⤷ Title: Python Cheatsheet for Cloud Networking Protocols: Handling HTTP, HTTPS, and WebSocket Traffic
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Tue, 28 Jan 2025 12:00:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #network_security #python_security #intrusion_detection
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Tue, 28 Jan 2025 12:00:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #network_security #python_security #intrusion_detection
Medium
Python Cheatsheet for Cloud Networking Protocols: Handling HTTP, HTTPS, and WebSocket Traffic
In today’s interconnected world, cloud networking protocols such as HTTP, HTTPS, and WebSocket are foundational for web applications and…
⤷ Title: Python Cheatsheet for Exploit Frameworks: For Pentest Tools and Custom Payload Development
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Sat, 01 Feb 2025 09:23:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #pentest_tools #python_security #ethical_hacking #exploit_development
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Sat, 01 Feb 2025 09:23:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #pentest_tools #python_security #ethical_hacking #exploit_development
Medium
Python Cheatsheet for Exploit Frameworks: For Pentest Tools and Custom Payload Development
Introduction
⤷ Title: Python Cheatsheet for Penetration Testing: Automating Exploit Development and Reconnaissance
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:04:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #exploit_automation #penetration_testing #python_security
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:04:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #exploit_automation #penetration_testing #python_security
Medium
Python Cheatsheet for Penetration Testing: Automating Exploit Development and Reconnaissance
Introduction
⤷ Title: Python Cheatsheet for Exploit Payload Crafting: For Pentest Tools and Offensive Security
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:49:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #exploit_payloads #pentest_techniques #offensive_security #python_security
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:49:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #exploit_payloads #pentest_techniques #offensive_security #python_security
Medium
Python Cheatsheet for Exploit Payload Crafting: For Pentest Tools and Offensive Security
Introduction
⤷ Title: Python Web API 5 — Securing Your Python Web API: Authentication and Authorization Techniques
════════════════════════
𐀪 Author: Ayşe Kübra Kuyucu
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 14:02:07 GMT
════════════════════════
⌗ Tags: #api_best_practices #python_security #python_authentication #api_security #web_api_authorization
════════════════════════
𐀪 Author: Ayşe Kübra Kuyucu
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 14:02:07 GMT
════════════════════════
⌗ Tags: #api_best_practices #python_security #python_authentication #api_security #web_api_authorization
Medium
Python Web API 5 — Securing Your Python Web API: Authentication and Authorization Techniques
Web API Development with Python — Part 5/12
⤷ Title: Reinforcement Learning 20 — Securing Reinforcement Learning Systems: Best Practices in Python
════════════════════════
𐀪 Author: Ayşe Kübra Kuyucu
════════════════════════
ⴵ Time: Wed, 09 Jul 2025 00:26:02 GMT
════════════════════════
⌗ Tags: #machine_learning #best_practices #python_security #cybersecurity #reinforcement_learning
════════════════════════
𐀪 Author: Ayşe Kübra Kuyucu
════════════════════════
ⴵ Time: Wed, 09 Jul 2025 00:26:02 GMT
════════════════════════
⌗ Tags: #machine_learning #best_practices #python_security #cybersecurity #reinforcement_learning
Medium
Reinforcement Learning 20 — Securing Reinforcement Learning Systems: Best Practices in Python
Reinforcement Learning with Python — Part 20/20
⤷ Title: Secure Coding Part 8 — Command Injection Attack: Python eval()
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Wed, 06 Aug 2025 11:25:56 GMT
════════════════════════
⌗ Tags: #application_security #command_injection #web_penetration_testing #secure_coding #python_security
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Wed, 06 Aug 2025 11:25:56 GMT
════════════════════════
⌗ Tags: #application_security #command_injection #web_penetration_testing #secure_coding #python_security
Medium
Secure Coding Part 8 — Command Injection Attack: Python eval()
⭐What’s the issue?
⤷ Title: Secure Coding Part 9— Command Injection Attack: Python exec() & Seccomp to the rescue
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Mon, 11 Aug 2025 15:53:16 GMT
════════════════════════
⌗ Tags: #command_injection #application_security #seccomp #python_security #secure_coding
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Mon, 11 Aug 2025 15:53:16 GMT
════════════════════════
⌗ Tags: #command_injection #application_security #seccomp #python_security #secure_coding
Medium
Secure Coding Part 9— Command Injection Attack: Python exec() & Seccomp to the rescue
Command Injection is one of those vulnerabilities that can turn a single HTTP request into full server compromise.
⤷ Title: SQL Injection Deep Dive: Techniques, Tricks, Prevention & Python Secure Coding
════════════════════════
𐀪 Author: Vaibhav Tiwari
════════════════════════
ⴵ Time: Wed, 03 Sep 2025 08:54:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #sql_injection #python_security #secure_coding #webexploit
════════════════════════
𐀪 Author: Vaibhav Tiwari
════════════════════════
ⴵ Time: Wed, 03 Sep 2025 08:54:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #sql_injection #python_security #secure_coding #webexploit
Medium
SQL Injection Deep Dive: Techniques, Tricks, Prevention & Python Secure Coding
Hey there. If you’ve ever wondered how hackers sneak into databases through web apps or how to stop them, you’re in the right place. SQL…
⤷ Title: File Path Traversal — Why a one-pass ../ filter fails and how to fix it
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Tue, 16 Sep 2025 20:49:29 GMT
════════════════════════
⌗ Tags: #web_security #path_traversal #application_security #python_security #secure_coding
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Tue, 16 Sep 2025 20:49:29 GMT
════════════════════════
⌗ Tags: #web_security #path_traversal #application_security #python_security #secure_coding
Medium
File Path Traversal — Why a one-pass ../ filter fails and how to fix it
File Path Traversal — Why a one-pass ../ filter fails and how to fix it Many apps try to block path traversal by removing the literal substring ../ from user input. That one-line blacklist is …
⤷ Title: A Practical Guide to Server-Side Template Injection (SSTI)
════════════════════════
𐀪 Author: Redfox Security
════════════════════════
ⴵ Time: Sat, 29 Nov 2025 09:06:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #web_security #web_development #python_security
════════════════════════
𐀪 Author: Redfox Security
════════════════════════
ⴵ Time: Sat, 29 Nov 2025 09:06:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #web_security #web_development #python_security
Medium
A Practical Guide to Server-Side Template Injection (SSTI)
Template engines streamline modern web development by allowing developers to embed dynamic data directly into HTML or other output formats…
⤷ Title: The “lc” Leak: Critical 9.3 Severity LangChain Flaw Turns Prompt Injections into Secret Theft
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 25 Dec 2025 00:22:06 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI Agents #CVE_2025_68664 #data exfiltration #Environment Variables #Information Disclosure #LangChain #LLM Security #Prompt injection #Python Security #Serialization Injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 25 Dec 2025 00:22:06 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI Agents #CVE_2025_68664 #data exfiltration #Environment Variables #Information Disclosure #LangChain #LLM Security #Prompt injection #Python Security #Serialization Injection
Daily CyberSecurity
The "lc" Leak: Critical 9.3 Severity LangChain Flaw Turns Prompt Injections into Secret Theft
LangChain patches a critical 9.3 CVSS flaw (CVE-2025-68664) where unescaped "lc" keys allow attackers to steal API secrets via prompt injection.
⤷ Title: n8n Sandbox Escape: How CVE-2025-68668 Turns Workflows into Weapons
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 06 Jan 2026 09:44:11 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2025_68668 #DevSecOps #n8n #Pyodide #Python Security #rce #Sandbox Escape #Vulnerability Analysis #Workflow Automation
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 06 Jan 2026 09:44:11 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2025_68668 #DevSecOps #n8n #Pyodide #Python Security #rce #Sandbox Escape #Vulnerability Analysis #Workflow Automation
Daily CyberSecurity
n8n Sandbox Escape: How CVE-2025-68668 Turns Workflows into Weapons
CVE-2025-68668: A critical n8n flaw lets attackers escape the Python sandbox for full RCE. Learn how this bridge failure leads to total system compromise.
⤷ Title: CVE-2025-14026: Forcepoint DLP Flaw Lets Attackers Unchain Restricted Python
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 07 Jan 2026 01:53:23 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Arbitrary Code Execution #CERT/CC #CVE_2025_14026 #DLP (Data Loss Prevention) #Enterprise Security #Forcepoint #Python Security #Sandbox Escape
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 07 Jan 2026 01:53:23 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Arbitrary Code Execution #CERT/CC #CVE_2025_14026 #DLP (Data Loss Prevention) #Enterprise Security #Forcepoint #Python Security #Sandbox Escape
Daily CyberSecurity
CVE-2025-14026: Forcepoint DLP Flaw Lets Attackers Unchain Restricted Python
CVE-2025-14026: Attackers can reconstruct a crippled Python runtime in Forcepoint DLP to execute arbitrary code. Update now to remove the vulnerability.