⤷ Title: How I Failed OSCP on My First Attempt (Even with Notes Open) and Passed on the Second Try
════════════════════════
𐀪 Author: Alex Rivera
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 17:56:01 GMT
════════════════════════
⌗ Tags: #oscpnotes #ethical_hacking #oscp_preparation #cybersecurity #oscp
════════════════════════
𐀪 Author: Alex Rivera
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 17:56:01 GMT
════════════════════════
⌗ Tags: #oscpnotes #ethical_hacking #oscp_preparation #cybersecurity #oscp
Medium
How I Failed OSCP on My First Attempt (Even with Notes Open) and Passed on the Second Try
From 45 points (failed) to passing on the second attempt — the note-taking system that actually worked under pressure.
⤷ Title: Analyzing a Malicious PCAP Using Wireshark: The DomainCop247 Case Study
════════════════════════
𐀪 Author: Finnih Oluwatimilehin
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 17:28:04 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #malware #network_security #wireshark
════════════════════════
𐀪 Author: Finnih Oluwatimilehin
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 17:28:04 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #malware #network_security #wireshark
Medium
Analyzing a Malicious PCAP Using Wireshark: The DomainCop247 Case Study
Introduction
⤷ Title: AI Hackingの醍醐味
════════════════════════
𐀪 Author: Hiroya Nakamura
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 17:16:17 GMT
════════════════════════
⌗ Tags: #ai #ethical_hacking
════════════════════════
𐀪 Author: Hiroya Nakamura
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 17:16:17 GMT
════════════════════════
⌗ Tags: #ai #ethical_hacking
Medium
AI Hackingの醍醐味
Hackerという仕事をしていて最も楽しいなと思う瞬間は、人の極度な喜怒哀楽に触れれる時でした。
⤷ Title: How I Found an Exposed Google Maps API Key in a Production Config File
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:38:17 GMT
════════════════════════
⌗ Tags: #android_security #infosec #bug_bounty #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:38:17 GMT
════════════════════════
⌗ Tags: #android_security #infosec #bug_bounty #cybersecurity #ethical_hacking
Medium
How I Found an Exposed Google Maps API Key in a Production Config File
How I Found an Exposed Google Maps API Key in a Production Config File Bug Bounty Write-Up One unauthenticated endpoint. One unrestricted API key. $331,000/month in potential financial …
⤷ Title: LLMNR/NBT-NS Poisoning in Depth | Ehxb
════════════════════════
𐀪 Author: Ehxb
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:44:45 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #tryhackme #ctf #hackthebox
════════════════════════
𐀪 Author: Ehxb
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:44:45 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #tryhackme #ctf #hackthebox
Medium
Ehx | LLMNR/NBT-NS Poisoning in Depth
Description
⤷ Title: How to Know If Your Phone Is Hacked
════════════════════════
𐀪 Author: Sajid Khan
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:40:32 GMT
════════════════════════
⌗ Tags: #hacked #phone_hacking #hacks #hacking #ethical_hacking
════════════════════════
𐀪 Author: Sajid Khan
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:40:32 GMT
════════════════════════
⌗ Tags: #hacked #phone_hacking #hacks #hacking #ethical_hacking
Medium
How to Know If Your Phone Is Hacked
Below are the most important warning signs that your phone is hacked. These red flags are confirmed by cybersecurity experts at the FTC…
⤷ Title: AI Forensics (THM) Tryhackme WriteUp and Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 19:45:33 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ai_forensics #tryhackme #artificial_intelligence
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 19:45:33 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ai_forensics #tryhackme #artificial_intelligence
Medium
AI Forensics (THM) Tryhackme WriteUp and Answer
Description : Explore AI DFIR and learn how it boosts your investigation capabilities.
⤷ Title: Try Hack Me- Anthem Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 19:59:21 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #cybersecurity #penetration_testing #tryhackme_walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 19:59:21 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #cybersecurity #penetration_testing #tryhackme_walkthrough
Medium
Try Hack Me- Anthem Walkthrough
Hello, stranger — let’s begin.
⤷ Title: Rapport d’audit de sécurité (Test d’intrusion Mercury)
════════════════════════
𐀪 Author: Nourselmi
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 19:29:56 GMT
════════════════════════
⌗ Tags: #mercury #mercuryctf #pentesting #penetration_testing
════════════════════════
𐀪 Author: Nourselmi
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 19:29:56 GMT
════════════════════════
⌗ Tags: #mercury #mercuryctf #pentesting #penetration_testing
Medium
Rapport d’audit de sécurité (Test d’intrusion Mercury)
1. Reconnaissance
⤷ Title: Ehx | LLMNR/NBT-NS Poisoning in Depth
════════════════════════
𐀪 Author: Ehxb
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:44:45 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #tryhackme #ctf #hackthebox
════════════════════════
𐀪 Author: Ehxb
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:44:45 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #tryhackme #ctf #hackthebox
Medium
Ehx | LLMNR/NBT-NS Poisoning in Depth
Description
⤷ Title: I Automated the Passive Reconnaissance Process I Learned in Class
════════════════════════
𐀪 Author: Angle Gray
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:26:17 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #reconnaissance #ethical_hacking #information_security
════════════════════════
𐀪 Author: Angle Gray
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:26:17 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #reconnaissance #ethical_hacking #information_security
Medium
I Automated the Passive Reconnaissance Process I Learned in Class
In one of my modules, my lecturer introduced us to passive reconnaissance. The process involved manually running WHOIS lookups, checking…
⤷ Title: API Nedir ve Nasıl Çalışır?
════════════════════════
𐀪 Author: Elify
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 19:30:11 GMT
════════════════════════
⌗ Tags: #api_development #api_security #rest_api #api #api_gateway
════════════════════════
𐀪 Author: Elify
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 19:30:11 GMT
════════════════════════
⌗ Tags: #api_development #api_security #rest_api #api #api_gateway
Medium
API Nedir ve Nasıl Çalışır?
API (Application Programming Interfaces), dijital dünyada uygulamalar ve cihazlar arasında kesintisiz iletişimi sağlayan dijital köprü…
⤷ Title: A Practical Guide to Testing Static Websites for Security Vulnerabilities
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 21:01:01 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #bug_bounty #web_development #hacking
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 21:01:01 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #bug_bounty #web_development #hacking
Medium
A Practical Guide to Testing Static Websites for Security Vulnerabilities
Static websites often seem like low-hanging fruit in bug bounty programs, but they present unique security challenges that require…
⤷ Title: Breach - WebVerse (GraphQL)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:37:54 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ctf #hacking #graphql #infosec
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:37:54 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ctf #hacking #graphql #infosec
Medium
Breach - WebVerse (GraphQL)
Lab can be found at: https://webverselabs-pro.com/
⤷ Title: The $2 Billion USB Drive: Inside the Most Sophisticated Cyberweapon Ever Built
════════════════════════
𐀪 Author: Marteinu
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:04:31 GMT
════════════════════════
⌗ Tags: #programming #history #cybersecurity #hacking #caisd
════════════════════════
𐀪 Author: Marteinu
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:04:31 GMT
════════════════════════
⌗ Tags: #programming #history #cybersecurity #hacking #caisd
Medium
The $2 Billion USB Drive: Inside the Most Sophisticated Cyberweapon Ever Built
The $2 Billion USB Drive: Inside the Most Sophisticated Cyberweapon Ever Built How a water pump, a Dutch engineer, and five zero-day exploits quietly destroyed Iran's nuclear programme — and …
⤷ Title: Reading Secrets Straight From the Browser: The NEXT_PUBLIC_ Trap
════════════════════════
𐀪 Author: OopsSec Store
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 21:56:33 GMT
════════════════════════
⌗ Tags: #javascript #hacking #programming #cybersecurity #nextjs
════════════════════════
𐀪 Author: OopsSec Store
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 21:56:33 GMT
════════════════════════
⌗ Tags: #javascript #hacking #programming #cybersecurity #nextjs
Medium
Reading Secrets Straight From the Browser: The NEXT_PUBLIC_ Trap
When your “secret” API key ships inside every user’s JavaScript bundle
⤷ Title: HackPark — TryHackMe Walkthrough
════════════════════════
𐀪 Author: Abdallah_samir
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 21:22:30 GMT
════════════════════════
⌗ Tags: #tryhackme #hacking #penetration_testing #ctf #cybersecurity
════════════════════════
𐀪 Author: Abdallah_samir
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 21:22:30 GMT
════════════════════════
⌗ Tags: #tryhackme #hacking #penetration_testing #ctf #cybersecurity
Medium
HackPark — TryHackMe Walkthrough
Initial Reconnaissance
⤷ Title: CyberDefenders — LockBit Lab Writeup
════════════════════════
𐀪 Author: JBXSec
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:56:52 GMT
════════════════════════
⌗ Tags: #dfir #cybersecurity #threat_hunting #ransomware #infosec
════════════════════════
𐀪 Author: JBXSec
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:56:52 GMT
════════════════════════
⌗ Tags: #dfir #cybersecurity #threat_hunting #ransomware #infosec
Medium
CyberDefenders — LockBit Lab Writeup
Overview
⤷ Title: Why Digital Security Matters More Than Ever
════════════════════════
𐀪 Author: Hania Khan
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:38:46 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #online_safety #data_protection #cybersecurity #infosec
════════════════════════
𐀪 Author: Hania Khan
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:38:46 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #online_safety #data_protection #cybersecurity #infosec
Medium
Why Digital Security Matters More Than Ever
It is not about protecting data anymore. It is about protecting lives.
⤷ Title: ☠️ OffSec Access Machine — Full Walkthrough | File Upload to SYSTEM via SeManageVolumePrivilege
════════════════════════
𐀪 Author: Abhishek Sharma
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:36:59 GMT
════════════════════════
⌗ Tags: #active_directory #kerberoasting #provinggrounds #offsec #penetration_testing
════════════════════════
𐀪 Author: Abhishek Sharma
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:36:59 GMT
════════════════════════
⌗ Tags: #active_directory #kerberoasting #provinggrounds #offsec #penetration_testing
Medium
🏴☠️ OffSec Access Machine — Full Walkthrough | File Upload to SYSTEM via SeManageVolumePrivilege
A beginner-friendly walkthrough covering file upload bypass, Kerberoasting, lateral movement, and Windows privilege escalation using…
⤷ Title: Masquerade TryHackMe Writeup: PowerShell Malware & Covert C2 Analysis
════════════════════════
𐀪 Author: M8X2d
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:17:35 GMT
════════════════════════
⌗ Tags: #masquerade #cybersecurity #tryhackme #digital_forensics #malware_analysis
════════════════════════
𐀪 Author: M8X2d
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 22:17:35 GMT
════════════════════════
⌗ Tags: #masquerade #cybersecurity #tryhackme #digital_forensics #malware_analysis
Medium
Masquerade TryHackMe Writeup: PowerShell Malware & Covert C2 Analysis
I worked on the Masquerade room on TryHackMe, where I investigated a malware incident involving a malicious PowerShell script, network…