⤷ Title: 18 Ways to Root a Linux Box; TryHackMe Linux PrivEsc Walkthrough
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 02:14:54 GMT
════════════════════════
⌗ Tags: #ethical_hacking #tryhackme_walkthrough #linux #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 02:14:54 GMT
════════════════════════
⌗ Tags: #ethical_hacking #tryhackme_walkthrough #linux #penetration_testing #cybersecurity
Medium
18 Ways to Root a Linux Box; TryHackMe Linux PrivEsc Walkthrough
If you want to learn Linux privilege escalation, this is the room. TryHackMe’s Linux PrivEsc by Tib3rius walks you through 18 real…
⤷ Title: HTB Keeper Writeup: How a Danish Dessert Unlocked Root Access
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 01:12:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox #ethical_hacking #penetration_testing #ctf
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 01:12:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox #ethical_hacking #penetration_testing #ctf
Medium
HTB Keeper Writeup: How a Danish Dessert Unlocked Root Access
Add given ip to host file keeper.htb
⤷ Title: WSTG-CONF-07
════════════════════════
𐀪 Author: Narathama Firmansyah Putra
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 01:02:52 GMT
════════════════════════
⌗ Tags: #owasp #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Narathama Firmansyah Putra
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 01:02:52 GMT
════════════════════════
⌗ Tags: #owasp #cybersecurity #penetration_testing
Medium
WSTG-CONF-07
Introduction WSTG-CONF-07 adalah pengujian untuk memastikan penerapan HTTP Strict Transport Security (HSTS). HSTS adalah mekanisme keamanan…
⤷ Title: How Race condition leading to business logic flaws affecting
════════════════════════
𐀪 Author: Mesalam_17
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 04:16:43 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #cybersecurity #hacking #bugbounty_writeup
════════════════════════
𐀪 Author: Mesalam_17
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 04:16:43 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #cybersecurity #hacking #bugbounty_writeup
Medium
How Race condition leading to business logic flaws affecting
— Group uniqueness validation
⤷ Title: How I Found a Broken Object Level Authorization (BOLA) in a Real Production App
════════════════════════
𐀪 Author: 77r4sed
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 03:56:52 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #technology #programming #cybersecurity
════════════════════════
𐀪 Author: 77r4sed
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 03:56:52 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #technology #programming #cybersecurity
Medium
How I Found a Broken Object Level Authorization (BOLA) in a Real Production App
This is the write-up of how I found a Broken Object Level Authorization (BOLA) vulnerability that allowed cross-account cart manipulation…
⤷ Title: Dystopia 2035: The War on Privacy & Free Speech_Ep. #26–1
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 04:44:01 GMT
════════════════════════
⌗ Tags: #privacy #security #hacking #national_security #cybersecurity
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 04:44:01 GMT
════════════════════════
⌗ Tags: #privacy #security #hacking #national_security #cybersecurity
Medium
Dystopia 2035: The War on Privacy & Free Speech_Ep. #26–1
A series dedicated to exposing the dystopian underpinnings of present day society with a tech-bent privacy focus and expert analysis by…
⤷ Title: RPS-(Rock, Paper, Scissors)-picoCTF
════════════════════════
𐀪 Author: Vishvambhar ranoshe
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 04:41:38 GMT
════════════════════════
⌗ Tags: #infosec #picoctf_2022 #info_sec_writeups #picoctf #cybersecurity
════════════════════════
𐀪 Author: Vishvambhar ranoshe
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 04:41:38 GMT
════════════════════════
⌗ Tags: #infosec #picoctf_2022 #info_sec_writeups #picoctf #cybersecurity
Medium
RPS-(Rock, Paper, Scissors)-picoCTF
⤷ Title: SQLiLite-picoCTF
════════════════════════
𐀪 Author: Vishvambhar ranoshe
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 04:38:10 GMT
════════════════════════
⌗ Tags: #ethical_hacking #info_sec_writeups #picoctf_2022 #picoctf #cybersecurity
════════════════════════
𐀪 Author: Vishvambhar ranoshe
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 04:38:10 GMT
════════════════════════
⌗ Tags: #ethical_hacking #info_sec_writeups #picoctf_2022 #picoctf #cybersecurity
Medium
SQLiLite-picoCTF
Challenge Information
⤷ Title: X Launches “Paid Partnership” Labels and Excludes Crypto from Prohibited List: What It Means for…
════════════════════════
𐀪 Author: CHAINISLE
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 03:50:15 GMT
════════════════════════
⌗ Tags: #xs #paid_partnerships
════════════════════════
𐀪 Author: CHAINISLE
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 03:50:15 GMT
════════════════════════
⌗ Tags: #xs #paid_partnerships
Medium
X Launches “Paid Partnership” Labels and Excludes Crypto from Prohibited List: What It Means for…
The world of social media is evolving rapidly. Today, Nikita Bier, Head of Product at X, announced an important update: the platform is…
⤷ Title: 馬斯克:2026是X的創作者之年,要入場嗎?細節分析後有實測
════════════════════════
𐀪 Author: WHOME冬
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 03:33:12 GMT
════════════════════════
⌗ Tags: #elon_musk #馬斯克 #xs #商業洞察 #賺錢
════════════════════════
𐀪 Author: WHOME冬
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 03:33:12 GMT
════════════════════════
⌗ Tags: #elon_musk #馬斯克 #xs #商業洞察 #賺錢
Medium
馬斯克:2026是X的創作者之年,要入場嗎?細節分析後有實測
X能賺美金?一條推文幾百刀?
⤷ Title: Breaking Authentication — Part 5
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:02:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #business #authentication #hacking
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:02:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #business #authentication #hacking
Medium
Breaking Authentication — Part 5
Breaking Authentication — Part 5
⤷ Title: Behind the Login Button: How Websites Remember You
════════════════════════
𐀪 Author: Gyaneshchand
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:54:11 GMT
════════════════════════
⌗ Tags: #bug_bounty #wapt
════════════════════════
𐀪 Author: Gyaneshchand
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:54:11 GMT
════════════════════════
⌗ Tags: #bug_bounty #wapt
Medium
Behind the Login Button: How Websites Remember You
Hello readers,
⤷ Title: 7,000 Chrome Users Installed a “Google Lens” Extension — It Turned Into a Crypto-Stealing Malware
════════════════════════
𐀪 Author: Subhan Ali
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:45:08 GMT
════════════════════════
⌗ Tags: #information_security #chrome_extension #cybersecurity #hacking #malware
════════════════════════
𐀪 Author: Subhan Ali
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:45:08 GMT
════════════════════════
⌗ Tags: #information_security #chrome_extension #cybersecurity #hacking #malware
Medium
7,000 Chrome Users Installed a “Google Lens” Extension — It Turned Into a Crypto-Stealing Malware
Most people think malware looks suspicious.
⤷ Title: A Hacker Used Claude to Steal 195 Million Government Records
════════════════════════
𐀪 Author: Usman Writes
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:02:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #hacking #claude_code #artificial_intelligence
════════════════════════
𐀪 Author: Usman Writes
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:02:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #hacking #claude_code #artificial_intelligence
Medium
A Hacker Used Claude to Steal 195 Million Government Records
Do you remember the good old days when the worst we had to worry about with AI were things like, “Will it take my job?” and “Will I be able…
⤷ Title: 5 Chrome Extensions That Save Me $50 a Month (The Automation Audit)
════════════════════════
𐀪 Author: Echoed Thoughts
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:43:00 GMT
════════════════════════
⌗ Tags: #fintech #productivity #technology #hacking #software_development
════════════════════════
𐀪 Author: Echoed Thoughts
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:43:00 GMT
════════════════════════
⌗ Tags: #fintech #productivity #technology #hacking #software_development
Medium
5 Chrome Extensions That Save Me $50 a Month (The Automation Audit)
Why Your Tools are Either Your Slaves or Your Masters
⤷ Title: PART 8 — Problem Management: Eliminating Root Causes and Preventing Repeat Cyber Incidents
════════════════════════
𐀪 Author: Abraham Karikari
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:06:17 GMT
════════════════════════
⌗ Tags: #risk_management #infosec #problem_management #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Abraham Karikari
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:06:17 GMT
════════════════════════
⌗ Tags: #risk_management #infosec #problem_management #cyber_security_awareness #cybersecurity
Medium
PART 8 — Problem Management: Eliminating Root Causes and Preventing Repeat Cyber Incidents
Building a Resilient Cybersecurity Framework (Ghana & Africa Focus)
⤷ Title: Thinking Like an Attacker: How API Pen-Testers Identify IDOR Vulnerabilities
════════════════════════
𐀪 Author: Odunlade Adeola
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:01:01 GMT
════════════════════════
⌗ Tags: #web_security #api #cybersecurity #penetration_testing #secure_coding
════════════════════════
𐀪 Author: Odunlade Adeola
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:01:01 GMT
════════════════════════
⌗ Tags: #web_security #api #cybersecurity #penetration_testing #secure_coding
Medium
Thinking Like an Attacker: How API Pen-Testers Identify IDOR Vulnerabilities
When most people think about hacking, they imagine something complex intricate payloads, advanced exploits, injection attacks, or bypassing…
⤷ Title: Pentesting ohne IT-Erfahrung: Ist der OSCP genug?
════════════════════════
𐀪 Author: Donbread Service
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:09:00 GMT
════════════════════════
⌗ Tags: #oscp #pentesting #kmu #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Donbread Service
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:09:00 GMT
════════════════════════
⌗ Tags: #oscp #pentesting #kmu #penetration_testing #cybersecurity
Medium
Pentesting ohne IT-Erfahrung: Ist der OSCP genug?
Jedes Jahr investieren Tausende Stunden in eine einzige Zertifizierung: OSCP (Offensive Security Certified Professional).
⤷ Title: TakeOver | TryHackMe Write-up | Farros
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 00:00:27 GMT
════════════════════════
⌗ Tags: #farro #ctf_writeup #tryhackme #enumeration #subdomain_takeover
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 00:00:27 GMT
════════════════════════
⌗ Tags: #farro #ctf_writeup #tryhackme #enumeration #subdomain_takeover
Medium
TakeOver | TryHackMe Write-up | Farros
Non-members are welcome to access the full story here.
⤷ Title: HackTheBox — AoTR 1: A Call From the Museum
════════════════════════
𐀪 Author: Riconatanael
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:45:14 GMT
════════════════════════
⌗ Tags: #capture_the_flag #hackthebox_writeup #cybersecurity
════════════════════════
𐀪 Author: Riconatanael
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:45:14 GMT
════════════════════════
⌗ Tags: #capture_the_flag #hackthebox_writeup #cybersecurity
Medium
HackTheBox — AoTR 1: A Call From the Museum
Sherlock Scenario:
⤷ Title: Solving a Bugforge Daily Challenge (Feb 28) — Exploiting Hidden API Endpoint in Ottergram
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:48:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #bugforge #caido #ethical_hacking #web_pen_testing
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:48:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #bugforge #caido #ethical_hacking #web_pen_testing
Medium
Solving a Bugforge Daily Challenge (Feb 28) — Exploiting Hidden API Endpoint in Ottergram
Today, I solved the February 28 daily challenge on Bugforge, targeting a social-style web application called Ottergram.