happen without exploitation
⤷ Title: Web Application Security TryHackMe Walkthrough
════════════════════════
𐀪 Author: Virendra Kumar
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:27:36 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #web3 #cyberleelawat
════════════════════════
𐀪 Author: Virendra Kumar
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 20:27:36 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #web3 #cyberleelawat
Medium
Web Application Security TryHackMe Walkthrough
Learn about web applications and explore some of their common security issues.
⤷ Title: TryHackMe Walkthrough: Cyber Security 101 — Start Your Cyber Security Journey
════════════════════════
𐀪 Author: Shubham Khirwadkar
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 19:07:11 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ethical_hacking #defensive_security #offensive_security
════════════════════════
𐀪 Author: Shubham Khirwadkar
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 19:07:11 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ethical_hacking #defensive_security #offensive_security
Medium
TryHackMe Walkthrough: Cyber Security 101 — Start Your Cyber Security Journey
A hands-on walkthrough of Rooms 1–3: Intro to Offensive Security, Intro to Defensive Security, and Search Skills
⤷ Title: Wanna Start Linux Command Line? Here’s the secret!
════════════════════════
𐀪 Author: Soumyadip Manna
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 19:56:09 GMT
════════════════════════
⌗ Tags: #ctf_writeup #linux #cybersecurity #ethical_hacking #command_line
════════════════════════
𐀪 Author: Soumyadip Manna
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 19:56:09 GMT
════════════════════════
⌗ Tags: #ctf_writeup #linux #cybersecurity #ethical_hacking #command_line
Medium
Wanna Start Linux Command Line? Here’s the secret!
Starting is really overwhelming.
⤷ Title: Fake Xeno and Roblox Utilities Used to Install Windows RAT, Microsoft Warns
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 21:19:56 +0000
════════════════════════
⌗ Tags: #Security #Malware #Microsoft #Cybersecurity #Fraud #gaming #LOLBins #PythonAnywhere #RAT #Roblox #Scam #TROJAN
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 21:19:56 +0000
════════════════════════
⌗ Tags: #Security #Malware #Microsoft #Cybersecurity #Fraud #gaming #LOLBins #PythonAnywhere #RAT #Roblox #Scam #TROJAN
Hackread
Fake Xeno and Roblox Utilities Used to Install Windows RAT, Microsoft Warns
Follow us on all social media platforms @Hackread
⤷ Title: Arbitrary Process Termination via Vulnerable Driver: BYOVD
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 22:04:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #red_team #pentesting #malware
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 22:04:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #red_team #pentesting #malware
Medium
Arbitrary Process Termination via Vulnerable Driver: BYOVD
Welcome to this new Medium post. This one is special to me because it’s the first time I’m publicly releasing a BYOVD attack.
I originally…
I originally…
⤷ Title: How I Cracked Linux Chrome’s Password Encryption
════════════════════════
𐀪 Author: Lembou pharel
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 21:39:43 GMT
════════════════════════
⌗ Tags: #chrome #cybersecurity #linux #password_cracking #hacking
════════════════════════
𐀪 Author: Lembou pharel
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 21:39:43 GMT
════════════════════════
⌗ Tags: #chrome #cybersecurity #linux #password_cracking #hacking
Medium
How I Cracked Linux Chrome’s Password Encryption
If you’ve ever tried to noscript the extraction of saved passwords from Chromium-based browsers on Linux, you’ve likely hit a wall: the…
⤷ Title: Try Hack Me- Sustah CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 21:09:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #tryhackme_writeup #tryhackme #cybersecurity #tryhackme_walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 21:09:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #tryhackme_writeup #tryhackme #cybersecurity #tryhackme_walkthrough
Medium
Try Hack Me- Sustah CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: API Gateway Authentication with Cognito User Pools
════════════════════════
𐀪 Author: Sithija Kumarasinghe
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 21:44:58 GMT
════════════════════════
⌗ Tags: #api_security #jwt_authentication #aws_lambda_integration #aws_cognito #aws_api_gateway
════════════════════════
𐀪 Author: Sithija Kumarasinghe
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 21:44:58 GMT
════════════════════════
⌗ Tags: #api_security #jwt_authentication #aws_lambda_integration #aws_cognito #aws_api_gateway
Medium
API Gateway Authentication with Cognito User Pools
You deploy your API using Amazon API Gateway. You connect it to Lambda. You test it using Postman. It returns data instantly. Everything…
⤷ Title: Critical Backup Flaws Expose Vitess Environments to Complete Takeover
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 00:59:34 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Backup Poisoning #cloud_native #CVE_2026_27965 #CVE_2026_27969 #database security #infosec #MySQL Scaling #Patch Alert #Path Traversal #rce #Vitess
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 00:59:34 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Backup Poisoning #cloud_native #CVE_2026_27965 #CVE_2026_27969 #database security #infosec #MySQL Scaling #Patch Alert #Path Traversal #rce #Vitess
Daily CyberSecurity
Critical Backup Flaws Expose Vitess Environments to Complete Takeover
Vitess patches critical flaws (CVE-2026-27969 & 27965) where poisoned backup manifests lead to path traversal and RCE during restoration. Update to v23.0.3 now.
⤷ Title: Critical 9.8 Flaw in Langflow’s AI CSV Agent Opens a Direct Path to Root Shell
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 00:55:57 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI security #CSV Agent #CVE_2026_27966 #infosec #LangChain #Langflow #Patch Alert #Prompt injection #python_repl_ast #rce #Remote Code Execution #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 00:55:57 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI security #CSV Agent #CVE_2026_27966 #infosec #LangChain #Langflow #Patch Alert #Prompt injection #python_repl_ast #rce #Remote Code Execution #Vulnerability
Daily CyberSecurity
Critical 9.8 Flaw in Langflow’s AI CSV Agent Opens a Direct Path to Root Shell
Langflow 1.8.0 patches a critical 9.8 CVSS RCE vulnerability (CVE-2026-27966) where a hardcoded "allow_dangerous_code" setting enables prompt injection attacks.
⤷ Title: Critical Flaws in Vikunja Expose Users to Persistent Account Takeovers
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 00:49:00 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Account Takeover #CVE_2026_27575 #CVE_2026_28268 #infosec #Logic Error #Open Source Security #Password Reset Flaw #Patch Alert #Session Hijacking #Vikunja
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 00:49:00 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Account Takeover #CVE_2026_27575 #CVE_2026_28268 #infosec #Logic Error #Open Source Security #Password Reset Flaw #Patch Alert #Session Hijacking #Vikunja
Daily CyberSecurity
Critical Flaws in Vikunja Expose Users to Persistent Account Takeovers
Vikunja v2.0.1 patches critical flaws (CVE-2026-27575 & 28268) where "immortal" reset tokens and persistent sessions allow attackers to hijack accounts forever.