⤷ Title: PortSwigger Lab Writeup — Bypassing AI scanner defenses to exfiltrate sensitive information
════════════════════════
𐀪 Author: Raghav
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 14:30:24 GMT
════════════════════════
⌗ Tags: #web_security #portswigger_writeup #portswigger #penetration_testing #web_hacking
════════════════════════
𐀪 Author: Raghav
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 14:30:24 GMT
════════════════════════
⌗ Tags: #web_security #portswigger_writeup #portswigger #penetration_testing #web_hacking
Medium
PortSwigger Lab Writeup — Bypassing AI scanner defenses to exfiltrate sensitive information
Author: Raghav Vivekanandan
⤷ Title: Nmap Is More Than a Scanner. It’s a Framework.
════════════════════════
𐀪 Author: Roshan Rajbanshi
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 14:20:20 GMT
════════════════════════
⌗ Tags: #ethical_hacking #penetration_testing #network_security #nmap #cybersecurity
════════════════════════
𐀪 Author: Roshan Rajbanshi
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 14:20:20 GMT
════════════════════════
⌗ Tags: #ethical_hacking #penetration_testing #network_security #nmap #cybersecurity
Medium
Nmap Is More Than a Scanner. It’s a Framework.
Most people who use Nmap every day have never actually seen what it sends. This changes that.
⤷ Title: My review & Journey to Becoming of (ejpt) exam 2026
════════════════════════
𐀪 Author: Dnyaneshwarshelke
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 13:30:21 GMT
════════════════════════
⌗ Tags: #ejptv2 #ine #penetration_testing #cybersecurity #my_ejpt_experience
════════════════════════
𐀪 Author: Dnyaneshwarshelke
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 13:30:21 GMT
════════════════════════
⌗ Tags: #ejptv2 #ine #penetration_testing #cybersecurity #my_ejpt_experience
Medium
My review & Journey to Becoming of (ejpt) exam 2026
Recently, I cleared the eLearnSecurity Junior Penetration Tester v2 (eJPTv2) exam with a 82% score.
⤷ Title: Biohazard — TryHackMe WriteUp
════════════════════════
𐀪 Author: Rayenhafsawy
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 13:02:20 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #tryhackme_walkthrough #tryhackme_writeup #penetration_testing
════════════════════════
𐀪 Author: Rayenhafsawy
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 13:02:20 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #tryhackme_walkthrough #tryhackme_writeup #penetration_testing
Medium
Biohazard — TryHackMe WriteUp
Date: 24/04/2026
⤷ Title: Checkpoint | TryHackMe
════════════════════════
𐀪 Author: Ryca
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 14:23:53 GMT
════════════════════════
⌗ Tags: #supply_chain #ctf #cybersecurity #tryhackme #ai
════════════════════════
𐀪 Author: Ryca
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 14:23:53 GMT
════════════════════════
⌗ Tags: #supply_chain #ctf #cybersecurity #tryhackme #ai
Medium
Checkpoint | TryHackMe
Four candidates. Three threats. Make the production call.
⤷ Title: TryHackMe- Wgel CTF Spoiler Free Walkthrough
════════════════════════
𐀪 Author: Himanshu
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 13:54:05 GMT
════════════════════════
⌗ Tags: #tryhackme #privilege_escalation #ctf #cybersecurity #tryhackme_walkthrough
════════════════════════
𐀪 Author: Himanshu
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 13:54:05 GMT
════════════════════════
⌗ Tags: #tryhackme #privilege_escalation #ctf #cybersecurity #tryhackme_walkthrough
Medium
TryHackMe- Wgel CTF Spoiler Free Walkthrough
Overview
⤷ Title: Chain Reaction (THM) Tryhackme WriteUp and Full Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 13:48:59 GMT
════════════════════════
⌗ Tags: #chain_of_custody #tryhackme #cybersecurity #supply_chain #network_security
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 13:48:59 GMT
════════════════════════
⌗ Tags: #chain_of_custody #tryhackme #cybersecurity #supply_chain #network_security
Medium
Chain Reaction (THM) Tryhackme WriteUp and Full Answer
Description : Hunt down an Axios chain attack before the chain reaction spreads.
⤷ Title: New Tool For Pentesters
════════════════════════
𐀪 Author: Himanshu
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 14:26:42 GMT
════════════════════════
⌗ Tags: #hacking_tools #ethical_hacking #redteam_tool #cybersecurity
════════════════════════
𐀪 Author: Himanshu
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 14:26:42 GMT
════════════════════════
⌗ Tags: #hacking_tools #ethical_hacking #redteam_tool #cybersecurity
Medium
New Tool For Pentesters
Why I Built PCA (Pentest CLI Assistant)
⤷ Title: NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 19:43:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 19:43:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Stored DoS via Missing Parameter
════════════════════════
𐀪 Author: TURB0_1
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:31:23 GMT
════════════════════════
⌗ Tags: #denial_of_service #bug_bounty #vulnerability
════════════════════════
𐀪 Author: TURB0_1
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:31:23 GMT
════════════════════════
⌗ Tags: #denial_of_service #bug_bounty #vulnerability
Medium
Stored DoS via Missing Parameter
بِسْمِ اللَّهِ الرَّحْمَنِ الرَّحِيمِ ─────────────
⤷ Title: Mobile App Security Testing | Ethical Hacking Services
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:50:16 GMT
════════════════════════
⌗ Tags: #hacking #android #business #cybersecurity #ios
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:50:16 GMT
════════════════════════
⌗ Tags: #hacking #android #business #cybersecurity #ios
Medium
Mobile App Security Testing | Ethical Hacking Services
Mobile App Security Testing: Ensuring Robust Protection in a Digital World
⤷ Title: Enterprise-THM: Full Active Directory Compromise
════════════════════════
𐀪 Author: ZeroDay-Security-Services
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:55:00 GMT
════════════════════════
⌗ Tags: #ethical_hacking #hacking #active_directory #pentesting #cybersecurity
════════════════════════
𐀪 Author: ZeroDay-Security-Services
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:55:00 GMT
════════════════════════
⌗ Tags: #ethical_hacking #hacking #active_directory #pentesting #cybersecurity
Medium
Enterprise-THM: Full Active Directory Compromise
From Anonymous SMB Access to SYSTEM-Level Control
⤷ Title: Malware That Lives in Your GPU : The Idea Is Simple and Brilliant
════════════════════════
𐀪 Author: zerOiQ
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:37:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #malware #security #technology
════════════════════════
𐀪 Author: zerOiQ
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:37:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #malware #security #technology
Medium
Malware That Lives in Your GPU : The Idea Is Simple and Brilliant
Your antivirus checks your RAM. It checks your disk. It checks your processes. Nobody told it to check the Graphics Card .
⤷ Title: Breaking JWT Authentication in Real Applications | Ayan Paul
════════════════════════
𐀪 Author: Ayan Paul
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:54:16 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #information_security #jwt #infosec
════════════════════════
𐀪 Author: Ayan Paul
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:54:16 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #information_security #jwt #infosec
Medium
Breaking JWT Authentication in Real Applications | Ayan Paul
In this blog, I will be discussing JSON Web Tokens (JWT) from a practical security perspective. The focus will be on understanding how JWT…
⤷ Title: Understanding AI Supply Chains Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:32:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #supply_chain_attack #tryhackme_walkthrough #tryhackme #tryhackme_writeup
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:32:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #supply_chain_attack #tryhackme_walkthrough #tryhackme #tryhackme_writeup
Medium
Understanding AI Supply Chains Walkthrough Notes | TryHackMe
How AI supply chains work and where risks can appear
⤷ Title: Prompt Defence Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:32:24 GMT
════════════════════════
⌗ Tags: #ai_security #cybersecurity #tryhackme #tryhackme_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:32:24 GMT
════════════════════════
⌗ Tags: #ai_security #cybersecurity #tryhackme #tryhackme_writeup #tryhackme_walkthrough
Medium
Prompt Defence Walkthrough Notes | TryHackMe
How AI systems use guardrails and layers to reduce risks
⤷ Title: TryHackMe | AI System Reconnaissance | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:26:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #ai #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:26:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #ai #tryhackme_writeup #tryhackme
Medium
TryHackMe | AI System Reconnaissance | WriteUp
Discover AI infrastructure by scanning ML services, frameworks, and extracting metadata from APIs.
⤷ Title: TryHackMe | Data Poisoning in RAG Systems | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:10:03 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #ai #tryhackme_walkthrough #cybersecurity #tryhackme
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 16:10:03 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #ai #tryhackme_walkthrough #cybersecurity #tryhackme
Medium
TryHackMe | Data Poisoning in RAG Systems | WriteUp
Explore how data poisoning alters AI embeddings and retrieval results without visible errors.
⤷ Title: Defensive Security Intro
════════════════════════
𐀪 Author: Stacy Sirbu
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:47:57 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #cybersecurity #tryhackme #tutorial #tryhackme_walkthrough
════════════════════════
𐀪 Author: Stacy Sirbu
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:47:57 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #cybersecurity #tryhackme #tutorial #tryhackme_walkthrough
Medium
Defensive Security Intro
Introducing defensive security, where you will protect FakeBank from an ongoing attack.
⤷ Title: RAG Security Fundamentals | TryHackMe
════════════════════════
𐀪 Author: Ryca
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:41:01 GMT
════════════════════════
⌗ Tags: #tryhackme #rag_security #cybersecurity #ai
════════════════════════
𐀪 Author: Ryca
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:41:01 GMT
════════════════════════
⌗ Tags: #tryhackme #rag_security #cybersecurity #ai
Medium
RAG Security Fundamentals | TryHackMe
Learn how RAG systems work and how attackers exploit retrieval, context, and trust boundaries.
⤷ Title: Offensive Security Intro
════════════════════════
𐀪 Author: Stacy Sirbu
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:02:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #tutorial #thm_writeup
════════════════════════
𐀪 Author: Stacy Sirbu
════════════════════════
ⴵ Time: Fri, 24 Apr 2026 15:02:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #tutorial #thm_writeup
Medium
Offensive Security Intro
Hack your first website (legally in a safe environment) and experience an ethical hacker’s job.