⤷ Title: The Hidden Problem in Construction Projects: Poor Sound Performance
════════════════════════
𐀪 Author: Cocokelapa64
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 15:34:36 GMT
════════════════════════
⌗ Tags: #software_testing #ai #penetration_testing
════════════════════════
𐀪 Author: Cocokelapa64
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 15:34:36 GMT
════════════════════════
⌗ Tags: #software_testing #ai #penetration_testing
Medium
The Hidden Problem in Construction Projects: Poor Sound Performance
A building may look perfect on the outside modern architecture, premium materials, and impressive interiors. But once occupants move in…
⤷ Title: THM-Splunk: The basics walkthrough
════════════════════════
𐀪 Author: Nishasorallikar
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:58:38 GMT
════════════════════════
⌗ Tags: #splunk #splunk_room #tryhackme_walkthrough #tryhackme #premium_rooms
════════════════════════
𐀪 Author: Nishasorallikar
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:58:38 GMT
════════════════════════
⌗ Tags: #splunk #splunk_room #tryhackme_walkthrough #tryhackme #premium_rooms
Medium
THM-Splunk: The basics walkthrough
Understand how SOC analysts investigate logs using Splunk.
⤷ Title: I Simulated an SSH Brute-Force Attack on My Home Lab — Then Caught It in Splunk
════════════════════════
𐀪 Author: Kimberly Kuya
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 15:34:22 GMT
════════════════════════
⌗ Tags: #splunk #ethical_hacking #blue_team #siem #cybersecurity
════════════════════════
𐀪 Author: Kimberly Kuya
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 15:34:22 GMT
════════════════════════
⌗ Tags: #splunk #ethical_hacking #blue_team #siem #cybersecurity
Medium
I Simulated an SSH Brute-Force Attack on My Home Lab — Then Caught It in Splunk
Github link: https://github.com/kimberlykuya/ssh-bruteforce-detection
⤷ Title: Web Exploitation Writeup — Client-Side Exposure & Cookie Analysis
════════════════════════
𐀪 Author: Midhun S
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 15:26:05 GMT
════════════════════════
⌗ Tags: #information_security #web_security #ethical_hacking #capture_the_flag #cybersecurity
════════════════════════
𐀪 Author: Midhun S
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 15:26:05 GMT
════════════════════════
⌗ Tags: #information_security #web_security #ethical_hacking #capture_the_flag #cybersecurity
Medium
🌐 Web Exploitation Writeup — Client-Side Exposure & Cookie Analysis
Web challenges in CTFs often test a fundamental principle:
⤷ Title: 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 22:51:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 22:51:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: How a Simple RBAC Mistake Led to a $20K+ Admin Takeover
════════════════════════
𐀪 Author: seek-404
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:51:31 GMT
════════════════════════
⌗ Tags: #yeswehack #bug_bounty #bugbounty_writeup
════════════════════════
𐀪 Author: seek-404
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:51:31 GMT
════════════════════════
⌗ Tags: #yeswehack #bug_bounty #bugbounty_writeup
Medium
How a Simple RBAC Mistake Led to a $20K+ Admin Takeover
Hey, I’m Amrul. I work as a Security Engineer, and in my free time I do bug bounty on YesWeHack. At the end of 2025, I found multiple…
⤷ Title: I Built a Free Prompt Kit That Helps Bug Bounty Hunters Get More P1s With Any AI
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 17:07:07 GMT
════════════════════════
⌗ Tags: #bug_bounty_tool #cybersecurity #ai #bug_bounty_hunter #bug_bounty
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 17:07:07 GMT
════════════════════════
⌗ Tags: #bug_bounty_tool #cybersecurity #ai #bug_bounty_hunter #bug_bounty
Medium
I Built a Free Prompt Kit That Helps Bug Bounty Hunters Get More P1s With Any AI
The 22 prompts top hunters use to extract elite-level thinking from ChatGPT, Claude, Gemini, and DeepSeek — organized, searchable, and…
⤷ Title: Copypasta (SQLi) (Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:11:44 GMT
════════════════════════
⌗ Tags: #hacking #bugforge
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:11:44 GMT
════════════════════════
⌗ Tags: #hacking #bugforge
Medium
Copypasta (SQLi) (Bugforge)
Step 1: Register
⤷ Title: Tanuki (SSRF) (Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:01:03 GMT
════════════════════════
⌗ Tags: #hacking #ctf_walkthrough #bugforge #ctf_writeup
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:01:03 GMT
════════════════════════
⌗ Tags: #hacking #ctf_walkthrough #bugforge #ctf_writeup
Medium
Tanuki (SSRF) (Bugforge)
Step 1: Register
⤷ Title: Introduction to DOM Based Open Redirection
════════════════════════
𐀪 Author: Naveen TK
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 17:52:29 GMT
════════════════════════
⌗ Tags: #appsec #cybersecurity #web_security_testing #penetration_testing #open_redirection
════════════════════════
𐀪 Author: Naveen TK
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 17:52:29 GMT
════════════════════════
⌗ Tags: #appsec #cybersecurity #web_security_testing #penetration_testing #open_redirection
Medium
Introduction to DOM Based Open Redirection
DOM Based Open Redirection is a type of security vulnerability that occurs when an attacker-controlled source is written into a redirect…
⤷ Title: Alphabet Soup: LotL Shellcode Obfuscation
════════════════════════
𐀪 Author: Tom O'Neill
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 17:40:20 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #red_team
════════════════════════
𐀪 Author: Tom O'Neill
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 17:40:20 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #red_team
Medium
Alphabet Soup: LotL Shellcode Obfuscation
A Living Off the Land Recipe for Shellcode Obfuscation
⤷ Title: TryHackMe Linux Temelleri Bölüm 1 — Oda Çözümü
════════════════════════
𐀪 Author: Mustafa Şen
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:38:59 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #linux_tutorial #tryhackme #linux #tryhackme_walkthrough
════════════════════════
𐀪 Author: Mustafa Şen
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:38:59 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #linux_tutorial #tryhackme #linux #tryhackme_walkthrough
Medium
TryHackMe Linux Temelleri Bölüm 1 — Oda Çözümü
Bu yazımda sizlerle TryHackMe platformunda bulunan Linux Temelleri Part 1 isimli odanın çözümünü paylaşacağım.
⤷ Title: Nmap for Students: A Simple Guide to Understand Network Scanning (The Right Way)
════════════════════════
𐀪 Author: Abhinabo Roy
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:21:18 GMT
════════════════════════
⌗ Tags: #ethical_hacking #computer_science #kali_linux #cybersecurity #nmap
════════════════════════
𐀪 Author: Abhinabo Roy
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:21:18 GMT
════════════════════════
⌗ Tags: #ethical_hacking #computer_science #kali_linux #cybersecurity #nmap
Medium
Nmap for Students: A Simple Guide to Understand Network Scanning (The Right Way)
When I first heard about Nmap, I thought it was some “hacker tool” used only by professionals. But when I started learning cybersecurity as…
⤷ Title: How I Got 3 Bugs No Automation, Just Logic
════════════════════════
𐀪 Author: Mado
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:13:26 GMT
════════════════════════
⌗ Tags: #information_disclosure #infosec #bug_bounty #bug_bounty_tips #hacking
════════════════════════
𐀪 Author: Mado
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:13:26 GMT
════════════════════════
⌗ Tags: #information_disclosure #infosec #bug_bounty #bug_bounty_tips #hacking
Medium
How I Got 3 Bugs No Automation, Just Logic 🧠
No Tools, Just Thinking: 3 Bugs I Found Manually Chaining Logic Flaws: Method Tampering, URL Bypass & Hidden Data Leaks
⤷ Title: Recon in Bug Bounty: The “Stalking” Phase of Ethical Hacking
════════════════════════
𐀪 Author: loopXvedant
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:08:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #bug_bounty #hacking #reconnaissance
════════════════════════
𐀪 Author: loopXvedant
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:08:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #bug_bounty #hacking #reconnaissance
Medium
Recon in Bug Bounty: The “Stalking” Phase of Ethical Hacking 👀
Before you attack — you map. Here’s how beginners should start.
⤷ Title: Least Privilege in Oracle Fusion ERP: Role Design That Survives Audits and Operations
════════════════════════
𐀪 Author: Khadernawazk
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 19:38:10 GMT
════════════════════════
⌗ Tags: #oracle_cloud #oracle_security #oracle_erp_security #application_security
════════════════════════
𐀪 Author: Khadernawazk
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 19:38:10 GMT
════════════════════════
⌗ Tags: #oracle_cloud #oracle_security #oracle_erp_security #application_security
Medium
Least Privilege in Oracle Fusion ERP: Role Design That Survives Audits and Operations
A practitioner guide to role design, data scope, and access reviews that reduce fraud risk without breaking finance operations.
⤷ Title: PicoCTF — Log Hunt
════════════════════════
𐀪 Author: Swetha
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:40:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #infosec #ctf #osint
════════════════════════
𐀪 Author: Swetha
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:40:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #infosec #ctf #osint
Medium
PicoCTF — Log Hunt
a walkthrough on log hunt ctf
⤷ Title: Push Your Live Stream or Private Network Camera Feed to Bloodcat Map for Subscribers to Play
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 19:55:39 GMT
════════════════════════
⌗ Tags: #pentesting #hacker #hacking #s_h4ck13 #linux
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 19:55:39 GMT
════════════════════════
⌗ Tags: #pentesting #hacker #hacking #s_h4ck13 #linux
Medium
Push Your Live Stream or Private Network Camera Feed to Bloodcat Map for Subscribers to Play
There are many techniques to map private network cameras to public access.
⤷ Title: Why Your Security Stack Has 60 Muscles and No Nervous System
════════════════════════
𐀪 Author: Assaf
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:49:43 GMT
════════════════════════
⌗ Tags: #infosec #startup_lessons #cybersecurity #ai
════════════════════════
𐀪 Author: Assaf
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:49:43 GMT
════════════════════════
⌗ Tags: #infosec #startup_lessons #cybersecurity #ai
Medium
Why Your Security Stack Has 60 Muscles and No Nervous System
Every enterprise I’ve worked inside had 60+ security tools. Threat intel platforms. SIEMs. SOAR playbooks. EDR agents. Red team frameworks…
⤷ Title: KinoSec.ai Becomes the #1 Black-Box Autonomous Pentesting Platform in the World
════════════════════════
𐀪 Author: Alexis Lingad
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:51:14 GMT
════════════════════════
⌗ Tags: #penetration_testing #ai_security #black_box_testing #benchmark #autonomous_pentest
════════════════════════
𐀪 Author: Alexis Lingad
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:51:14 GMT
════════════════════════
⌗ Tags: #penetration_testing #ai_security #black_box_testing #benchmark #autonomous_pentest
Medium
KinoSec.ai Becomes the #1 Black-Box Autonomous Pentesting Platform in the World
92.3% Success Rate — Surpassing XBOW and Most Human Pentesters
⤷ Title: SSRF (Server-Side Request Forgery)
════════════════════════
𐀪 Author: Aditya Bhatt
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:29:02 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #ssrf #thm #cybersecurity
════════════════════════
𐀪 Author: Aditya Bhatt
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:29:02 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #ssrf #thm #cybersecurity
Medium
SSRF (Server-Side Request Forgery)
SSRF, Server-Side Request Forgery: Exploiting a vulnerable avatar fetching feature using directory traversal to force the server to access…