⤷ Title: Part 2: Thinking Like an API Attacker
════════════════════════
𐀪 Author: Falilatowolabi(leogold)
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:46:30 GMT
════════════════════════
⌗ Tags: #apisattackermindset #bug_bounty
════════════════════════
𐀪 Author: Falilatowolabi(leogold)
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:46:30 GMT
════════════════════════
⌗ Tags: #apisattackermindset #bug_bounty
Medium
Part 2: Thinking Like an API Attacker
Thinking like an API attacker means stepping outside the normal user flow. A regular user follows the UI. An attacker interacts directly…
⤷ Title: From Recon to Exploitation: How Attackers Discover, Exploit, and Chain Web App Vulnerabilities —…
════════════════════════
𐀪 Author: Aanchal Singh Rajawat
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:31:52 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #web_security #threat_intelligence #bug_bounty
════════════════════════
𐀪 Author: Aanchal Singh Rajawat
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:31:52 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #web_security #threat_intelligence #bug_bounty
Medium
From Recon to Exploitation: How Attackers Discover, Exploit, and Chain Web App Vulnerabilities — and How Defenders Can Detect and…
Hello Hackers, It’s me again… your chota-mota H@ck3r
⤷ Title: Access Control Vulnerabilities (Through Burp Suite Labs) Pt. 2: Horizontal Privilege Escalation
════════════════════════
𐀪 Author: heckor
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:10:22 GMT
════════════════════════
⌗ Tags: #access_control #penetration_testing #bug_bounty #cybersecurity #vulnerability_assessment
════════════════════════
𐀪 Author: heckor
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:10:22 GMT
════════════════════════
⌗ Tags: #access_control #penetration_testing #bug_bounty #cybersecurity #vulnerability_assessment
Medium
Access Control Vulnerabilities (Through Burp Suite Labs) Pt. 2: Horizontal Privilege Escalation
Horizontal Privilege Escalation, IDOR, Multi-step Access Control
⤷ Title: How Hackers Bypass Multi-Factor Authentication (MFA) in 2026
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:26:20 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ethical_hacking #cyber_security_awareness #hacking
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:26:20 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ethical_hacking #cyber_security_awareness #hacking
Medium
How Hackers Bypass Multi-Factor Authentication (MFA) in 2026
Introduction
⤷ Title: Malware Development — 4 (APC Injection)
════════════════════════
𐀪 Author: 0r
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:25:51 GMT
════════════════════════
⌗ Tags: #red_team #pentesting #malware #security #hacking
════════════════════════
𐀪 Author: 0r
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:25:51 GMT
════════════════════════
⌗ Tags: #red_team #pentesting #malware #security #hacking
Medium
Malware Development — 4 (APC Injection)
This article is written for educational and defensive security research purposes only. Understanding how malicious techniques work is…
⤷ Title: Understanding Sliver C2 Framework: Beacon and Session Modes
════════════════════════
𐀪 Author: Allen Ace
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:14:47 GMT
════════════════════════
⌗ Tags: #penetration_testing #command_and_control #cybersecurity #security_research #ethical_hacking
════════════════════════
𐀪 Author: Allen Ace
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:14:47 GMT
════════════════════════
⌗ Tags: #penetration_testing #command_and_control #cybersecurity #security_research #ethical_hacking
Medium
Understanding Sliver C2 Framework: Beacon and Session Modes
Implant Architecture and Design Philosophy
⤷ Title: Retracted TryHackMe Writeup
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:45:29 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #cybersecurity #tryhackme_writeup #ransomware
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:45:29 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #cybersecurity #tryhackme_writeup #ransomware
Medium
Retracted TryHackMe Writeup
Investigate the case of the missing ransomware.
⤷ Title: Monday Monitor TryHackMe Writeup
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:37:25 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #wazuh #cybersecurity #tryhackme
════════════════════════
𐀪 Author: Kavusan Yesuraja
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:37:25 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #wazuh #cybersecurity #tryhackme
Medium
Monday Monitor TryHackMe Writeup
Room: https://tryhackme.com/room/mondaymonitor
⤷ Title: 【威脅情資】nc天堂釣魚網站遊戲安裝檔夾帶 RedCap 木馬之逆向分析
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:12:32 GMT
════════════════════════
⌗ Tags: #supply_chain #info_sec_writeups #apt #blue_team #malware_analysis
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:12:32 GMT
════════════════════════
⌗ Tags: #supply_chain #info_sec_writeups #apt #blue_team #malware_analysis
Medium
【威脅情資】遊戲安裝檔夾帶 RedCap 木馬之逆向分析
免責聲明:公開目的在於協助防禦、偵測與應變,不鼓勵亦不協助任何未經授權之入侵、存取或濫用行為
⤷ Title: Transmission: The Feed is a Weapon
════════════════════════
𐀪 Author: Abhinav Jain
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:02:38 GMT
════════════════════════
⌗ Tags: #ethical_hacking #weapons #hacking_tools #feedback #growth_hacking
════════════════════════
𐀪 Author: Abhinav Jain
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:02:38 GMT
════════════════════════
⌗ Tags: #ethical_hacking #weapons #hacking_tools #feedback #growth_hacking
Medium
Transmission: The Feed is a Weapon
Breathacker HQ — Unencrypted, On Purpose
⤷ Title: Beginner’s Guide to Setting Up OpenVAS (GVM) on Kali Linux)
════════════════════════
𐀪 Author: Priyanka Behera
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:36:40 GMT
════════════════════════
⌗ Tags: #beginners_guide #cybersecurity #kali_linux #openvas #ethical_hacking
════════════════════════
𐀪 Author: Priyanka Behera
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:36:40 GMT
════════════════════════
⌗ Tags: #beginners_guide #cybersecurity #kali_linux #openvas #ethical_hacking
Medium
Beginner’s Guide to Setting Up OpenVAS (GVM) on Kali Linux)
🧠 I Thought It Would Be Easy…
I installed OpenVAS (also known as Greenbone Vulnerability Management (GVM)) thinking:
“It’s just one…
I installed OpenVAS (also known as Greenbone Vulnerability Management (GVM)) thinking:
“It’s just one…
⤷ Title: Credential Harvesting Techniques Explained (From a Defensive Perspective)
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 16:23:51 GMT
════════════════════════
⌗ Tags: #bug_bounty #self_improvement #hacking #cybersecurity #web_development
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 16:23:51 GMT
════════════════════════
⌗ Tags: #bug_bounty #self_improvement #hacking #cybersecurity #web_development
Medium
Credential Harvesting Techniques Explained (From a Defensive Perspective) 🔐
In today’s threat landscape, stolen credentials remain one of the most common entry points for cyberattacks. From phishing campaigns to…
⤷ Title: Exploiting GraphQL: A Full-Spectrum Security Assessment Covering Introspection, Injection, and…
════════════════════════
𐀪 Author: Kiza
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:32:20 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #web_application_security #bug_bounty #bug_bounty_tips #graphql
════════════════════════
𐀪 Author: Kiza
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:32:20 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #web_application_security #bug_bounty #bug_bounty_tips #graphql
Medium
Exploiting GraphQL: A Full-Spectrum Security Assessment Covering Introspection, Injection, and Resolver Weaknesses
Author: https://kizerh.github.io
⤷ Title: More SQLi — picoCTF Writeup
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:26:14 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #ctf #cybersecurity #sql_injection
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:26:14 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #ctf #cybersecurity #sql_injection
Medium
More SQLi — picoCTF Writeup
Challenge Denoscription
⤷ Title: Lab: Reflected DOM XSS
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:24:35 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #ctf #hacking #xss_vulnerability
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:24:35 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #ctf #hacking #xss_vulnerability
Medium
Lab: Reflected DOM XSS
Lab Overview
⤷ Title: How to Write a Vulnerability Report That Gets Paid -Not Rejected
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:01:03 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #penetration_testing #bug_bounty #ethical_hacking
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:01:03 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #penetration_testing #bug_bounty #ethical_hacking
Medium
How to Write a Vulnerability Report That Gets Paid -Not Rejected
The exact structure, deadly mistakes, and pro tips that separate a $0 report from a $5,000 bounty
⤷ Title: Securing AI-Powered APIs: What API Security Looks Like in the Age of LLM
════════════════════════
𐀪 Author: Animashawunkomolara
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 16:08:45 GMT
════════════════════════
⌗ Tags: #api #api_security #application_security #llm #ai_security
════════════════════════
𐀪 Author: Animashawunkomolara
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 16:08:45 GMT
════════════════════════
⌗ Tags: #api #api_security #application_security #llm #ai_security
Medium
Securing AI-Powered APIs: What API Security Looks Like in the Age of LLM
Use Case: AI-Powered Copilot
⤷ Title: SMA Boarding School Terbaik Berbasis Teknologi Informasi: Awal Masa Depan Dimulai di Sini
════════════════════════
𐀪 Author: Ali Ridlo
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 16:35:28 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cybersecurity #hacking
════════════════════════
𐀪 Author: Ali Ridlo
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 16:35:28 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cybersecurity #hacking
Medium
SMA Boarding School Terbaik Berbasis Teknologi Informasi: Awal Masa Depan Dimulai di Sini
Beberapa tahun yang lalu, orang tua hanya memperhatikan sekolah dengan prestasi akademis terbaik. Saat ini, fokus pencarian mulai berubah.
⤷ Title: MalDev 101: Writing Your First Shellcode Runner in C
════════════════════════
𐀪 Author: Keith Monroe
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:02:34 GMT
════════════════════════
⌗ Tags: #ethical_hacking #malware #cybersecurity #hacking
════════════════════════
𐀪 Author: Keith Monroe
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:02:34 GMT
════════════════════════
⌗ Tags: #ethical_hacking #malware #cybersecurity #hacking
Medium
MalDev 101: Writing Your First Shellcode Runner in C
Introduction
⤷ Title: Linux Fundamentals for Cybersecurity and CTFs: Why Linux?
════════════════════════
𐀪 Author: Muhammet Alperen Şıvgın
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 16:09:45 GMT
════════════════════════
⌗ Tags: #ctf #penetration_testing #linux #cybersecurity #linux_tutorial
════════════════════════
𐀪 Author: Muhammet Alperen Şıvgın
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 16:09:45 GMT
════════════════════════
⌗ Tags: #ctf #penetration_testing #linux #cybersecurity #linux_tutorial
Medium
Linux Fundamentals for Cybersecurity and CTFs: Why Linux?
The first rule anyone stepping into cybersecurity or penetration testing (Pentest) hears is: “You must learn Linux.” But why? Why do we…
⤷ Title: Malware Analysis and Reverse Engineering Report: A Hands-On Journey Through Macro Malware…
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:44:31 GMT
════════════════════════
⌗ Tags: #python #microsoft #penetration_testing #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:44:31 GMT
════════════════════════
⌗ Tags: #python #microsoft #penetration_testing #ethical_hacking #cybersecurity
Medium
Malware Analysis and Reverse Engineering Report: A Hands-On Journey Through Macro Malware Dissection
Comprehensive dissection of macro-based malware: from static analysis to dynamic execution and threat intelligence validation