⤷ Title: How DNS Works and Reconnaissance Techniques
════════════════════════
𐀪 Author: mohandika
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 17:26:31 GMT
════════════════════════
⌗ Tags: #dns #reconnaissance #ethical_hacking #dns_enumeration #cybersecurity
════════════════════════
𐀪 Author: mohandika
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 17:26:31 GMT
════════════════════════
⌗ Tags: #dns #reconnaissance #ethical_hacking #dns_enumeration #cybersecurity
Medium
How DNS Works and Reconnaissance Techniques
How DNS Works, DNS Enumeration, and DNS Recon in Penetration Testing
⤷ Title: Finding Remote Code Execution in Google: A Bug Hunter’s Story
════════════════════════
𐀪 Author: zabit majeed
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 17:49:36 GMT
════════════════════════
⌗ Tags: #cve #google #bug_bounty #dependency_injection #hacking
════════════════════════
𐀪 Author: zabit majeed
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 17:49:36 GMT
════════════════════════
⌗ Tags: #cve #google #bug_bounty #dependency_injection #hacking
Medium
Finding Remote Code Execution in Google: A Bug Hunter’s Story
Hey everyone, this is Zabit Majeed . I’m an ethical hacker and a part-time bug bounty hunter, and this story is about persistence more…
⤷ Title: How a Trusted University Domain Was Abused for SEO Poisoning — Without Being “Hacked”
════════════════════════
𐀪 Author: Julien
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 19:03:43 GMT
════════════════════════
⌗ Tags: #awareness #hacking #security #cybersecurity #web_security
════════════════════════
𐀪 Author: Julien
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 19:03:43 GMT
════════════════════════
⌗ Tags: #awareness #hacking #security #cybersecurity #web_security
Medium
How a Trusted University Domain Was Abused for SEO Poisoning — Without Being “Hacked”
A real-world case study on client-side injection, legacy features, and trust exploitation.
⤷ Title: Breaking into DVWA
════════════════════════
𐀪 Author: Oluwadamilare Adeosun
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 18:36:38 GMT
════════════════════════
⌗ Tags: #writing #startup #penetration_testing #cybersecurity #technology
════════════════════════
𐀪 Author: Oluwadamilare Adeosun
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 18:36:38 GMT
════════════════════════
⌗ Tags: #writing #startup #penetration_testing #cybersecurity #technology
Medium
Breaking into DVWA
Web applications are the front door to most organizations. In this project, I wanted to see how easy it is to pick the lock.
⤷ Title: Try Hack Me- Develpy CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 18:19:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_walkthrough #tryhackme_writeup #penetration_testing
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 18:19:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_walkthrough #tryhackme_writeup #penetration_testing
Medium
Try Hack Me- Develpy CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: Web Application Penetration Report
════════════════════════
𐀪 Author: Nashra
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 18:16:11 GMT
════════════════════════
⌗ Tags: #web_development #web_application_security #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Nashra
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 18:16:11 GMT
════════════════════════
⌗ Tags: #web_development #web_application_security #cybersecurity #penetration_testing
Medium
Web Application Penetration Report 🥵
Web Application Penetration Report
⤷ Title: Back to Basics: How I took over an account with a simple ID change (IDOR)
════════════════════════
𐀪 Author: mv999exe
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 21:43:55 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #pentesting #bug_bounty_writeup
════════════════════════
𐀪 Author: mv999exe
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 21:43:55 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #pentesting #bug_bounty_writeup
Medium
Back to Basics: How I took over an account with a simple ID change (IDOR)
As bug hunters, we often dive deep into complex vulnerabilities like RCE, SSRF, or Deserialization, sometimes forgetting that the…
⤷ Title: I came, I vibe-coded, and I learned things YOU should know about
════════════════════════
𐀪 Author: BowTiesAreCool
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 20:53:49 GMT
════════════════════════
⌗ Tags: #data_privacy #vibe_coding #application_security #cybersecurity
════════════════════════
𐀪 Author: BowTiesAreCool
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 20:53:49 GMT
════════════════════════
⌗ Tags: #data_privacy #vibe_coding #application_security #cybersecurity
Medium
I came, I vibe-coded, and I learned things YOU should know about
My goal was to make a simple app to clean tracking IDs from links. I wound up in a vibe coding security deep dive.
⤷ Title: No Computer? No Problem. The Ultimate Guide to Termux Hacking
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 21:49:31 GMT
════════════════════════
⌗ Tags: #hacking_tools #coding_tips #mobile_app_development #hacking #termux
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 21:49:31 GMT
════════════════════════
⌗ Tags: #hacking_tools #coding_tips #mobile_app_development #hacking #termux
Medium
No Computer? No Problem. The Ultimate Guide to Termux Hacking
We have all been there. You are sitting in an airport lounge, a coffee shop, or perhaps a boring family gathering, and the itch strikes…
⤷ Title: Operation Endgame: The fall of DanaBot
════════════════════════
𐀪 Author: dovidee
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 21:20:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberdefenders_writeup #ctf #hacking #botnet
════════════════════════
𐀪 Author: dovidee
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 21:20:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberdefenders_writeup #ctf #hacking #botnet
Medium
Operation Endgame: The fall of DanaBot
This is my write-up for ‘DanaBot Lab’ for CyberDefenders
⤷ Title: [Writeup] Proving Grounds: Flu (Linux)
════════════════════════
𐀪 Author: Bassey Ekemini E
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 20:50:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #vulnerability_scanning #privilege_escalation #bash_noscript #exploit_development
════════════════════════
𐀪 Author: Bassey Ekemini E
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 20:50:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #vulnerability_scanning #privilege_escalation #bash_noscript #exploit_development
Medium
📝 [Writeup] Proving Grounds: Flu (Linux)
Subnoscript: From OGNL Injection to Root via Misconfigured Cron Permissions
⤷ Title: Advent of Cyber — Day 14 — Containers: DoorDasher’s Demise
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 21:29:09 GMT
════════════════════════
⌗ Tags: #advent_of_cyber_2025 #tryhackme_writeup #cybersecurity #tryhackme_walkthrough #tryhackme
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 21:29:09 GMT
════════════════════════
⌗ Tags: #advent_of_cyber_2025 #tryhackme_writeup #cybersecurity #tryhackme_walkthrough #tryhackme
Medium
Advent of Cyber — Day 14 — Containers: DoorDasher’s Demise
Advent of Cyber — Day 14 — Containers: DoorDasher’s Demise Day 14 drops us straight into one of the most misunderstood areas of modern infrastructure: containers. Wareville wakes up to chaos …
⤷ Title: Advent of Cyber — Day 13 — YARA Rules: YARA Mean One!
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 21:27:51 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #cybersecurity #tryhackme_walkthrough #advent_of_cyber_2025
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 21:27:51 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #cybersecurity #tryhackme_walkthrough #advent_of_cyber_2025
Medium
Advent of Cyber — Day 13 — YARA Rules: YARA Mean One!
Advent of Cyber — Day 13 — YARA Rules: YARA Mean One! Day 13 shifts us into detection engineering mode. Instead of reacting to alerts, we’re writing logic that helps machines spot patterns for …
⤷ Title: Anonymous FTP to Root: A Complete Linux Privilege Escalation Walkthrough
════════════════════════
𐀪 Author: IshhIshneet
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 20:28:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #anonymous #tryhackme_walkthrough #ctf #tryhackme
════════════════════════
𐀪 Author: IshhIshneet
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 20:28:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #anonymous #tryhackme_walkthrough #ctf #tryhackme
Medium
🔓 Anonymous FTP to Root: A Complete Linux Privilege Escalation Walkthrough
🧭 Overview
⤷ Title: Command Injection | TryHackMe Walkthrough
════════════════════════
𐀪 Author: AJ GUIN
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 19:56:20 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #web_vulnerabilities #web_security #tryhackme #command_injection
════════════════════════
𐀪 Author: AJ GUIN
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 19:56:20 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #web_vulnerabilities #web_security #tryhackme #command_injection
Medium
Command Injection | TryHackMe Walkthrough
A vulnerability that allows attackers to execute operating system commands through an application.
⤷ Title: From Code to Production: A Beginner’s Guide to Docker, Kubernetes, CI/CD, Infrastructure & API…
════════════════════════
𐀪 Author: Aayushi Sinha
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 20:32:44 GMT
════════════════════════
⌗ Tags: #code_deployment #kubernetes_cluster #cicd_pipeline #api_security #owasp_api_security_top_10
════════════════════════
𐀪 Author: Aayushi Sinha
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 20:32:44 GMT
════════════════════════
⌗ Tags: #code_deployment #kubernetes_cluster #cicd_pipeline #api_security #owasp_api_security_top_10
Medium
From Code to Production: A Beginner’s Guide to Docker, Kubernetes, CI/CD, Infrastructure & API Security
If you are a fresh graduate, intern, or someone new to the tech industry, this article is for you.
⤷ Title: Instagram’s “17 Million User Data Leak” Was Just Scraped Records from 2022
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 22:24:14 +0000
════════════════════════
⌗ Tags: #Leaks #Security #BreachForums #Cybersecurity #data breach #Instagram #LeakBase #LEAKS #Malwarebytes #Meta #Privacy
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 22:24:14 +0000
════════════════════════
⌗ Tags: #Leaks #Security #BreachForums #Cybersecurity #data breach #Instagram #LeakBase #LEAKS #Malwarebytes #Meta #Privacy
Hackread
Instagram’s “17 Million User Data Leak” Was Just Scraped Records from 2022
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Beyond IDOR: Discovering a Stored XSS in a Vulnerable Web Platform
════════════════════════
𐀪 Author: mv999exe
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 22:11:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty_writeup #bug_bounty #pentesting
════════════════════════
𐀪 Author: mv999exe
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 22:11:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty_writeup #bug_bounty #pentesting
Medium
Beyond IDOR: Discovering a Stored XSS in a Vulnerable Web Platform
Security Note: Responsible Disclosure Policy
⤷ Title: 30 Days of Red Team: Day 15 — Credential Harvesting
════════════════════════
𐀪 Author: Maxwell Cross
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 22:43:18 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #red_teaming #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Maxwell Cross
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 22:43:18 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #red_teaming #cybersecurity #penetration_testing
Medium
30 Days of Red Team: Day 15 — Credential Harvesting
From LSASS to SAM: Mastering the Art of Dumping Hashes and Secrets
⤷ Title: Professional Ethical Hacking & Digital Investigation Services.
════════════════════════
𐀪 Author: Private-hackers.com
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 22:55:15 GMT
════════════════════════
⌗ Tags: #digital_investigation #hireprofessionalhacker #ethical_hacking #account_recovery #cybersecurity
════════════════════════
𐀪 Author: Private-hackers.com
════════════════════════
ⴵ Time: Sun, 11 Jan 2026 22:55:15 GMT
════════════════════════
⌗ Tags: #digital_investigation #hireprofessionalhacker #ethical_hacking #account_recovery #cybersecurity
Medium
Professional Ethical Hacking & Digital Investigation Services.
Private-Hackers.com provides confidential, legal, and ethical hacking services to help individuals recover hacked accounts, investigate…