⤷ Title: Cheese CTF (THM) Tryhackme WriteUp Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:38:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ctf #ctf_writeup #tryhackme
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:38:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ctf #ctf_writeup #tryhackme
Medium
Cheese CTF (THM) Tryhackme WriteUp Answer
Denoscription : Inspired by the great cheese talk of THM!
⤷ Title: Hutch (Proving Grounds) Walkthrough: An Active Directory Attack Path
════════════════════════
𐀪 Author: SilentExploit
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:22:24 GMT
════════════════════════
⌗ Tags: #oscp #pentesting #hacking #cybersecurity
════════════════════════
𐀪 Author: SilentExploit
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:22:24 GMT
════════════════════════
⌗ Tags: #oscp #pentesting #hacking #cybersecurity
Medium
Hutch (Proving Grounds) Walkthrough: An Active Directory Attack Path
A deep dive into LDAP enumeration, GPO exploration, and LAPS exploitation for OSCP aspirants.
⤷ Title: Getting Started with the Stardust Shellcode Generator Template
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:24:26 GMT
════════════════════════
⌗ Tags: #hacking #hackthebox #penetration_testing #tryhackme #malware
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:24:26 GMT
════════════════════════
⌗ Tags: #hacking #hackthebox #penetration_testing #tryhackme #malware
Medium
Getting Started with the Stardust Shellcode Generator Template
Welcome to this new Medium post. In this article, I will introduce an amazing tool that allows you to generate shellcode directly from C++…
⤷ Title: Slack Bug Bounty — $1,750 Easy Bug
════════════════════════
𐀪 Author: Sirat Sami (analyz3r)
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:10:45 GMT
════════════════════════
⌗ Tags: #hackerone #infosec #bugbounty_writeup
════════════════════════
𐀪 Author: Sirat Sami (analyz3r)
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:10:45 GMT
════════════════════════
⌗ Tags: #hackerone #infosec #bugbounty_writeup
Medium
Slack Bug Bounty — $1,750 Easy Bug
Hi Everyone.
My name is Sirat, I’m 25 years old, from Kurdistan. I do bug bounty hunting on the HackerOne platform, and today I want to…
My name is Sirat, I’m 25 years old, from Kurdistan. I do bug bounty hunting on the HackerOne platform, and today I want to…
⤷ Title: Clocky | TryHackMe | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:48:49 GMT
════════════════════════
⌗ Tags: #tryhackme #mysql #linux #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:48:49 GMT
════════════════════════
⌗ Tags: #tryhackme #mysql #linux #tryhackme_walkthrough #tryhackme_writeup
Medium
Clocky | TryHackMe | Walkthrough
Flag 1
⤷ Title: Day 17 : SOC L1 Alert Triage THM
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:43:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #security_operation_center #tryhackme_writeup
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:43:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #security_operation_center #tryhackme_writeup
Medium
Day 17 : SOC L1 Alert Triage THM
Today I’m diving into something new! As I already finished the Jr. Pentester on TryHackMe, I actually asked myself why not diving into a…
⤷ Title: Exploitation of Grotesque 3
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #vulnhub_walkthrough #vulnhub
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #vulnhub_walkthrough #vulnhub
Medium
Exploitation of Grotesque 3
I started with host discovery using nmap and I I found the ip address at 192.168.1.106
⤷ Title: Exploitation of Hacksudo 1
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:22 GMT
════════════════════════
⌗ Tags: #walthrough #vulnhub_walkthrough #vulnhub
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:22 GMT
════════════════════════
⌗ Tags: #walthrough #vulnhub_walkthrough #vulnhub
Medium
Exploitation of Hacksudo 1
I started with host discovery using nmap and I I found the ip address at 192.168.1.200
⤷ Title: Eyes on the Front: Iranian Threat Actors Weaponize IP Cameras in Middle East Conflict
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:29:52 +0000
════════════════════════
⌗ Tags: #Cyber Security #Vulnerability Report #Battle Damage Assessment #Check Point Research #Cyber Reconnaissance #cybersecurity #Dahua Security #Hikvision Vulnerabilities #IP cameras #Iranian Cyber Threat #Kinetic Warfare #Middle East Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:29:52 +0000
════════════════════════
⌗ Tags: #Cyber Security #Vulnerability Report #Battle Damage Assessment #Check Point Research #Cyber Reconnaissance #cybersecurity #Dahua Security #Hikvision Vulnerabilities #IP cameras #Iranian Cyber Threat #Kinetic Warfare #Middle East Security
Daily CyberSecurity
Eyes on the Front: Iranian Threat Actors Weaponize IP Cameras in Middle East Conflict
A new Check Point Research report reveals how Iranian-nexus threat actors compromise IP cameras in the Middle East for real-time missile reconnaissance.
⤷ Title: Stream Hijacked: Critical Zero-Click Command Injection Flaw Exposed in AVideo-Encoder
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:22:50 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AVideo_Encoder #Command Injection #CVE_2026_29058 #cybersecurity #infosec #Open Source Security #Patch Alert #unauthenticated RCE #Vulnerability #YouPHPTube
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:22:50 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AVideo_Encoder #Command Injection #CVE_2026_29058 #cybersecurity #infosec #Open Source Security #Patch Alert #unauthenticated RCE #Vulnerability #YouPHPTube
Daily CyberSecurity
Stream Hijacked: Critical Zero-Click Command Injection Flaw Exposed in AVideo-Encoder
A critical 9.8 CVSS flaw (CVE-2026-29058) in AVideo-Encoder allows unauthenticated remote attackers to execute arbitrary system commands. Patch now.
⤷ Title: Cracking the Cloud’s Crypto: Unauthenticated Bypass Flaws Found in Amazon’s AWS-LC Library
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:18:10 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Amazon Web Services #AWS_LC #Cloud Security #cryptography #CVE_2026_3336 #CVE_2026_3337 #CVE_2026_3338 #infosec #Patch Alert #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:18:10 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Amazon Web Services #AWS_LC #Cloud Security #cryptography #CVE_2026_3336 #CVE_2026_3337 #CVE_2026_3338 #infosec #Patch Alert #Vulnerability
Daily CyberSecurity
Cracking the Cloud's Crypto: Unauthenticated Bypass Flaws Found in Amazon's AWS-LC Library
Researchers discovered three major flaws in Amazon’s AWS-LC cryptographic library, allowing hackers to bypass digital signature validation. Update now.
⤷ Title: Signed Malware Masquerading as Workplace Apps Deploys Persistent Backdoors
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:13:17 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cybersecurity #EV Certificate Phishing #infosec #malware #MeshAgent #Microsoft Defender #RMM Backdoors #ScreenConnect #Tactical RMM #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:13:17 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cybersecurity #EV Certificate Phishing #infosec #malware #MeshAgent #Microsoft Defender #RMM Backdoors #ScreenConnect #Tactical RMM #threat intelligence
Daily CyberSecurity
Signed Malware Masquerading as Workplace Apps Deploys Persistent Backdoors
Microsoft Defender exposes a new phishing campaign using EV certificates and fake Teams invites to silently deploy RMM backdoors on corporate networks.
⤷ Title: Unmasking OCRFix: The New Russian Botnet Hiding its C2 Infrastructure in the Blockchain
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:07:58 +0000
════════════════════════
⌗ Tags: #Malware #Blockchain security #ClickFix #cybersecurity #EtherHiding #infosec #OCRFix Botnet #Russian Malware #smart contracts #threat intelligence #VBScript Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:07:58 +0000
════════════════════════
⌗ Tags: #Malware #Blockchain security #ClickFix #cybersecurity #EtherHiding #infosec #OCRFix Botnet #Russian Malware #smart contracts #threat intelligence #VBScript Malware
Daily CyberSecurity
Unmasking OCRFix: The New Russian Botnet Hiding its C2 Infrastructure in the Blockchain
Cybersecurity researchers uncover OCRFix, a Russian-linked botnet using EtherHiding and fake CAPTCHAs to mask its C2 servers in blockchain smart contracts.
⤷ Title: Malicious PHP Packages Found Hidden in Laravel Ecosystem
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:20 +0000
════════════════════════
⌗ Tags: #Malware #cybersecurity #infosec #lara_helper #Laravel Security #Packagist #PHP Development #rat #Remote Access Trojan #Socket Threat Research #supply chain attack
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:20 +0000
════════════════════════
⌗ Tags: #Malware #cybersecurity #infosec #lara_helper #Laravel Security #Packagist #PHP Development #rat #Remote Access Trojan #Socket Threat Research #supply chain attack
Daily CyberSecurity
Malicious PHP Packages Found Hidden in Laravel Ecosystem
Socket researchers uncover a Packagist supply chain attack where fake Laravel utility packages secretly install a persistent Remote Access Trojan (RAT).
⤷ Title: Guía de XSS Fundamentals: Vulnerabilidades, Payloads y Bypass de WAF/CSP
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #xss_attack #hacking #technology
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #xss_attack #hacking #technology
Medium
Guía de XSS Fundamentals: Vulnerabilidades, Payloads y Bypass de WAF/CSP
Domina el Cross-site noscripting: estrategias de inyección, vectores de ataque, evasión de WAF y técnicas avanzadas de bypass CSP.
⤷ Title: SSO Misconfiguration Leading to Privilege Escalation Lead to Full Organization Takeover + SSO Email…
════════════════════════
𐀪 Author: ali alhassoun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:41:29 GMT
════════════════════════
⌗ Tags: #sso #privilege_escalation #bug_bounty #cybersecurity #account_takeover
════════════════════════
𐀪 Author: ali alhassoun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:41:29 GMT
════════════════════════
⌗ Tags: #sso #privilege_escalation #bug_bounty #cybersecurity #account_takeover
Medium
SSO Misconfiguration Leading to Privilege Escalation Lead to Full Organization Takeover + SSO Email…
⤷ Title: Malware Development with NIM — InfoStealers 101
════════════════════════
𐀪 Author: Edgar Huemac Sanchez Hernandez
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:49:46 GMT
════════════════════════
⌗ Tags: #coding #hacking #cybersecurity #malware #software_development
════════════════════════
𐀪 Author: Edgar Huemac Sanchez Hernandez
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:49:46 GMT
════════════════════════
⌗ Tags: #coding #hacking #cybersecurity #malware #software_development
Medium
Malware Development with NIM — InfoStealers 101
Hi there! Nice to see you again. Let’s get to it; we’ve been dancing around fun maldev things & concepts for a few blogs now, mostly theory…
⤷ Title: Wenn gute Hacker ins Gefängnis kommen: Die paradoxe Realität der Cybersecurity in Berlin
════════════════════════
𐀪 Author: Fatihbadem
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:11:49 GMT
════════════════════════
⌗ Tags: #hacking #pentesting
════════════════════════
𐀪 Author: Fatihbadem
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:11:49 GMT
════════════════════════
⌗ Tags: #hacking #pentesting
Medium
Wenn gute Hacker ins Gefängnis kommen: Die paradoxe Realität der Cybersecurity in Berlin
Berlin ist eine Stadt der Hacker. Nicht nur im kriminellen Sinne — sondern auch im positiven. Seit Jahrzehnten gilt die Hauptstadt als…
⤷ Title: Burp Suite : The Beginners Guide
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:49:36 GMT
════════════════════════
⌗ Tags: #linux #linux_tutorial #burpsuite #ethical_hacking
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:49:36 GMT
════════════════════════
⌗ Tags: #linux #linux_tutorial #burpsuite #ethical_hacking
Medium
Burp Suite : The Beginners Guide
What is Burp Suite?
⤷ Title: What is Metasploit | The Beginner’s Guide
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:34:32 GMT
════════════════════════
⌗ Tags: #kali_linux #linux #ethical_hacking #metasploit
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:34:32 GMT
════════════════════════
⌗ Tags: #kali_linux #linux #ethical_hacking #metasploit
Medium
What is Metasploit | The Beginner’s Guide
Introduction :
⤷ Title: Server Side Template Injection (SSTI ) Got Exploited
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:46:00 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #ssti_vulnerability #ethical_hacking #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:46:00 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #ssti_vulnerability #ethical_hacking #cybersecurity #bug_bounty
Medium
Server Side Template Injection (SSTI ) Got Exploited
What is Server Side Template Injection?