⤷ Title: Automated Pen Testing: Writing Custom Burp Extensions with Python and Jython
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 19:50:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #automation #python #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 19:50:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #automation #python #penetration_testing #bug_bounty
Medium
Automated Pen Testing: Writing Custom Burp Extensions with Python and Jython
If you do any serious bug bounty hunting or penetration testing, you already know the pain. You end up clicking through the exact same…
⤷ Title: The Church of Malware Presents: The Most Braindead Python Botnet We’ve Ever Seen
════════════════════════
𐀪 Author: ekomsSavior
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 23:40:21 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #infosec #hacker #malware
════════════════════════
𐀪 Author: ekomsSavior
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 23:40:21 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #infosec #hacker #malware
Medium
The Church of Malware Presents: The Most Braindead Python Botnet We’ve Ever Seen
┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼
┼┼┼┼┼┼┼┼██┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼██┼┼┼┼┼┼┼┼┼
┼┼┼┼┼┼████▄┼┼┼▄▄▄▄▄▄▄┼┼┼▄████┼┼┼┼┼┼┼…
┼┼┼┼┼┼┼┼██┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼██┼┼┼┼┼┼┼┼┼
┼┼┼┼┼┼████▄┼┼┼▄▄▄▄▄▄▄┼┼┼▄████┼┼┼┼┼┼┼…
⤷ Title: Automated Pen Testing Writing Custom Burp Extensions with Python and Jython
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 19:50:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #automation #python #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 19:50:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #automation #python #penetration_testing #bug_bounty
Medium
Automated Pen Testing: Writing Custom Burp Extensions with Python and Jython
If you do any serious bug bounty hunting or penetration testing, you already know the pain. You end up clicking through the exact same…
⤷ Title: Learn Cybersecurity Like a Pro in 2026
════════════════════════
𐀪 Author: fsocietyhub
════════════════════════
ⴵ Time: Wed, 15 Apr 2026 10:58:12 GMT
════════════════════════
⌗ Tags: #hacking #docker #cybersecurity #python #automation
════════════════════════
𐀪 Author: fsocietyhub
════════════════════════
ⴵ Time: Wed, 15 Apr 2026 10:58:12 GMT
════════════════════════
⌗ Tags: #hacking #docker #cybersecurity #python #automation
Medium
Learn Cybersecurity Like a Pro in 2026
Creating Your Individual Knowledge Base
⤷ Title: VIPERTUNNEL Hijacks Python for Stealthy Ransomware Access
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 16 Apr 2026 07:16:49 +0000
════════════════════════
⌗ Tags: #Malware #Base85 Obfuscation #cybersecurity #DragonForce Ransomware #EvilCorp #infosec #Malware Analysis #Python backdoor #sitecustomize.py #SOCKS5 Proxy #UNC2165 #VIPERTUNNEL
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 16 Apr 2026 07:16:49 +0000
════════════════════════
⌗ Tags: #Malware #Base85 Obfuscation #cybersecurity #DragonForce Ransomware #EvilCorp #infosec #Malware Analysis #Python backdoor #sitecustomize.py #SOCKS5 Proxy #UNC2165 #VIPERTUNNEL
Daily CyberSecurity
VIPERTUNNEL Hijacks Python for Stealthy Ransomware Access
InfoGuard unmasks VIPERTUNNEL, a Python backdoor using sitecustomize.py for stealthy persistence in DragonForce ransomware attacks. Learn how to detect it.
⤷ Title: Bypassing 2FA: How a Flawed SSO Architecture Led to Complete Account Takeover
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Thu, 16 Apr 2026 07:15:25 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #bug_bounty #software_development
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Thu, 16 Apr 2026 07:15:25 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #bug_bounty #software_development
Medium
Bypassing 2FA: How a Flawed SSO Architecture Led to Complete Account Takeover
It started as a standard assessment. The target was a primary web portal tightly coupled with a secondary dashboard via Single Sign-On…
⤷ Title: How Drowning in Windows Event Logs Made Me Build My Own Threat-Hunting CLI
════════════════════════
𐀪 Author: judeh0747
════════════════════════
ⴵ Time: Fri, 17 Apr 2026 15:55:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #python
════════════════════════
𐀪 Author: judeh0747
════════════════════════
ⴵ Time: Fri, 17 Apr 2026 15:55:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #python
Medium
How Drowning in Windows Event Logs Made Me Build My Own Threat-Hunting CLI
The first time I tried to run a real incident-response exercise in my lab, I pulled an EVTX file off a compromised VM, opened it in Event…
⤷ Title: TryHackMe | OWASP Top 10 2025: Insecure Data Handling
════════════════════════
𐀪 Author: BitsAndBreaches
════════════════════════
ⴵ Time: Fri, 17 Apr 2026 15:24:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #owasp #web_development #python #tryhackme
════════════════════════
𐀪 Author: BitsAndBreaches
════════════════════════
ⴵ Time: Fri, 17 Apr 2026 15:24:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #owasp #web_development #python #tryhackme
Medium
TryHackMe | OWASP Top 10 2025: Insecure Data Handling
Room Link: https://tryhackme.com/room/owasptopten2025three
⤷ Title: Stop Chasing False Positives: How I Built TokenSpot to Validate API Keys in Real-Time
════════════════════════
𐀪 Author: Sahal
════════════════════════
ⴵ Time: Fri, 17 Apr 2026 20:04:31 GMT
════════════════════════
⌗ Tags: #open_source #api_security #python #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Sahal
════════════════════════
ⴵ Time: Fri, 17 Apr 2026 20:04:31 GMT
════════════════════════
⌗ Tags: #open_source #api_security #python #bug_bounty #cybersecurity
Medium
Stop Chasing False Positives: How I Built TokenSpot to Validate API Keys in Real-Time
From bug hunter frustration to open-source tool — a journey in solving the API key validation problem
⤷ Title: I Automated the Passive Reconnaissance Process I Learned in Class
════════════════════════
𐀪 Author: Angle Gray
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:26:17 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #reconnaissance #ethical_hacking #information_security
════════════════════════
𐀪 Author: Angle Gray
════════════════════════
ⴵ Time: Sat, 18 Apr 2026 20:26:17 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #reconnaissance #ethical_hacking #information_security
Medium
I Automated the Passive Reconnaissance Process I Learned in Class
In one of my modules, my lecturer introduced us to passive reconnaissance. The process involved manually running WHOIS lookups, checking…