⤷ Title: HackTheBox — Sekhmet (Insane)
════════════════════════
𐀪 Author: Prakanth V
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 08:35:10 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #sekhmet #hackthebox
════════════════════════
𐀪 Author: Prakanth V
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 08:35:10 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #sekhmet #hackthebox
Medium
HackTheBox — Sekhmet (Insane)
IP: 10.10.11.124 Difficulty: Insane Operating Systems: Linux (pivot) → Windows (final target) Goal: Root the Domain Admin and extract…
⤷ Title: Why Cybersecurity Should Be a Board-Level Priority in Every Company – Perspective from Serhii Mikhalap
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:59:36 +0000
════════════════════════
⌗ Tags: #Security #Cybersecurity #Serhii Mikhalap
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:59:36 +0000
════════════════════════
⌗ Tags: #Security #Cybersecurity #Serhii Mikhalap
Hackread
Why Cybersecurity Should Be a Board-Level Priority in Every Company – Perspective from Serhii Mikhalap
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: From Prototype Pollution to DOM-based XSS: A Real-World Exploit Walkthrough
════════════════════════
𐀪 Author: Yashwanthstefen
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:51:37 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #prototype_pollution #xss_attack
════════════════════════
𐀪 Author: Yashwanthstefen
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:51:37 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #prototype_pollution #xss_attack
Medium
From Prototype Pollution to DOM-based XSS: A Real-World Exploit Walkthrough
once a legend said say less and show me the bug.
⤷ Title: Discovery of Blind SQL Injection and OS Command Injection Vulnerabilities in a University Portal
════════════════════════
𐀪 Author: Avyukt Security
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:33:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #pentesting #bug_bounty #ethical_hacking
════════════════════════
𐀪 Author: Avyukt Security
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:33:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #pentesting #bug_bounty #ethical_hacking
Medium
Discovery of Blind SQL Injection and OS Command Injection Vulnerabilities in a University Portal
By: Vedant Bhalgama
⤷ Title: Package of Problems: How a Frontend NPM Library Leaked Internal API Keys
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:24:35 GMT
════════════════════════
⌗ Tags: #money #bug_bounty #infosec #cybersecurity #hacking
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:24:35 GMT
════════════════════════
⌗ Tags: #money #bug_bounty #infosec #cybersecurity #hacking
Medium
📦 Package of Problems: How a Frontend NPM Library Leaked Internal API Keys 🎁🧪
Hey there!😁
⤷ Title: Damn Vulnerable Web Application (DVWA)
════════════════════════
𐀪 Author: Vicent Kyungai
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:40:00 GMT
════════════════════════
⌗ Tags: #web_security #penetration_testing #infosec #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Vicent Kyungai
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:40:00 GMT
════════════════════════
⌗ Tags: #web_security #penetration_testing #infosec #cybersecurity #ethical_hacking
Medium
Damn Vulnerable Web Application (DVWA)
DVWA (Damn Vulnerable Web Application) is a deliberately insecure PHP/MySQL web app designed for security training . Its purpose is to…
⤷ Title: Brr v1 Writeup — THM Industrial Intrusion CTF (Task 10)
════════════════════════
𐀪 Author: Avyukt Security
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:48:02 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #ctf_writeup #tryhackme #ctf_walkthrough
════════════════════════
𐀪 Author: Avyukt Security
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:48:02 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #ctf_writeup #tryhackme #ctf_walkthrough
Medium
Brr v1 Writeup — THM Industrial Intrusion CTF (Task 10)
Brr v1 was one of the web-based challenges in the Industrial Intrusion CTF organized by TryHackMe. It was relatively easier than other…
⤷ Title: Raffael Putra Hermawan
════════════════════════
𐀪 Author: PRIVACY !
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:39:03 GMT
════════════════════════
⌗ Tags: #cybersecurity
════════════════════════
𐀪 Author: PRIVACY !
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:39:03 GMT
════════════════════════
⌗ Tags: #cybersecurity
Medium
Raffael Putra Hermawan
Halo! Nama saya Raffael Putra Hermawan, biasa dipanggil El atau Rafa. Saya seorang pelajar berusia 15 tahun, saat ini duduk di bangku…
⤷ Title: CYBERSECURITY
IN DIGITAL EVANGELISM:
SAFEGUARDING THE GOSPEL IN THE DIGITAL AGE
════════════════════════
𐀪 Author: Mcloxyventures
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:31:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #digital_evangelization #roman_catholic_church
IN DIGITAL EVANGELISM:
SAFEGUARDING THE GOSPEL IN THE DIGITAL AGE
════════════════════════
𐀪 Author: Mcloxyventures
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:31:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #digital_evangelization #roman_catholic_church
Medium
CYBERSECURITY
IN DIGITAL EVANGELISM:
SAFEGUARDING THE GOSPEL IN THE DIGITAL AGE
IN DIGITAL EVANGELISM:
SAFEGUARDING THE GOSPEL IN THE DIGITAL AGE
INTRODUCTION
⤷ Title: Top 10 Cybersecurity Threats in 2025 & How to Prevent Them
════════════════════════
𐀪 Author: Paliwalnishtha
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:14:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberattack
════════════════════════
𐀪 Author: Paliwalnishtha
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:14:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberattack
Medium
Top 10 Cybersecurity Threats in 2025 & How to Prevent Them
Consider this: It’s just another typical Monday morning. Your group enters the system, and bam! It’s all locked. A message that reads…
⤷ Title: El Archivo Eterno: cuando tus confesiones a una IA ya no te pertenecen
════════════════════════
𐀪 Author: Oscar Martinez
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:10:17 GMT
════════════════════════
⌗ Tags: #inteligencia_artificial #prompt_engineering #artificial_intelligence #llm #cybersecurity
════════════════════════
𐀪 Author: Oscar Martinez
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:10:17 GMT
════════════════════════
⌗ Tags: #inteligencia_artificial #prompt_engineering #artificial_intelligence #llm #cybersecurity
Medium
El Archivo Eterno: cuando tus confesiones a una IA ya no te pertenecen
A veces creemos que el pasado, si lo borramos de la vista, desaparece. Como si cerrar los ojos nos salvara de todo. Como si borrar el…
⤷ Title: The Future of Cybersecurity: AI-Powered Threat Detection in 2025
════════════════════════
𐀪 Author: Win In Life Academy
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:07:22 GMT
════════════════════════
⌗ Tags: #cybersecurity
════════════════════════
𐀪 Author: Win In Life Academy
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 10:07:22 GMT
════════════════════════
⌗ Tags: #cybersecurity
Medium
The Future of Cybersecurity: AI-Powered Threat Detection in 2025
The digital environment in 2025 is more complicated than it has ever been before. Where organizations are realizing value from artificial…
⤷ Title: Diploma vs Certification in Cyber Security
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:59:25 GMT
════════════════════════
⌗ Tags: #cybersecurity #diploma_vs_certification #diploma_in_cyber_security
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:59:25 GMT
════════════════════════
⌗ Tags: #cybersecurity #diploma_vs_certification #diploma_in_cyber_security
Medium
Diploma vs Certification in Cyber Security
Introduction: Diploma vs Certification in Cyber Security
⤷ Title: TryHackMe Pre Security 101 — What is Networking?
════════════════════════
𐀪 Author: Tayyeb Nadeem Somro
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:41:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_walkthrough #tryhackme_pre_security #networking
════════════════════════
𐀪 Author: Tayyeb Nadeem Somro
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:41:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_walkthrough #tryhackme_pre_security #networking
Medium
TryHackMe Pre Security 101 — What is Networking?
In this tutorial, I’ll be covering how to complete the What is Networking? room on TryHackMe’s Pre Security 101 course.
⤷ Title: [Security Series] SQL Injection and Database Takeover Simulation Using SQLMAP
════════════════════════
𐀪 Author: Rahmat Wibowo
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:51:52 GMT
════════════════════════
⌗ Tags: #penetration_testing #sqlmap #sql_injection
════════════════════════
𐀪 Author: Rahmat Wibowo
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:51:52 GMT
════════════════════════
⌗ Tags: #penetration_testing #sqlmap #sql_injection
Medium
[Security Series] SQL Injection and Database Takeover Simulation Using SQLMAP
SQL Injection remains one of the most common and dangerous vulnerabilities affecting web applications. This attack vector allows an…
⤷ Title: TryHackMe Pre Security 101 — Defensive Security Intro
════════════════════════
𐀪 Author: Tayyeb Nadeem Somro
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:08:43 GMT
════════════════════════
⌗ Tags: #tryhackme_pre_security #cybersecurity #tryhackme_walkthrough #blue_team #tryhackme
════════════════════════
𐀪 Author: Tayyeb Nadeem Somro
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 09:08:43 GMT
════════════════════════
⌗ Tags: #tryhackme_pre_security #cybersecurity #tryhackme_walkthrough #blue_team #tryhackme
Medium
TryHackMe Pre Security 101 — Defensive Security Intro
In this tutorial, I’ll be covering how to complete the Defensive Security Intro room on TryHackMe’s Pre Security 101 course.
👍1
⤷ Title: US Government Begins $200M Payouts to Backpage Trafficking Victims
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 12:06:46 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Scams and Fraud #Backpage #Craigslist #Cybersecurity #FBI #Fraud #Human Trafficking
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 12:06:46 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Scams and Fraud #Backpage #Craigslist #Cybersecurity #FBI #Fraud #Human Trafficking
Hackread
US Government Begins $200M Payouts to Backpage Trafficking Victims
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: AS-REP Roasting Attack: Exploiting Kerberos Without Pre-Authentication
════════════════════════
𐀪 Author: Ahmed Badry
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 12:49:01 GMT
════════════════════════
⌗ Tags: #active_directory #bug_bounty #infrastructure #active_directory_security #active_directory_attack
════════════════════════
𐀪 Author: Ahmed Badry
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 12:49:01 GMT
════════════════════════
⌗ Tags: #active_directory #bug_bounty #infrastructure #active_directory_security #active_directory_attack
Medium
What is AS-REP Roasting?
Hello Geeks
⤷ Title: Reflected XSS in HTML Context with All Standard Tags Blocked Except Custom Ones
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 11:23:24 GMT
════════════════════════
⌗ Tags: #tag_filter_bypass #xss_in_html_context #reflected_xss #xss_payload #bug_bounty
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 11:23:24 GMT
════════════════════════
⌗ Tags: #tag_filter_bypass #xss_in_html_context #reflected_xss #xss_payload #bug_bounty
Medium
Reflected XSS in HTML Context with All Standard Tags Blocked Except Custom Ones
Discover how attackers bypass tag filters using custom HTML elements and event handlers to trigger XSS.
⤷ Title: (Access Control) Lab: Unprotected Admin Functionality | 2025
════════════════════════
𐀪 Author: Ananda
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 11:08:14 GMT
════════════════════════
⌗ Tags: #portswigger_lab #writeup #access_control #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Ananda
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 11:08:14 GMT
════════════════════════
⌗ Tags: #portswigger_lab #writeup #access_control #cybersecurity #bug_bounty
Medium
(Access Control) Lab: Unprotected Admin Functionality | 2025
A beginner’s walkthrough on exploiting unauthorized admin panels using common access control flaws.
⤷ Title: Exploiting URL-Based Price Manipulation on a Third-Party E-Commerce Cart
════════════════════════
𐀪 Author: Mrflash
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 11:01:02 GMT
════════════════════════
⌗ Tags: #web_security #cybersecurity #bug_bounty_writeup #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: Mrflash
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 11:01:02 GMT
════════════════════════
⌗ Tags: #web_security #cybersecurity #bug_bounty_writeup #bug_bounty #bug_bounty_tips
Medium
Exploiting URL-Based Price Manipulation on a Third-Party E-Commerce Cart
🔍 Vulnerability Summary