⤷ Title: PNPT External Penetration Testing Cheat Sheet
════════════════════════
𐀪 Author: jaejun835
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:21:58 GMT
════════════════════════
⌗ Tags: #external_penetration #pnpt #cheatsheet #cybersecurity #hacking
════════════════════════
𐀪 Author: jaejun835
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:21:58 GMT
════════════════════════
⌗ Tags: #external_penetration #pnpt #cheatsheet #cybersecurity #hacking
Medium
PNPT External Penetration Testing Cheat Sheet
This is a cheat sheet for external penetration testing techniques used in TCM Security's PNPT (Practical Network Penetration Tester)…
⤷ Title: Linux: The Operating System That Powers the Cyber World
════════════════════════
𐀪 Author: Shubham Khirwadkar
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:01:07 GMT
════════════════════════
⌗ Tags: #linux #cybersecurity #infosec #security #operating_systems
════════════════════════
𐀪 Author: Shubham Khirwadkar
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:01:07 GMT
════════════════════════
⌗ Tags: #linux #cybersecurity #infosec #security #operating_systems
Medium
Linux: The Operating System That Powers the Cyber World
A beginner’s guide to understanding Linux — what it is, where it came from, and why every cybersecurity professional swears by it.
⤷ Title: Vulnversity — TryHackMe Writeup
════════════════════════
𐀪 Author: JEHAD F OMARI
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:57:16 GMT
════════════════════════
⌗ Tags: #learning_lab #cybersecurity_training #penetration_testing
════════════════════════
𐀪 Author: JEHAD F OMARI
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:57:16 GMT
════════════════════════
⌗ Tags: #learning_lab #cybersecurity_training #penetration_testing
Medium
Vulnversity — TryHackMe Writeup
Lab Information
⤷ Title: Proving Grounds — Practice — Robust
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:48:26 GMT
════════════════════════
⌗ Tags: #ethical_hacking #oscp #ctf #penetration_testing
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:48:26 GMT
════════════════════════
⌗ Tags: #ethical_hacking #oscp #ctf #penetration_testing
Medium
Proving Grounds — Practice — Robust
Robust is a machine rated easy by Offsec, but rated hard by the community.
⤷ Title: TryHackMe Walkthrough: AD Basic Enumeration — Discovering Users, SMB Shares, and Domain Information
════════════════════════
𐀪 Author: Ibnu Hibban
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:41:39 GMT
════════════════════════
⌗ Tags: #active_directory #penetration_testing #cybersecurity #ethical_hacking #tryhackme
════════════════════════
𐀪 Author: Ibnu Hibban
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:41:39 GMT
════════════════════════
⌗ Tags: #active_directory #penetration_testing #cybersecurity #ethical_hacking #tryhackme
Medium
TryHackMe Walkthrough: AD Basic Enumeration — Discovering Users, SMB Shares, and Domain Information
A practical walkthrough of basic Active Directory enumeration techniques in a lab environment.
⤷ Title: How a Public Feature Flag Misconfiguration Led to a Premium Paywall Bypass
════════════════════════
𐀪 Author: Revokatus Ivo
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:34:22 GMT
════════════════════════
⌗ Tags: #web_development #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Revokatus Ivo
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:34:22 GMT
════════════════════════
⌗ Tags: #web_development #penetration_testing #cybersecurity
Medium
How a Public Feature Flag Misconfiguration Led to a Premium Paywall Bypass
Recently, I have been looking for an internship and feeling exhausted after not receiving any calls for interviews. To make productive use…
⤷ Title: Starting My Cybersecurity Journey: Building the Foundation with Networking
════════════════════════
𐀪 Author: Mubashirakisham
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:13:10 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #network_security #soc #cybersecurity
════════════════════════
𐀪 Author: Mubashirakisham
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:13:10 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #network_security #soc #cybersecurity
Medium
Starting My Cybersecurity Journey: Building the Foundation with Networking
Cybersecurity has always fascinated me. The idea that technology can be used to protect people, investigate crimes, and secure systems is…
⤷ Title: From Curious Student to Ethical Hacker: My First Steps Into Cybersecurity
════════════════════════
𐀪 Author: Uvish
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 04:08:42 GMT
════════════════════════
⌗ Tags: #ethical_hacking #students #cybersecurity
════════════════════════
𐀪 Author: Uvish
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 04:08:42 GMT
════════════════════════
⌗ Tags: #ethical_hacking #students #cybersecurity
Medium
From Curious Student to Ethical Hacker: My First Steps Into Cybersecurity
When I first heard the term ethical hacker, I thought that only movie heroes or genius programmers could achieve that. However, as I began…
⤷ Title: HTB: Dog
════════════════════════
𐀪 Author: bluesnow
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 04:31:02 GMT
════════════════════════
⌗ Tags: #sudo #gitdumper #git #rce #backdropcms
════════════════════════
𐀪 Author: bluesnow
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 04:31:02 GMT
════════════════════════
⌗ Tags: #sudo #gitdumper #git #rce #backdropcms
Medium
HTB: Dog
| Git | GitDumper | Backdrop CMS | Password Reuse | RCE | SUDO | Bee |
⤷ Title: The Google Drive Shadow: Unmasking Silver Dragon’s “GearDoor” Backdoor and the Silent Return of APT41
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 07:02:30 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #AppDomain hijacking #APT41 #BamboLoader #Cobalt Strike #DLL Sideloading #DNS tunneling #GearDoor #Google Drive C2 #MonikerLoader #Silver Dragon #Tech News 2026 #threat intelligence
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 07:02:30 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #AppDomain hijacking #APT41 #BamboLoader #Cobalt Strike #DLL Sideloading #DNS tunneling #GearDoor #Google Drive C2 #MonikerLoader #Silver Dragon #Tech News 2026 #threat intelligence
⤷ Title: The Evoxt Labyrinth: Unmasking the New Subterranean Infrastructure of China’s PlugX Syndicates
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:55:16 +0000
════════════════════════
⌗ Tags: #Malware #C2 Infrastructure #Cyberespionage #DLL Sideloading #Evoxt Enterprise #Mustang Panda #PlugX #RedDelta #SOGU.SEC #STATICPLUGIN #Tech News 2026 #threat intelligence #UNC6384
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:55:16 +0000
════════════════════════
⌗ Tags: #Malware #C2 Infrastructure #Cyberespionage #DLL Sideloading #Evoxt Enterprise #Mustang Panda #PlugX #RedDelta #SOGU.SEC #STATICPLUGIN #Tech News 2026 #threat intelligence #UNC6384
⤷ Title: Bug Bounty and Ethical Hacking Career Paths: A Complete Guide
════════════════════════
𐀪 Author: EINITIAL24
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:39:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking_training #cybersecurity #bug_bounty #ethical_hacking_career #ethical_hacking
════════════════════════
𐀪 Author: EINITIAL24
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:39:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking_training #cybersecurity #bug_bounty #ethical_hacking_career #ethical_hacking
Medium
Bug Bounty and Ethical Hacking Career Paths: A Complete Guide
The digital world is expanding at an unprecedented rate. Every year, millions of new websites, apps, cloud systems, and online services are…
⤷ Title: User Enumeration via WordPress REST API: A Security Testing Walkthrough
════════════════════════
𐀪 Author: gasmask
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 05:45:37 GMT
════════════════════════
⌗ Tags: #web_application_security #bug_bounty #wordpress #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: gasmask
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 05:45:37 GMT
════════════════════════
⌗ Tags: #web_application_security #bug_bounty #wordpress #cybersecurity #penetration_testing
Medium
User Enumeration via WordPress REST API: A Security Testing Walkthrough
During a web application penetration test, identifying valid usernames is often the first step toward deeper attacks such as password…
⤷ Title: If you want to become serious about bug bounty hunting or penetration testing, one thing becomes…
════════════════════════
𐀪 Author: jagadeesh kommoju
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 05:01:02 GMT
════════════════════════
⌗ Tags: #web_security #bug_bounty #ethical_hacking #pentesting #cybersecurity
════════════════════════
𐀪 Author: jagadeesh kommoju
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 05:01:02 GMT
════════════════════════
⌗ Tags: #web_security #bug_bounty #ethical_hacking #pentesting #cybersecurity
Medium
If you want to become serious about bug bounty hunting or penetration testing, one thing becomes…
You need a safe environment to practice real attacks.
⤷ Title: Malware Development — 5 (Go lsass dumper)
════════════════════════
𐀪 Author: 0r
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:23:40 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #coding #golang #malware
════════════════════════
𐀪 Author: 0r
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:23:40 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #coding #golang #malware
Medium
Malware Development — 5 (Go lsass dumper)
This article is written for educational and defensive security research purposes only. Understanding how malicious techniques work is…
⤷ Title: डिजिटल चक्रव्यूह: क्या आपका स्मार्टफोन अब आपकी आज़ादी का सबसे बड़ा दुश्मन है?
════════════════════════
𐀪 Author: Dr. B. S. Chauhan
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 05:53:39 GMT
════════════════════════
⌗ Tags: #cyber_conflict_2026 #hacking #cibersecurity #operations #digital_psychological
════════════════════════
𐀪 Author: Dr. B. S. Chauhan
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 05:53:39 GMT
════════════════════════
⌗ Tags: #cyber_conflict_2026 #hacking #cibersecurity #operations #digital_psychological
Medium
डिजिटल चक्रव्यूह: क्या आपका स्मार्टफोन अब आपकी आज़ादी का सबसे बड़ा दुश्मन है?
कल्पना कीजिए, आप सुबह की प्रार्थना के लिए अपना पसंदीदा मोबाइल ऐप खोलते हैं, और अचानक आपकी स्क्रीन पर एक संदेश चमकता है — “मदद आ चुकी है, अब…
⤷ Title: Network basics for cybersecurity — Day 3
════════════════════════
𐀪 Author: 0xSmit
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 05:56:22 GMT
════════════════════════
⌗ Tags: #information_security #web_development #cybersecurity #infosec #cyber_security_awareness
════════════════════════
𐀪 Author: 0xSmit
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 05:56:22 GMT
════════════════════════
⌗ Tags: #information_security #web_development #cybersecurity #infosec #cyber_security_awareness
Medium
Network basics for cybersecurity — Day 3
What is a MAC Address and can it be spoofed ?
⤷ Title: When the Key Lives in the Request: Breaking Client-Side AES Encryption in a Real Web Application
════════════════════════
𐀪 Author: urhnrblpntstr
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 07:01:01 GMT
════════════════════════
⌗ Tags: #encryption #burpsuite #penetration_testing #application_security #cybersecurity
════════════════════════
𐀪 Author: urhnrblpntstr
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 07:01:01 GMT
════════════════════════
⌗ Tags: #encryption #burpsuite #penetration_testing #application_security #cybersecurity
Medium
When the Key Lives in the Request: Breaking Client-Side AES Encryption in a Real Web Application
A tactical deep dive into identifying, extracting, and bypassing hardcoded cryptographic secrets.
⤷ Title: Certified Penetration Testing Course with AI in Delhi
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:59:39 GMT
════════════════════════
⌗ Tags: #certified_penetration #ai #cybersecurity #penetration_testing #ethical_hacking
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:59:39 GMT
════════════════════════
⌗ Tags: #certified_penetration #ai #cybersecurity #penetration_testing #ethical_hacking
Medium
Certified Penetration Testing Course with AI in Delhi
Introduction: Certified Penetration Testing Course with AI in Delhi
⤷ Title: THM | Linux CLI — Shells Bells
════════════════════════
𐀪 Author: Vasikaranraja
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:23:14 GMT
════════════════════════
⌗ Tags: #basics_linux #tryhackme #linuxcli
════════════════════════
𐀪 Author: Vasikaranraja
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:23:14 GMT
════════════════════════
⌗ Tags: #basics_linux #tryhackme #linuxcli
Medium
THM | Linux CLI — Shells Bells
TASK 1 : INTRODUCTION
⤷ Title: DeFi Security Vulnerabilities and Exploits: A Technical Analysis
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:13:35 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #cyber_security_awareness #cybersecurity #ai
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 06:13:35 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #cyber_security_awareness #cybersecurity #ai
Medium
DeFi Security Vulnerabilities and Exploits: A Technical Analysis
Introduction