⤷ Title: Root-Me: SQL Injection — Authentication
════════════════════════
𐀪 Author: _marwankhodair_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:32 GMT
════════════════════════
⌗ Tags: #mssql #sql_server #sql_injection #sql #mysql
════════════════════════
𐀪 Author: _marwankhodair_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:32 GMT
════════════════════════
⌗ Tags: #mssql #sql_server #sql_injection #sql #mysql
Medium
Root-Me: SQL Injection — Authentication
Challenge Writeup by 0xMarvul
⤷ Title: Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Dork for AI LLM Chatbot
════════════════════════
𐀪 Author: rr-1k
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:26:55 GMT
════════════════════════
⌗ Tags: #llm #chatgpt #hacking #ai #bug_bounty
════════════════════════
𐀪 Author: rr-1k
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:26:55 GMT
════════════════════════
⌗ Tags: #llm #chatgpt #hacking #ai #bug_bounty
Medium
Dork for AI LLM Chatbot
Dork For AI Chatsbots ( Chagpt, gemini, grok, cluade and more )
⤷ Title: “Burp + Extensions = JS Recon on Steroids: From Endpoints to Exploits”
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:02:44 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ai #infosec #bug_bounty
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:02:44 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ai #infosec #bug_bounty
Medium
🧠 “Burp + Extensions = JS Recon on Steroids: From Endpoints to Exploits”
⚙️ Burp Extension Power Stack
⤷ Title: The Shodan & FOFA Hack No One Wants You to Know About
════════════════════════
𐀪 Author: KonaN
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:01:45 GMT
════════════════════════
⌗ Tags: #bug_hunting #bug_bounty #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: KonaN
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:01:45 GMT
════════════════════════
⌗ Tags: #bug_hunting #bug_bounty #hacking #cybersecurity #penetration_testing
Medium
The Shodan & FOFA Hack No One Wants You to Know About 👀
What if you could bypass API limits, export entire datasets, and never pay a cent? Here’s how I did it — and how you can too.
⤷ Title: Threat Modeling for Developers
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:40:31 GMT
════════════════════════
⌗ Tags: #application_security #devsecops #threat_modeling #secure_development #software_security
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:40:31 GMT
════════════════════════
⌗ Tags: #application_security #devsecops #threat_modeling #secure_development #software_security
Medium
Threat Modeling for Developers
In the fast-paced world of software development, the focus often gravitates towards features, performance, and user experience. While these…
⤷ Title: Sandboxing: A Safe Space for Dangerous Code
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:39:16 GMT
════════════════════════
⌗ Tags: #threat_mitigation #isolation #andboxing #application_security #code_security
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:39:16 GMT
════════════════════════
⌗ Tags: #threat_mitigation #isolation #andboxing #application_security #code_security
Medium
Sandboxing: A Safe Space for Dangerous Code
In our increasingly interconnected digital world, the need to interact with untrusted or potentially malicious code is not just a…
⤷ Title: HTB Challenge — CriticalOps
════════════════════════
𐀪 Author: MEGAZORD
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:47 GMT
════════════════════════
⌗ Tags: #challenge #htb_writeup #hacking #htb_walkthrough #web
════════════════════════
𐀪 Author: MEGAZORD
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:47 GMT
════════════════════════
⌗ Tags: #challenge #htb_writeup #hacking #htb_walkthrough #web
Medium
HTB Challenge — CriticalOps
Hello, hacker! This is the first writeup of a series of HTB challenges that I will try to maintain. And to start, we will have the…
⤷ Title: How Misconfigured Computer Accounts Lead to Hidden Privilege Escalation in Active Directory
════════════════════════
𐀪 Author: Sebastian Kandler
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:11:47 GMT
════════════════════════
⌗ Tags: #security #hacking #technology #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Sebastian Kandler
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:11:47 GMT
════════════════════════
⌗ Tags: #security #hacking #technology #penetration_testing #cybersecurity
Medium
How Misconfigured Computer Accounts Lead to Hidden Privilege Escalation in Active Directory
🛑 Did you know? Creating computer accounts in Active Directory Users and Computers (ADUC) and assigning a group like “Domain Users” sounds…
⤷ Title: Expert Lecture II
════════════════════════
𐀪 Author: unknownman
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:52:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #security_operation_center #hacking #penetration_testing #inkor
════════════════════════
𐀪 Author: unknownman
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:52:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #security_operation_center #hacking #penetration_testing #inkor
Medium
Expert Lecture II
Expert Lecture by Mr. M. Iman Karmawijaya, CTO Representative of LSware in Indonesia
⤷ Title: Top 10 WiFi Hacking Tools Used by Ethical Hackers: Introduction
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:44:28 GMT
════════════════════════
⌗ Tags: #wifihacking #ethical_hacker #wifi_hacking_tools #hacking #hackerslist
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:44:28 GMT
════════════════════════
⌗ Tags: #wifihacking #ethical_hacker #wifi_hacking_tools #hacking #hackerslist
Medium
Top 10 WiFi Hacking Tools Used by Ethical Hackers: Introduction
In this article, we’ll dive into the Top 10 WiFi Hacking Tools Used by Ethical Hackers, explore why they matter, understand how they work…
⤷ Title: The Digital Dojo: Mastering Offensive Security with AI-Powered Python Cyber Ranges
════════════════════════
𐀪 Author: SR
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:33:24 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #cybersecurity #security #hacking #python
════════════════════════
𐀪 Author: SR
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:33:24 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #cybersecurity #security #hacking #python
Medium
The Digital Dojo: Mastering Offensive Security with AI-Powered Python Cyber Ranges
In cybersecurity’s endless arms race, defenders must achieve perfection while attackers need only find a single weakness. This fundamental…
⤷ Title: DLL Injection: It’s Not as Scary as It Sounds
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:06:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #reverse_engineering #hacking #dll_injection #software_development
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:06:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #reverse_engineering #hacking #dll_injection #software_development
Medium
DLL Injection: It’s Not as Scary as It Sounds
“DLL? More like D-E-HELL!” …until now.
⤷ Title: Attacking Windows Credential Manager — HTB Module Walkthrough
════════════════════════
𐀪 Author: Redsnorlax
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:05:28 GMT
════════════════════════
⌗ Tags: #hacking #windows #windowscredentialmanager #uac #hackthebox
════════════════════════
𐀪 Author: Redsnorlax
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:05:28 GMT
════════════════════════
⌗ Tags: #hacking #windows #windowscredentialmanager #uac #hackthebox
Medium
Attacking Windows Credential Manager — HTB Module Walkthrough
Step-by-Step Walkthrough: Attacking Windows Credential Manager (HTB Module)
⤷ Title: Storm-2603 Strikes: DNS-Controlled Backdoor Found in Global Ransomware Attacks
════════════════════════
𐀪 Author: CYber VIaz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:55:38 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #cybersecurity #microsoft_security #infosec
════════════════════════
𐀪 Author: CYber VIaz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:55:38 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #cybersecurity #microsoft_security #infosec
Medium
💣 Storm-2603 Strikes: DNS-Controlled Backdoor Found in Global Ransomware Attacks
🚨 Cybersecurity Alert: A shadowy group named Storm‑2603 is wreaking havoc with stealthy backdoors, rogue web shells, and ransomware that…
⤷ Title: ChatGPT Leaks?
════════════════════════
𐀪 Author: Pascal Asch
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:46:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_leak #chatgpt
════════════════════════
𐀪 Author: Pascal Asch
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:46:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_leak #chatgpt
Medium
ChatGPT Leaks? How public share links turn into OSINT Goldmines — A real-world OSINT Tool for hunting leaked data.
1. Introduction
⤷ Title: DREAD Risk Assessment Model
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:38 GMT
════════════════════════
⌗ Tags: #dread_model #security_vulnerabilities #risk_assessment #threat_modeling #cybersecurity
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:38 GMT
════════════════════════
⌗ Tags: #dread_model #security_vulnerabilities #risk_assessment #threat_modeling #cybersecurity
Medium
DREAD Risk Assessment Model
The dynamic and ever-expanding landscape of cybersecurity demands robust frameworks for identifying, evaluating, and prioritizing risks…
⤷ Title: STRIDE Threat Modeling Methodology
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:41:49 GMT
════════════════════════
⌗ Tags: #threat_modeling #stride #risk_management #security_methodology #cybersecurity
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:41:49 GMT
════════════════════════
⌗ Tags: #threat_modeling #stride #risk_management #security_methodology #cybersecurity
Medium
STRIDE Threat Modeling Methodology
In the intricate landscape of modern software development, security can no longer be an afterthought, a patch applied late in the…
⤷ Title: Reverse Engineering for Malware Analysis
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:38:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #reverse_engineering #malware_analysis #binary_analysis
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:38:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #reverse_engineering #malware_analysis #binary_analysis
Medium
Reverse Engineering for Malware Analysis
The digital realm is a constant battlefield, where sophisticated cyber threats relentlessly evolve, posing significant dangers to…
⤷ Title: Why a Cybersecurity Compliance Audit Is Essential for Every Organization in China in 2025
════════════════════════
𐀪 Author: Alex Graham
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:31:48 GMT
════════════════════════
⌗ Tags: #cybersecurity #regulatory_compliance #cyber_security_awareness
════════════════════════
𐀪 Author: Alex Graham
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:31:48 GMT
════════════════════════
⌗ Tags: #cybersecurity #regulatory_compliance #cyber_security_awareness
Medium
Why a Cybersecurity Compliance Audit Is Essential for Every Organization in China in 2025
China’s digital economy is growing at record speed, and with it comes increasing pressure on businesses to protect sensitive data and…
⤷ Title: DIY Faraday Fashion: How I Sewed a Hoodie That Ghosts Wi-Fi Trackers
════════════════════════
𐀪 Author: Franziska "Ziska" Fink
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:02:54 GMT
════════════════════════
⌗ Tags: #privacy #hacker_culture #wearables #cybersecurity #diy
════════════════════════
𐀪 Author: Franziska "Ziska" Fink
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:02:54 GMT
════════════════════════
⌗ Tags: #privacy #hacker_culture #wearables #cybersecurity #diy
Medium
DIY Faraday Fashion: How I Sewed a Hoodie That Ghosts Wi-Fi Trackers
by Ziska Fink, resident code-witch at Rabenherz Productions