⤷ Title: Day-2 Bypassing No Brackets XSS Filter
════════════════════════
𐀪 Author: zero_day
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:19:19 GMT
════════════════════════
⌗ Tags: #xss_attack #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: zero_day
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:19:19 GMT
════════════════════════
⌗ Tags: #xss_attack #cybersecurity #bug_bounty
Medium
Day-2 Bypassing No Brackets XSS Filter
Hey guys, so today I was solving an XSS lab and I got stuck for way longer than I expected But I learned something really important, so…
⤷ Title: Shai-Hulud 2.0:
════════════════════════
𐀪 Author: Arshad Kazmi
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:30:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #secrets_scanning #supply_chain_attack #shai_hulud #npm
════════════════════════
𐀪 Author: Arshad Kazmi
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:30:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #secrets_scanning #supply_chain_attack #shai_hulud #npm
Medium
Shai-Hulud 2.0: How I Uncovered Secrets From Major Organizations During the Largest npm Supply Chain Attack
It was November 24, 2025. I opened Twitter and my entire feed was on fire.
⤷ Title: Making UAC Bypass Great Again in 2026
════════════════════════
𐀪 Author: Yua Mikanana
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:48:30 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #technology #hacking #ethical_hacking
════════════════════════
𐀪 Author: Yua Mikanana
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:48:30 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #technology #hacking #ethical_hacking
Medium
Making UAC Bypass Great Again in 2026
Let’s be honest — User Account Control (UAC) bypasses never really went away. They just… faded into the background.
⤷ Title: When a Facebook friend request becomes a cyber trap: how North Korean hackers are using social…
════════════════════════
𐀪 Author: Diya TK
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:12:55 GMT
════════════════════════
⌗ Tags: #social_engineering #hacking #facebook
════════════════════════
𐀪 Author: Diya TK
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:12:55 GMT
════════════════════════
⌗ Tags: #social_engineering #hacking #facebook
Medium
When a Facebook friend request becomes a cyber trap: how North Korean hackers are using social…
It starts like any ordinary day on social media — a new friend request, maybe from someone with mutual interests or a professional-looking…
⤷ Title: Reverse Engineering on CyberTalents: Solving All Easy Challenges Part 3
════════════════════════
𐀪 Author: Isv0x1
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:01:27 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #malware #reverse_engineering #hacking
════════════════════════
𐀪 Author: Isv0x1
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:01:27 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #malware #reverse_engineering #hacking
Medium
Reverse Engineering on CyberTalents: Solving All Easy Challenges Part 3
🚩 Challenge 7: “Jumping Pixels”
⤷ Title: Fixture - WebVerse (Medium)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:35:05 GMT
════════════════════════
⌗ Tags: #ssrf #webverse #sql_injection #hacking #ctf_writeup
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:35:05 GMT
════════════════════════
⌗ Tags: #ssrf #webverse #sql_injection #hacking #ctf_writeup
Medium
Fixture - WebVerse (Medium)
I thought this was going to be an adventure. And wow, it was. This was an interesting lab. Here goes:
⤷ Title: vulnversity — TryHackMe Walkthrough
════════════════════════
𐀪 Author: Abdallah_samir
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:23:30 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #cybersecurity #information_security #hacking
════════════════════════
𐀪 Author: Abdallah_samir
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:23:30 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #cybersecurity #information_security #hacking
Medium
vulnversity — TryHackMe Walkthrough
Initial Reconnaissance: Scanning the Target with Nmap Scan
⤷ Title: Fake wallet app on Apple store leads to $420,000 theft with nearly 6 BTC stolen
════════════════════════
𐀪 Author: Coin Headlines
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:11:23 GMT
════════════════════════
⌗ Tags: #cryptocurrency #hacking #cyber_security_awareness #bitcoin
════════════════════════
𐀪 Author: Coin Headlines
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:11:23 GMT
════════════════════════
⌗ Tags: #cryptocurrency #hacking #cyber_security_awareness #bitcoin
Medium
Fake wallet app on Apple store leads to $420,000 theft with nearly 6 BTC stolen
There’s a rule that every crypto holder learns, or should learn, early: your seed phrase never goes anywhere near an internet-connected…
⤷ Title: ENG | TryHackMe Basic Pentesting CTF Solution
════════════════════════
𐀪 Author: Efe Özel
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:03:24 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #pentesting #hacking #tryhackme
════════════════════════
𐀪 Author: Efe Özel
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:03:24 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #pentesting #hacking #tryhackme
Medium
ENG | TryHackMe Basic Pentesting CTF Solution
Basic Pentesting
My solution process for the Basic Pentesting CTF on TryHackMe.
My solution process for the Basic Pentesting CTF on TryHackMe.
⤷ Title: Cybersecurity Technical Writer | Translating Technical Complexity into Business Protection
════════════════════════
𐀪 Author: Petersmuditha
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:56:45 GMT
════════════════════════
⌗ Tags: #infosec #data_privacy #cybersecurity #technical_writing #digital_forensics
════════════════════════
𐀪 Author: Petersmuditha
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:56:45 GMT
════════════════════════
⌗ Tags: #infosec #data_privacy #cybersecurity #technical_writing #digital_forensics
Medium
🎯 Cybersecurity Technical Writer | Translating Technical Complexity into Business Protection
📖 Table of Contents
⤷ Title: Blaster v2.0 — A Modular Evolution of a Security Reconnaissance Framework
════════════════════════
𐀪 Author: Muhammad Usman Faridi
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:49:45 GMT
════════════════════════
⌗ Tags: #infosec #red_team #cybersecurity #python #hacking_tools
════════════════════════
𐀪 Author: Muhammad Usman Faridi
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:49:45 GMT
════════════════════════
⌗ Tags: #infosec #red_team #cybersecurity #python #hacking_tools
Medium
Blaster v2.0 — A Modular Evolution of a Security Reconnaissance Framework
Introduction
⤷ Title: [HackTheBox Sherlocks] OpTinselTrace-4 (Network forensics of Printer traffic)
════════════════════════
𐀪 Author: Chicken0248
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:53:29 GMT
════════════════════════
⌗ Tags: #hackthebox #cybersecurity #network_forensics #blue_team #hackthebox_writeup
════════════════════════
𐀪 Author: Chicken0248
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:53:29 GMT
════════════════════════
⌗ Tags: #hackthebox #cybersecurity #network_forensics #blue_team #hackthebox_writeup
Medium
[HackTheBox Sherlocks] OpTinselTrace-4 (Network forensics of Printer traffic)
investigating the printer's local storage exploitation from pcap
⤷ Title: HackTheBox Sherlocks — OpTinselTrace-3 (Memory dump forensics with volatility)
════════════════════════
𐀪 Author: Chicken0248
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:52:45 GMT
════════════════════════
⌗ Tags: #blue_team #digital_forensics #hackthebox_writeup #hackthebox #cybersecurity
════════════════════════
𐀪 Author: Chicken0248
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:52:45 GMT
════════════════════════
⌗ Tags: #blue_team #digital_forensics #hackthebox_writeup #hackthebox #cybersecurity
Medium
[HackTheBox Sherlocks] OpTinselTrace-3 (Memory dump forensics with volatility)
Investigating Windows memory dump revealing execution chains start from lnk to process injection.
⤷ Title: HTB University CTF 2025: Tinsel Trouble Clearing Forensics Challenges
════════════════════════
𐀪 Author: Loay Salah
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:28:23 GMT
════════════════════════
⌗ Tags: #hackthebox #digital_forensics #network_security #incident_response #hackthebox_writeup
════════════════════════
𐀪 Author: Loay Salah
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:28:23 GMT
════════════════════════
⌗ Tags: #hackthebox #digital_forensics #network_security #incident_response #hackthebox_writeup
Medium
HTB University CTF 2025: Tinsel Trouble Clearing Forensics Challenges
Hi, I’m glad to share with you my writeup for solving ALL Forensics Challenges in HTB University CTF 2025: Tinsel Trouble.
⤷ Title: CVE-2023–6972 Wordpress Backup Migration ≤1.3.9 Arbitrary File Deletion Case Study
════════════════════════
𐀪 Author: phantom_hat
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:53:20 GMT
════════════════════════
⌗ Tags: #cve #wordpress #rce #exploit #security_research
════════════════════════
𐀪 Author: phantom_hat
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:53:20 GMT
════════════════════════
⌗ Tags: #cve #wordpress #rce #exploit #security_research
Medium
CVE-2023–6972 Wordpress Backup Migration ≤1.3.9 Arbitrary File Deletion Case Study
﷽
⤷ Title: Blind SQL injection with time delays and information retrieval
════════════════════════
𐀪 Author: Mohamed Ahmed
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:04:18 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #web_security #portswigger #pentesting
════════════════════════
𐀪 Author: Mohamed Ahmed
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:04:18 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #web_security #portswigger #pentesting
Medium
Blind SQL injection with time delays and information retrieval
Welcome to this write-up.
⤷ Title: Guía de OAuth: Vulnerabilidades, Vectores de Ataque y Seguridad
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #technology #web_development #cybersecurity #bug_bounty #hacking
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #technology #web_development #cybersecurity #bug_bounty #hacking
Medium
Guía de OAuth: Vulnerabilidades, Vectores de Ataque y Seguridad
Domina OAuth: aprende sus vulnerabilidades, vectores críticos como JKU y Account Takeover, y estrategias de encadenamiento.
⤷ Title: I Saw Someone Build an AI-Powered Kali Lab at BSides San Diego. Then I Built My Own.
════════════════════════
𐀪 Author: erik
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:49:54 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty #cybersecurity #docker
════════════════════════
𐀪 Author: erik
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:49:54 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty #cybersecurity #docker
Medium
I Saw Someone Build an AI-Powered Kali Lab at BSides San Diego. Then I Built My Own.
*How a conference demo turned into a full bug bounty lab with Claude Desktop, Discord remote access, and automated health monitoring on…
⤷ Title: JWT Editor: The Burp Suite Extension That Turns Token Testing from Guesswork into a Science
════════════════════════
𐀪 Author: Ajay Yadav
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:36:01 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #bug_bounty #web_security #cybersecurity
════════════════════════
𐀪 Author: Ajay Yadav
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:36:01 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #bug_bounty #web_security #cybersecurity
Medium
JWT Editor: The Burp Suite Extension That Turns Token Testing from Guesswork into a Science
Almost every modern web application uses JSON Web Tokens. Login to a site, get a JWT. Call an API, include your JWT. Change your role…
⤷ Title: Regex Injection ve E-posta Parametre Manipülasyonu ile Hesap Ele Geçirme
════════════════════════
𐀪 Author: Şahnur Eren Aloğlu
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:48:07 GMT
════════════════════════
⌗ Tags: #regex #web_security #hacking #pentester
════════════════════════
𐀪 Author: Şahnur Eren Aloğlu
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:48:07 GMT
════════════════════════
⌗ Tags: #regex #web_security #hacking #pentester
Medium
Regex Injection ve E-posta Parametre Manipülasyonu ile Hesap Ele Geçirme
Keşif Süreci: Duvara Toslamak
⤷ Title: We’re Building the Thing Mike Frantzen Is Asking For
════════════════════════
𐀪 Author: R. Demetri Vallejos
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:31:28 GMT
════════════════════════
⌗ Tags: #ai #artificial_intelligence #cybersecurity #hacking #computer_science
════════════════════════
𐀪 Author: R. Demetri Vallejos
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:31:28 GMT
════════════════════════
⌗ Tags: #ai #artificial_intelligence #cybersecurity #hacking #computer_science
Medium
We’re Building the Thing Mike Frantzen Is Asking For
He wrote the business case. Here’s the engineering.