⤷ Title: HackTheBox — AoTR 1: A Call From the Museum
════════════════════════
𐀪 Author: Riconatanael
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:45:14 GMT
════════════════════════
⌗ Tags: #capture_the_flag #hackthebox_writeup #cybersecurity
════════════════════════
𐀪 Author: Riconatanael
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:45:14 GMT
════════════════════════
⌗ Tags: #capture_the_flag #hackthebox_writeup #cybersecurity
Medium
HackTheBox — AoTR 1: A Call From the Museum
Sherlock Scenario:
⤷ Title: Solving a Bugforge Daily Challenge (Feb 28) — Exploiting Hidden API Endpoint in Ottergram
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:48:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #bugforge #caido #ethical_hacking #web_pen_testing
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:48:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #bugforge #caido #ethical_hacking #web_pen_testing
Medium
Solving a Bugforge Daily Challenge (Feb 28) — Exploiting Hidden API Endpoint in Ottergram
Today, I solved the February 28 daily challenge on Bugforge, targeting a social-style web application called Ottergram.
⤷ Title: Day 12 — Making the Database Sleep (Time-Based Blind SQL Injection)
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:37:45 GMT
════════════════════════
⌗ Tags: #ethical_hacking #sql_injection #vapt #web_penetration_testing #blind_sql_injection
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 06:37:45 GMT
════════════════════════
⌗ Tags: #ethical_hacking #sql_injection #vapt #web_penetration_testing #blind_sql_injection
Medium
🚀 Day 12 — Making the Database Sleep (Time-Based Blind SQL Injection)
Target Application:https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: GraphQL API Security: Common Vulnerabilities and Exploits
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:34:43 GMT
════════════════════════
⌗ Tags: #api_security #ethical_hacking #cybersecurity #information_security #cyber_security_awareness
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:34:43 GMT
════════════════════════
⌗ Tags: #api_security #ethical_hacking #cybersecurity #information_security #cyber_security_awareness
Medium
GraphQL API Security: Common Vulnerabilities and Exploits
Introduction: GraphQL as a High-Risk Modern API Architecture
⤷ Title: Ghost Mantis CTF 2026 — CREST PCU
════════════════════════
𐀪 Author: Laxmikant Dhawade
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:07:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #ethical_hacking #reverse_engineering #ctf_writeup
════════════════════════
𐀪 Author: Laxmikant Dhawade
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 05:07:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #ethical_hacking #reverse_engineering #ctf_writeup
Medium
Ghost Mantis CTF 2026 — CREST PCU
Some competitions test knowledge. Some test speed. Ghost Mantis CTF tested mindset.
⤷ Title: The “Middleman” Attack: Hijacking Accounts via Password Reset Poisoning
════════════════════════
𐀪 Author: Mukilan Baskaran
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:19:36 GMT
════════════════════════
⌗ Tags: #security #infosec #hacking #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Mukilan Baskaran
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:19:36 GMT
════════════════════════
⌗ Tags: #security #infosec #hacking #cybersecurity #bug_bounty
Medium
The “Middleman” Attack: Hijacking Accounts via Password Reset Poisoning
A deep dive into how trusting middleware headers can lead to a full account takeover.
⤷ Title: Why I Built an AI Agent to Hack for Me: The Rise of MCP-Powered Bug Hunting
════════════════════════
𐀪 Author: Mr Horbio
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:19:20 GMT
════════════════════════
⌗ Tags: #ai #agentic_ai #bug_bounty #claude #cybersecurity
════════════════════════
𐀪 Author: Mr Horbio
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:19:20 GMT
════════════════════════
⌗ Tags: #ai #agentic_ai #bug_bounty #claude #cybersecurity
Medium
Why I Built an AI Agent to Hack for Me: The Rise of MCP-Powered Bug Hunting
Stop Manual Pentesting. Learn how to bridge Claude to Kali Linux using Model Context Protocol (MCP) to automate the most tedious parts of…
⤷ Title: Bug Bounty Hunting — Complete Guide (Part-165)
════════════════════════
𐀪 Author: Mehedi Hasan Rafid
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:05:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #bug_bounty_tips #bug_bounty #ethical_hacking
════════════════════════
𐀪 Author: Mehedi Hasan Rafid
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:05:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #bug_bounty_tips #bug_bounty #ethical_hacking
Medium
Bug Bounty Hunting — Complete Guide (Part-165)
The Retry-After header is a response-type HTTP header that tells a client (like a web browser or a search engine crawler) exactly how long…
⤷ Title: Bug Bounty Hunting — Complete Guide (Part-164)
════════════════════════
𐀪 Author: Mehedi Hasan Rafid
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:03:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_tips #ethical_hacking #hacking #bug_bounty
════════════════════════
𐀪 Author: Mehedi Hasan Rafid
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:03:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_tips #ethical_hacking #hacking #bug_bounty
Medium
Bug Bounty Hunting — Complete Guide (Part-164)
The Repr-Digest header is a modern HTTP representation header used to ensure the integrity of a resource. Think of it as a "digital…
⤷ Title: From Swagger to XSS: Turning a Misconfigured configUrl into a $400 RXSS Bounty
════════════════════════
𐀪 Author: dr34m14
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:00:15 GMT
════════════════════════
⌗ Tags: #xss_attack #hackerone #bugbounty_writeup #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: dr34m14
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:00:15 GMT
════════════════════════
⌗ Tags: #xss_attack #hackerone #bugbounty_writeup #bug_bounty #bug_bounty_tips
Medium
From Swagger to XSS: Turning a Misconfigured configUrl into a $400 RXSS Bounty
A practical story of how automated recon, historical URL mining, and careful testing led to a Medium-severity Reflected XSS — responsibly…
⤷ Title: Building Scalable Mobile and Web Applications in 2026
════════════════════════
𐀪 Author: AcmeMinds
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:10:36 GMT
════════════════════════
⌗ Tags: #application_security #web_app_development #mobile_application #mobile_app_development #application_development
════════════════════════
𐀪 Author: AcmeMinds
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:10:36 GMT
════════════════════════
⌗ Tags: #application_security #web_app_development #mobile_application #mobile_app_development #application_development
Medium
Building Scalable Mobile and Web Applications in 2026
Architecture, Frameworks, and Engineering Decisions That Matter
⤷ Title: Lau Dai Im Ang Hack: Khi Sinh Ton Kinh Di Tro Nen De Tho Nhung Van Cang Nao
════════════════════════
𐀪 Author: DLMOD
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:23:46 GMT
════════════════════════
⌗ Tags: #hacking #dlmod #games
════════════════════════
𐀪 Author: DLMOD
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:23:46 GMT
════════════════════════
⌗ Tags: #hacking #dlmod #games
Medium
Lau Dai Im Ang Hack: Khi Sinh Ton Kinh Di Tro Nen De Tho Nhung Van Cang Nao
Lâu Đài Im Ắng Hack mang đến trải nghiệm sinh tồn chiến thuật đầy kịch tính trong bối cảnh một lâu đài u ám, nơi bạn phải chọn giữa cố thủ…
⤷ Title: Galaxy Dash writeup (SQLi) (Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:02:21 GMT
════════════════════════
⌗ Tags: #bugforge #sql_injection #hacking
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:02:21 GMT
════════════════════════
⌗ Tags: #bugforge #sql_injection #hacking
Medium
Galaxy Dash writeup (SQLi) (Bugforge)
Step 1: Register and proxy traffic
⤷ Title: CafeClub writeup (LFI) (Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 07:24:01 GMT
════════════════════════
⌗ Tags: #bugforge #burpsuite #hacking #owasp
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 07:24:01 GMT
════════════════════════
⌗ Tags: #bugforge #burpsuite #hacking #owasp
Medium
CafeClub writeup (LFI) (Bugforge)
We are back, yet again at the famous CafeClub! The vulnerability was similar to this, but it’s always good to find and practice.
⤷ Title: How UE5 Reflection Works and How People Dump SDKs With It
════════════════════════
𐀪 Author: user32
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 07:10:17 GMT
════════════════════════
⌗ Tags: #unreal_engine #coding #gaming #reverse_engineering #hacking
════════════════════════
𐀪 Author: user32
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 07:10:17 GMT
════════════════════════
⌗ Tags: #unreal_engine #coding #gaming #reverse_engineering #hacking
Medium
How UE5 Reflection Works and How People Dump SDKs With It
Unreal Engine has a runtime reflection system that describes the layout of classes, structs, properties, functions, and enums while the…
⤷ Title: What 3 Years of Enterprise IAM Taught me About Securing Cloud Identities
════════════════════════
𐀪 Author: Vivek Kumar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 07:53:50 GMT
════════════════════════
⌗ Tags: #identity_management #infosec #cloud_security #cybersecurity #software_engineering
════════════════════════
𐀪 Author: Vivek Kumar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 07:53:50 GMT
════════════════════════
⌗ Tags: #identity_management #infosec #cloud_security #cybersecurity #software_engineering
Medium
What 3 Years of Enterprise IAM Taught me About Securing Cloud Identities
3 years securing identities — what enterprise IAM actually teaches you that no certification covers.
⤷ Title: Different Standards and Methodologies of Penetration Testing
════════════════════════
𐀪 Author: احمد عصام
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:25:32 GMT
════════════════════════
⌗ Tags: #owasp_web_security #nist_framework #penetration_testing #mitre_attack #osstmm
════════════════════════
𐀪 Author: احمد عصام
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:25:32 GMT
════════════════════════
⌗ Tags: #owasp_web_security #nist_framework #penetration_testing #mitre_attack #osstmm
Medium
Different Standards and Methodologies of Penetration Testing
Penetration testing is not just about exploiting vulnerabilities; it is a structured process guided by well-defined standards and…
⤷ Title: Will AI Kill Cybersecurity Jobs?
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:27:45 GMT
════════════════════════
⌗ Tags: #future #technology #tech #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:27:45 GMT
════════════════════════
⌗ Tags: #future #technology #tech #cybersecurity #ethical_hacking
Medium
Will AI Kill Cybersecurity Jobs?
The Truth Might Surprise You
⤷ Title: Top-Rated RHCSA Holi Offer with Hands-On Labs & Live Classes
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:18:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #red_hat #cybersecurity_training #ethical_hacking #red_hat_training
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 08:18:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #red_hat #cybersecurity_training #ethical_hacking #red_hat_training
Medium
Top-Rated RHCSA Holi Offer with Hands-On Labs & Live Classes
Why RHCSA Certification Is a Smart Career Move
⤷ Title: SQL Injection Authentication Bypass Cheat Sheet
════════════════════════
𐀪 Author: Surya Sadanala
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 07:10:40 GMT
════════════════════════
⌗ Tags: #information_security #sql_injection #cheatsheet #cybersecurity #trending
════════════════════════
𐀪 Author: Surya Sadanala
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 07:10:40 GMT
════════════════════════
⌗ Tags: #information_security #sql_injection #cheatsheet #cybersecurity #trending
Medium
SQL Injection Authentication Bypass Cheat Sheet
This list can be used by penetration testers when testing for SQL injection authentication bypass.A penetration tester can use it manually…
⤷ Title: North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:14:00 +0530
════════════════════════
⌗ Tags: No_Tags