⤷ Title: I Stopped Watching Random Cybersecurity Videos — And Finally Chose a Path
════════════════════════
𐀪 Author: the copy ninja
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:20:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #portswigger #learning_journey #bug_bounty
════════════════════════
𐀪 Author: the copy ninja
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:20:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #portswigger #learning_journey #bug_bounty
Medium
I Stopped Watching Random Cybersecurity Videos — And Finally Chose a Path
I work in R&D at a cybersecurity company.
⤷ Title: Why the Best Bug Hunters Think Like Detectives, Not Hackers — And What That Difference Earns Them
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:18:51 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #business #earn_money_online #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:18:51 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #business #earn_money_online #bug_bounty_tips #bug_bounty
Medium
Why the Best Bug Hunters Think Like Detectives, Not Hackers — And What That Difference Earns Them
Introduction
⤷ Title: Lookup-A TryHackMe Writeup
════════════════════════
𐀪 Author: 0x77
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:42:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #infosec #ctf_writeup #hacking
════════════════════════
𐀪 Author: 0x77
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:42:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #infosec #ctf_writeup #hacking
Medium
Lookup-A TryHackMe Writeup
Introduction
⤷ Title: [Dev Update] In NODE: PROTOCOL, stealing the data is only half the job.
════════════════════════
𐀪 Author: Marc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:59:29 GMT
════════════════════════
⌗ Tags: #hacking #simulation #game_development #games
════════════════════════
𐀪 Author: Marc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:59:29 GMT
════════════════════════
⌗ Tags: #hacking #simulation #game_development #games
Medium
[Dev Update] In NODE: PROTOCOL, stealing the data is only half the job. You have to manage the Tainted BTC economy to survive.
Hey everyone,
⤷ Title: Cybersecurity Awareness: The Shadow AI Crisis Bleeding Your Data Through Invisible APIs
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:22:50 GMT
════════════════════════
⌗ Tags: #shadow_ai #generative_ai_risks #infosec #cyber_security_awareness #threat_intelligence
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:22:50 GMT
════════════════════════
⌗ Tags: #shadow_ai #generative_ai_risks #infosec #cyber_security_awareness #threat_intelligence
Medium
Cybersecurity Awareness: The Shadow AI Crisis Bleeding Your Data Through Invisible APIs
The cybersecurity threat you can’t see is the one destroying you from within.
❤1
⤷ Title: ToolsRus walkthrough (TryHackMe)
════════════════════════
𐀪 Author: Crystalcascade14
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:31:01 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: Crystalcascade14
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:31:01 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #cybersecurity #tryhackme_writeup
Medium
ToolsRus walkthrough (TryHackMe)
Nice beginner-friendly room to test your knowledge on nmap, dirbuster, hydra, nikto and Metasploit console.
⤷ Title: Confused About Cybersecurity Careers?
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:11:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #programming #tech #technology
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:11:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #programming #tech #technology
Medium
Confused About Cybersecurity Careers?
Let’s Simplify Your Path Into This In-Demand Field
⤷ Title: Agent-first Secure Software Development Lifecycle
════════════════════════
𐀪 Author: Bárbara Vieira
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:24:02 GMT
════════════════════════
⌗ Tags: #application_security #agent_first_development #ai #agentic_coding #security
════════════════════════
𐀪 Author: Bárbara Vieira
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:24:02 GMT
════════════════════════
⌗ Tags: #application_security #agent_first_development #ai #agentic_coding #security
Medium
Agent-first Secure Software Development Lifecycle
Agent-first development is a software development approach where autonomous AI agents plan, write, test, and modify code with minimal human…
⤷ Title: How Does M-Pesa Know My PIN Is Wrong? (And Do They Actually Know It?)
════════════════════════
𐀪 Author: Joel Orie
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:19:53 GMT
════════════════════════
⌗ Tags: #general_knowledge #application_security #cybersecurity #authentication
════════════════════════
𐀪 Author: Joel Orie
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:19:53 GMT
════════════════════════
⌗ Tags: #general_knowledge #application_security #cybersecurity #authentication
Medium
How Does M-Pesa Know My PIN Is Wrong? (And Do They Actually Know It?)
If you’ve ever mistyped your PIN on M-Pesa and received the familiar “Incorrect PIN” message, you might have wondered:
⤷ Title: Offensive Security Proving Grounds: Internal
════════════════════════
𐀪 Author: Henry Post
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 20:50:35 GMT
════════════════════════
⌗ Tags: #htb_writeup #oscp #hacking
════════════════════════
𐀪 Author: Henry Post
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 20:50:35 GMT
════════════════════════
⌗ Tags: #htb_writeup #oscp #hacking
Medium
Offensive Security Proving Grounds: Internal
See below link.
⤷ Title: Pentest GPT: Wie LLMs das Penetration Testing wirklich verändern
════════════════════════
𐀪 Author: Kerimkoc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:35:35 GMT
════════════════════════
⌗ Tags: #chatgpt #hacking #gpt #life_hacking #ai
════════════════════════
𐀪 Author: Kerimkoc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:35:35 GMT
════════════════════════
⌗ Tags: #chatgpt #hacking #gpt #life_hacking #ai
Medium
Pentest GPT: Wie LLMs das Penetration Testing wirklich verändern
Die Rolle von KI in der Cybersecurity ist längst keine Zukunftsvision mehr. Large Language Models (LLMs) wie GPT-4 werden inzwischen in…
⤷ Title: The Invoice That Wasn’t: Uncovering a Remcos RAT-Driven Email Abuse Attack
════════════════════════
𐀪 Author: Vignesh Naidu
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:14:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberattack #phishing #malware #hacking
════════════════════════
𐀪 Author: Vignesh Naidu
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:14:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberattack #phishing #malware #hacking
Medium
The Invoice That Wasn’t: Uncovering a Remcos RAT-Driven Email Abuse Attack
It started with a simple but alarming statement: “Emails are being sent from my account, but I did not send them.” What initially appeared…
⤷ Title: Hackviser Write-up [EN / TR] — Reflected XSS via HTML Attribute Manipulation
════════════════════════
𐀪 Author: Muhammet Alperen Şıvgın
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:13:38 GMT
════════════════════════
⌗ Tags: #hackviser #red_team #hacking #ctf #cybersecurity
════════════════════════
𐀪 Author: Muhammet Alperen Şıvgın
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:13:38 GMT
════════════════════════
⌗ Tags: #hackviser #red_team #hacking #ctf #cybersecurity
Medium
Hackviser Write-up [EN / TR] — Reflected XSS via HTML Attribute Manipulation
Hello everyone. Today, I will be sharing with you the solution to the “Reflected XSS via HTML Attribute Manipulation” laboratory on the…
⤷ Title: What is a Rambo Attack in Cybersecurity?
════════════════════════
𐀪 Author: Amanuzzaman M
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 20:09:11 GMT
════════════════════════
⌗ Tags: #amansecureswp #rambo_attack #cybersecurity #infosec #amanuzzamanm
════════════════════════
𐀪 Author: Amanuzzaman M
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 20:09:11 GMT
════════════════════════
⌗ Tags: #amansecureswp #rambo_attack #cybersecurity #infosec #amanuzzamanm
Medium
What is a Rambo Attack in Cybersecurity?
Cybersecurity threats are not always carried out by large hacker groups. Sometimes, a single individual can launch an attack independently…
⤷ Title: I Tried Shannon AI: And Discovered Noobs Can Now Do Penetration Testing
════════════════════════
𐀪 Author: Joe Njenga
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 20:59:41 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #ai_cybersecurity #cybersecurity #ai_cyber_security #penetration_testing
════════════════════════
𐀪 Author: Joe Njenga
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 20:59:41 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #ai_cybersecurity #cybersecurity #ai_cyber_security #penetration_testing
Medium
I Tried Shannon AI: And Discovered Noobs Can Now Do Penetration Testing
So, you are disappointed you never became an ethical hacker, cybersecurity engineer, or penetration tester back then, when it meant…
⤷ Title: SQL Injection (SQLi)
════════════════════════
𐀪 Author: Ahmed Essam
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:05:07 GMT
════════════════════════
⌗ Tags: #web_security #ethical_hacking #sql_injection #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Ahmed Essam
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:05:07 GMT
════════════════════════
⌗ Tags: #web_security #ethical_hacking #sql_injection #cybersecurity #penetration_testing
Medium
SQL Injection (SQLi)
What is SQL Injection (SQLi)?
⤷ Title: Think Like a Hacker Using Claude
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 21:49:05 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #penetration_testing #claude #vibe_hacking #hacking
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 21:49:05 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #penetration_testing #claude #vibe_hacking #hacking
Medium
Think Like a Hacker Using Claude
A Low-Cost Framework for Studying Hacker Mentality and AI-Assisted Reasoning
⤷ Title: Chronus Mafia: cuando los nombres cambian pero el ecosistema permanece
════════════════════════
𐀪 Author: Hacking en México
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 21:39:36 GMT
════════════════════════
⌗ Tags: #hacking
════════════════════════
𐀪 Author: Hacking en México
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 21:39:36 GMT
════════════════════════
⌗ Tags: #hacking
Medium
Chronus Mafia: cuando los nombres cambian pero el ecosistema permanece
Durante años, en el mundo del hacking latinoamericano, hemos cometido el error de buscar estructuras rígidas donde nunca las hubo. Queremos…
⤷ Title: Reflective DLL Injection
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 21:36:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #cybercrime #malware #hacking #pentesting
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 21:36:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #cybercrime #malware #hacking #pentesting
Medium
Reflective DLL Injection
Welcome to this new Medium post, today a classic but always useful technique, the Reflective DLL Injection.
⤷ Title: Chronus, los leaks y la normalización del colapso digital en Latinoamérica
════════════════════════
𐀪 Author: Hacking en México
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 21:33:39 GMT
════════════════════════
⌗ Tags: #hacking
════════════════════════
𐀪 Author: Hacking en México
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 21:33:39 GMT
════════════════════════
⌗ Tags: #hacking
Medium
Chronus, los leaks y la normalización del colapso digital en Latinoamérica
Escribo esto no como espectador, sino como alguien que lleva años observando — y enfrentando — el deterioro de la seguridad digital en…
⤷ Title: HTB Broker Writeup
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:30:36 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ethical_hacking #hackthebox #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:30:36 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ethical_hacking #hackthebox #cybersecurity #penetration_testing
Medium
HTB Broker Writeup
Begin by adding the machine IP to /etc/hosts.