⤷ Title: Active Directory Security: Common Attack Vectors and Detection Strategies. Part 1
════════════════════════
𐀪 Author: Emanuelyudica
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:26:46 GMT
════════════════════════
⌗ Tags: #active_directory #vulnerability #hacking
════════════════════════
𐀪 Author: Emanuelyudica
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:26:46 GMT
════════════════════════
⌗ Tags: #active_directory #vulnerability #hacking
Medium
Active Directory Security: Common Attack Vectors and Detection Strategies. Part 1
Introduction
⤷ Title: Lab: Insecure direct object reference
════════════════════════
𐀪 Author: PRiTi.EX
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 15:43:49 GMT
════════════════════════
⌗ Tags: #hacking #portswigger #cybersecurity
════════════════════════
𐀪 Author: PRiTi.EX
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 15:43:49 GMT
════════════════════════
⌗ Tags: #hacking #portswigger #cybersecurity
Medium
Lab: Insecure direct object reference
In this article, I’ll walk you through how I solved a PortSwigger lab based on a very common and dangerous vulnerability: Insecure Direct…
⤷ Title: From Trusted Tools to Zero-Day Chaos: Inside the 2026 Cybersecurity Storm Shaking Windows and…
════════════════════════
𐀪 Author: eL Njas!™
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:06:37 GMT
════════════════════════
⌗ Tags: #zero_day #windows #infosec
════════════════════════
𐀪 Author: eL Njas!™
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:06:37 GMT
════════════════════════
⌗ Tags: #zero_day #windows #infosec
Medium
From Trusted Tools to Zero-Day Chaos: Inside the 2026 Cybersecurity Storm Shaking Windows and Global Users.
The cybersecurity landscape in 2026 has been rocked by a series of high-impact incidents that expose a dangerous convergence: trusted…
⤷ Title: Mind the Gap: Creating Hybrid Edges with DataHound
════════════════════════
𐀪 Author: Tom O'Neill
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 15:32:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #bloodhound #red_team #penetration_testing
════════════════════════
𐀪 Author: Tom O'Neill
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 15:32:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #bloodhound #red_team #penetration_testing
Medium
Mind the Gap: Creating Hybrid Edges with DataHound
Using DataHound to create Hybrid Edges for BloodHound
⤷ Title: TryHackMe Summit Challenge
════════════════════════
𐀪 Author: Mohamed amine Gabsi
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:15:25 GMT
════════════════════════
⌗ Tags: #pyramid_of_pain #soc #cybersecurity #blue_team #tryhackme
════════════════════════
𐀪 Author: Mohamed amine Gabsi
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:15:25 GMT
════════════════════════
⌗ Tags: #pyramid_of_pain #soc #cybersecurity #blue_team #tryhackme
Medium
TryHackMe Summit Challenge
Recently, I completed the Summit challenge on TryHackMe, a purple-team simulation that puts you in the shoes of a security engineer.
⤷ Title: Sauna
════════════════════════
𐀪 Author: Zach Davis
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 15:29:26 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #ctf #learning
════════════════════════
𐀪 Author: Zach Davis
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 15:29:26 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #ctf #learning
Medium
Sauna
If you’re reading this, hello again! I finished up Hack the Box’s Sauna. This one went a lot quicker than I had anticipated. As I mentioned…
⤷ Title: HackTheBox — DevArea (Medium Linux): Walkthrough
════════════════════════
𐀪 Author: J0K3R
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:35:33 GMT
════════════════════════
⌗ Tags: #hackthebox #ctf #hacker #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: J0K3R
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:35:33 GMT
════════════════════════
⌗ Tags: #hackthebox #ctf #hacker #cybersecurity #ethical_hacking
Medium
HackTheBox — DevArea (Medium Linux): Walkthrough
Difficulty: Medium | OS: Linux (Ubuntu) | Date: 2026–04–01
⤷ Title: HackTheBox — Snapped (Hard Linux): Walkthrough
════════════════════════
𐀪 Author: J0K3R
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:35:26 GMT
════════════════════════
⌗ Tags: #ctf #ethical_hacking #hackthebox #cybersecurity #hacker
════════════════════════
𐀪 Author: J0K3R
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:35:26 GMT
════════════════════════
⌗ Tags: #ctf #ethical_hacking #hackthebox #cybersecurity #hacker
Medium
HackTheBox — Snapped (Hard Linux): Walkthrough
Difficulty: Hard | OS: Linux (Ubuntu 24.04) | Points: 40 | Date: 2026–04–02
⤷ Title: From Low-Privilege to Root: A Complete Linux Privilege Escalation Walkthrough (SUID, Credential…
════════════════════════
𐀪 Author: Cybernerddd
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:27:15 GMT
════════════════════════
⌗ Tags: #ethical_hacking #privilege_escalation #ctf_writeup #cybernerddd #cybersecurity
════════════════════════
𐀪 Author: Cybernerddd
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:27:15 GMT
════════════════════════
⌗ Tags: #ethical_hacking #privilege_escalation #ctf_writeup #cybernerddd #cybersecurity
Medium
From Low-Privilege to Root: A Complete Linux Privilege Escalation Walkthrough (SUID, Credential…
Overview
⤷ Title: Cybersecurity for Scammers
════════════════════════
𐀪 Author: İhsan Şen
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 15:13:41 GMT
════════════════════════
⌗ Tags: #ethical_hacking #fraud #phishing #scammer #cybersecurity
════════════════════════
𐀪 Author: İhsan Şen
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 15:13:41 GMT
════════════════════════
⌗ Tags: #ethical_hacking #fraud #phishing #scammer #cybersecurity
Medium
Cybersecurity for Scammers
While trying to make a hotel reservation, I unexpectedly found myself in the middle of a critical security vulnerability. In this article…
⤷ Title: CVE-2026-40175 (CVSS 10): Critical Axios Vulnerability and Exploit Code Disclosed Publicly
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 17:10:09 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AWS IMDSv2 #Axios #Cloud Security #CVE_2026_40175 #Header injection #infosec #javascript #Node.js #Prototype Pollution #rce #request smuggling
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 17:10:09 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AWS IMDSv2 #Axios #Cloud Security #CVE_2026_40175 #Header injection #infosec #javascript #Node.js #Prototype Pollution #rce #request smuggling
Daily CyberSecurity
CVE-2026-40175 (CVSS 10): Critical Axios Vulnerability and Exploit Code Disclosed Publicly
A critical CVSS 10 flaw in Axios (CVE-2026-40175) allows attackers to bypass AWS IMDSv2 and achieve RCE via header injection. Upgrade to v1.15.0 now!
⤷ Title: Broken Access Control via Replay Attack
════════════════════════
𐀪 Author: 0xJad
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 17:18:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #bug_bounty #bug_bounty_writeup #hacking
════════════════════════
𐀪 Author: 0xJad
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 17:18:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #bug_bounty #bug_bounty_writeup #hacking
Medium
Broken Access Control via Replay Attack
How a simple replay trick bypasses permission checks on a popular project management platform
⤷ Title: HTB: Dancing Box Walkthrough
════════════════════════
𐀪 Author: Coldstart Coder
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 18:02:12 GMT
════════════════════════
⌗ Tags: #hacking #hackthebox #hackthebox_writeup #hackthebox_walkthrough
════════════════════════
𐀪 Author: Coldstart Coder
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 18:02:12 GMT
════════════════════════
⌗ Tags: #hacking #hackthebox #hackthebox_writeup #hackthebox_walkthrough
Medium
HTB: Dancing Box Walkthrough
We continue our series of Hack the Box-Starting Point boxes with box 03: Dancing. Let’s get started!
⤷ Title: You Won’t Believe This Open-Source AI Remembers Your Entire Work Life
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:54:46 GMT
════════════════════════
⌗ Tags: #ai #hacking #agents #artificial_intelligence #cybersecurity
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 16:54:46 GMT
════════════════════════
⌗ Tags: #ai #hacking #agents #artificial_intelligence #cybersecurity
Medium
You Won’t Believe This Open-Source AI Remembers Your Entire Work Life
Most AI tools answer questions. Rowboat tries to remember your work, organize it into a living knowledge graph, and then act on it. That…
⤷ Title: Logical Issue Allowed Me to Create Support Cases Instead of Organization Admin
════════════════════════
𐀪 Author: Hamzadzworm
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 17:35:59 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #bugbounty_tips #information_security #infosec_write_ups #infosec
════════════════════════
𐀪 Author: Hamzadzworm
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 17:35:59 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #bugbounty_tips #information_security #infosec_write_ups #infosec
Medium
Logical Issue Allowed Me to Create Support Cases Instead of Organization Admin
Hi again,
This is Abdelkader Mouaz, also known as Hamzadzworm.
It has been a while since my last write-up.
This is Abdelkader Mouaz, also known as Hamzadzworm.
It has been a while since my last write-up.
⤷ Title: Beyond the CLI: Reimagining Network Recon with Cyber-Eye Mapper v4.0
════════════════════════
𐀪 Author: Dennischacko
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 18:39:45 GMT
════════════════════════
⌗ Tags: #ethical_hacking #open_source_intelligence #nmap #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Dennischacko
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 18:39:45 GMT
════════════════════════
⌗ Tags: #ethical_hacking #open_source_intelligence #nmap #penetration_testing #cybersecurity
Medium
Beyond the CLI: Reimagining Network Recon with Cyber-Eye Mapper v4.0
The power of Nmap, the elegance of a modern web dashboard, and the security of AES-256 encryption — all in one orchestration layer.
⤷ Title: Mr Robot VulnHub Walkthrough | 06/100
════════════════════════
𐀪 Author: Veetaragpatil
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 13:11:01 GMT
════════════════════════
⌗ Tags: #ctf #penetration_testing #ethical_hacking #cybersecurity #linux
════════════════════════
𐀪 Author: Veetaragpatil
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 13:11:01 GMT
════════════════════════
⌗ Tags: #ctf #penetration_testing #ethical_hacking #cybersecurity #linux
Medium
Mr Robot VulnHubWalkthrough | 06/100
Introduction: The Machine That Started With a Smirk
⤷ Title: HackTheBox Writeup — MonitorsFour
════════════════════════
𐀪 Author: red wolf
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 18:31:01 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #ctf #pentesting #hackthebox
════════════════════════
𐀪 Author: red wolf
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 18:31:01 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #ctf #pentesting #hackthebox
Medium
HackTheBox Writeup — MonitorsFour
Introduction
⤷ Title: Post-Exploitation Pivoting in a Lab Environment Using Meterpreter
════════════════════════
𐀪 Author: ZeroDay-Security-Services
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 18:36:53 GMT
════════════════════════
⌗ Tags: #linux #network_pivoting #information_security #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: ZeroDay-Security-Services
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 18:36:53 GMT
════════════════════════
⌗ Tags: #linux #network_pivoting #information_security #cybersecurity #ethical_hacking
Medium
Post-Exploitation Pivoting in a Lab Environment Using Meterpreter
Internal Network Enumeration and Service Access Through a Compromised Linux Host
⤷ Title: Home CTF’s Labbing is Now My Favorite Obsession
════════════════════════
𐀪 Author: The Husky Hacker
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 18:23:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf_writeup
════════════════════════
𐀪 Author: The Husky Hacker
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 18:23:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf_writeup
Medium
Home CTF’s Labbing is Now My Favorite Obsession
So, while building out my stuff recently, like my free educational site, I thought, hey, why not add some ctf’s? Then, while building out…
⤷ Title: Obsession Writeup Español
════════════════════════
𐀪 Author: Us0lfr
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 17:07:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #pentesting #ethical_hacking #dockerlabs
════════════════════════
𐀪 Author: Us0lfr
════════════════════════
ⴵ Time: Sun, 12 Apr 2026 17:07:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #pentesting #ethical_hacking #dockerlabs
Medium
Obsession Writeup Español
La máquina Obsession se encuentra en la plataforma de Dockerlabs, creada por “El Pingüino de Mario” esta máquina está catalogada como “MUY…