⤷ Title: Creating a Code Obfuscation Program For C
════════════════════════
𐀪 Author: Aleksa Zatezalo
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:55 GMT
════════════════════════
⌗ Tags: #hacking #c #python #code_obfuscation
════════════════════════
𐀪 Author: Aleksa Zatezalo
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:55 GMT
════════════════════════
⌗ Tags: #hacking #c #python #code_obfuscation
Medium
Creating a Code Obfuscation Program For C
Imagine you’re trying to sneak past a security guard. If you walk right up wearing a mask and carrying suspicious stuff, you’ll get caught…
⤷ Title: Understanding XSS (Cross-Site Scripting) — A Complete Guide
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:12:54 GMT
════════════════════════
⌗ Tags: #cross_site_scripting #bugbounty_writeup #xss_attack #hacking #bug_bounty_tips
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:12:54 GMT
════════════════════════
⌗ Tags: #cross_site_scripting #bugbounty_writeup #xss_attack #hacking #bug_bounty_tips
Medium
Understanding XSS (Cross-Site Scripting) — A Complete Guide
Hello! My name is XABIT, and I am an ethical hacker and part-time bug bounty hunter. In this write-up, I will teach you everything about…
⤷ Title: Do you want to ?
════════════════════════
𐀪 Author: Horizon Secured
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:41:05 GMT
════════════════════════
⌗ Tags: #windows_security #active_directory_security #cybersecurity #windows #active_directory
════════════════════════
𐀪 Author: Horizon Secured
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:41:05 GMT
════════════════════════
⌗ Tags: #windows_security #active_directory_security #cybersecurity #windows #active_directory
Medium
Do you want to 𝗱𝗶𝘀𝗮𝗯𝗹𝗲 𝗥𝗖𝟰 𝗶𝗻 𝘆𝗼𝘂𝗿 𝗱𝗼𝗺𝗮𝗶𝗻?
You definitely should!
⤷ Title: Ransomware vs Malware: What’s the Difference?
════════════════════════
𐀪 Author: Hamza Hanif
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:36:30 GMT
════════════════════════
⌗ Tags: #cyberattack #cybercrime #ransomeware #malware #cybersecurity
════════════════════════
𐀪 Author: Hamza Hanif
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:36:30 GMT
════════════════════════
⌗ Tags: #cyberattack #cybercrime #ransomeware #malware #cybersecurity
Medium
Ransomware vs Malware: What’s the Difference?
In the ever-evolving landscape of cybersecurity, understanding the difference between ransomware and malware is crucial for protecting your…
⤷ Title: Nmap as an active reconnaissance technique
════════════════════════
𐀪 Author: Supun Pramuditha Jayawardhana
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:27:00 GMT
════════════════════════
⌗ Tags: #ubuntu #nmap #linux #cybersecurity
════════════════════════
𐀪 Author: Supun Pramuditha Jayawardhana
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:27:00 GMT
════════════════════════
⌗ Tags: #ubuntu #nmap #linux #cybersecurity
Medium
Nmap as an active reconnaissance technique
Nmap (“Network Mapper”) is a powerful linux command-line tool that is widely used to scan IP addresses, ports and services used by devices…
⤷ Title: Best Cyber Security Certifications for Beginners In 2025
════════════════════════
𐀪 Author: Craw Security
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:26:05 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #cybersecurity_course #ethical_hacking #cyber_security_services
════════════════════════
𐀪 Author: Craw Security
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:26:05 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #cybersecurity_course #ethical_hacking #cyber_security_services
Medium
Best Cyber Security Certifications for Beginners In 2025
Introduction
⤷ Title: HACKER 4 HIRE IS LEGIT This is the best/top professionals hacker for all hacking related issues(…
════════════════════════
𐀪 Author: Madison Wright
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:22:55 GMT
════════════════════════
⌗ Tags: #technology #programming #data_science #true_crime #cybersecurity
════════════════════════
𐀪 Author: Madison Wright
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:22:55 GMT
════════════════════════
⌗ Tags: #technology #programming #data_science #true_crime #cybersecurity
Medium
HACKER 4 HIRE IS LEGIT This is the best/top professionals hacker for all hacking related issues(…
-Social media Hacking & Recovery.
⤷ Title: सोशल मीडिया पर फूहड़तापन समय रैना और रणवीर इलाहाबादिया
════════════════════════
𐀪 Author: Ravish yadav
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:21:23 GMT
════════════════════════
⌗ Tags: #medium #psychology #justice #cybersecurity #deep_learning
════════════════════════
𐀪 Author: Ravish yadav
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:21:23 GMT
════════════════════════
⌗ Tags: #medium #psychology #justice #cybersecurity #deep_learning
Medium
सोशल मीडिया पर फूहड़तापन समय रैना और रणवीर इलाहाबादिया
समय रैना और रणवीर इलाहाबादिया के शो इंडियाज गॉट लेटेंट पर अश्लील भाषा और बेहूदा कंटेंट को लेकर विवाद खड़ा हो चुका है। इन दोनों पर आईपीसी की धारा 294 और आईटी एक्ट की धारा 67 के तहत एफआईआर दर्ज की गई…
⤷ Title: The “Exam: 312–50 CEHv12-Certified Ethical Hacker: +1000 Exam Practice Questions with Detailed…
════════════════════════
𐀪 Author: james William
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:10 GMT
════════════════════════
⌗ Tags: #education #cybersecurity
════════════════════════
𐀪 Author: james William
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:10 GMT
════════════════════════
⌗ Tags: #education #cybersecurity
Medium
The “Exam: 312–50 CEHv12-Certified Ethical Hacker: +1000 Exam Practice Questions with Detailed…
cybersecurity, Ethical hacker
⤷ Title: How to Prevent HTTP Parameter Pollution in Laravel: Best Practices & Code Examples
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:00:34 GMT
════════════════════════
⌗ Tags: #cybersecurity #laravel #http_parameter_pollution #penetration_testing #vulnerability
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:00:34 GMT
════════════════════════
⌗ Tags: #cybersecurity #laravel #http_parameter_pollution #penetration_testing #vulnerability
Medium
How to Prevent HTTP Parameter Pollution in Laravel: Best Practices & Code Examples
Introduction
⤷ Title: HTTP in detail — TryHackMe
════════════════════════
𐀪 Author: Avinash Nirmalkar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:23:30 GMT
════════════════════════
⌗ Tags: #networking #tryhackme #cybersecurity #tryhackme_walkthrough
════════════════════════
𐀪 Author: Avinash Nirmalkar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:23:30 GMT
════════════════════════
⌗ Tags: #networking #tryhackme #cybersecurity #tryhackme_walkthrough
Medium
HTTP in detail — TryHackMe
The internet is a vast and complex world, but at its heart lies a simple yet powerful language: HTTP. It’s the secret handshake between…
⤷ Title: 8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 12:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 12:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Gcore Radar report reveals 56% year-on-year increase in DDoS attacks
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:00:28 +0000
════════════════════════
⌗ Tags: #Press Release #Breach and Attack #Report #Research
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:00:28 +0000
════════════════════════
⌗ Tags: #Press Release #Breach and Attack #Report #Research
Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
Gcore Radar report reveals 56% year-on-year increase in DDoS attacks
Luxembourg, Luxembourg, 11th February 2025, CyberNewsWire
⤷ Title: SAP Security Patch Day February 2025: Multi Vulnerabilities Addressed
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:33:52 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2024_38819 #CVE_2024_38820 #CVE_2024_38828 #CVE_2025_0064 #CVE_2025_24876 #CVE_2025_25243 #SAP Security Patch Day
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:33:52 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2024_38819 #CVE_2024_38820 #CVE_2024_38828 #CVE_2025_0064 #CVE_2025_24876 #CVE_2025_25243 #SAP Security Patch Day
Cybersecurity News
SAP Security Patch Day February 2025: Multi Vulnerabilities Addressed
Discover the critical security vulnerabilities addressed in the latest SAP Patch Day. Take action to protect your SAP systems from CVE-2025-0064 and other high-severity flaws.
⤷ Title: Robust Open Online Safety Tools (ROOST): Tech Giants Unite to Build AI-Era Security Infrastructure
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:23:38 +0000
════════════════════════
⌗ Tags: #Technology #Discord #google #OpenAI #Roblox #Robust Open Online Safety Tools #ROOST
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:23:38 +0000
════════════════════════
⌗ Tags: #Technology #Discord #google #OpenAI #Roblox #Robust Open Online Safety Tools #ROOST
Cybersecurity News
Robust Open Online Safety Tools (ROOST): Tech Giants Unite to Build AI-Era Security Infrastructure
Learn about ROOST, the non-profit organization formed by Roblox, Discord, OpenAI, and Google to develop advanced open-source security tools for a safer online environment, particularly for children.
⤷ Title: HTB: Preignition Walkthrough
════════════════════════
𐀪 Author: Araiz Naqvi
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:09:52 GMT
════════════════════════
⌗ Tags: #pentesting #cybersecurity #hackthebox #ethical_hacking #hacking
════════════════════════
𐀪 Author: Araiz Naqvi
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:09:52 GMT
════════════════════════
⌗ Tags: #pentesting #cybersecurity #hackthebox #ethical_hacking #hacking
Medium
HTB: Preignition Walkthrough
Prepared By Araiz Naqvi. In case you’re not able to view the entire writeup, visit my personal blog here to view it fully.
⤷ Title: Exploiting UART to Gain Shell Access on a Security Camera
════════════════════════
𐀪 Author: Horrow
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:16:32 GMT
════════════════════════
⌗ Tags: #hardware #cybersecurity #uart #hardware_hacking #hacking
════════════════════════
𐀪 Author: Horrow
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:16:32 GMT
════════════════════════
⌗ Tags: #hardware #cybersecurity #uart #hardware_hacking #hacking
Medium
Exploiting UART to Gain Shell Access on a Security Camera
Serial communication interfaces like UART (Universal Asynchronous Receiver-Transmitter) are often overlooked attack surfaces in embedded…
⤷ Title: HackTheBox Spookifier Writeup | SSTI Exploit Explained
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:16:08 GMT
════════════════════════
⌗ Tags: #hackthebox #cybersecurity #hackthebox_writeup #hacking #infosec
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:16:08 GMT
════════════════════════
⌗ Tags: #hackthebox #cybersecurity #hackthebox_writeup #hacking #infosec
Medium
HackTheBox Spookifier Writeup | SSTI Exploit Explained
Introduction
⤷ Title: Securing the Future: A&Q’s Hybrid Network Transition
════════════════════════
𐀪 Author: Joanorifha
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:27:51 GMT
════════════════════════
⌗ Tags: #network_security #cybersecurity #network
════════════════════════
𐀪 Author: Joanorifha
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:27:51 GMT
════════════════════════
⌗ Tags: #network_security #cybersecurity #network
Medium
Securing the Future: A&Q’s Hybrid Network Transition
As the world increasingly becomes a global marketplace, many organizations are transitioning from on-premise systems to the cloud. The need…
⤷ Title: Beware of IDN homograph attacks: A Deceptive trick that can trap you
════════════════════════
𐀪 Author: zen8labs
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:25:27 GMT
════════════════════════
⌗ Tags: #idn #cybersecurity #idn_homograph #it_consulting #zen8labs
════════════════════════
𐀪 Author: zen8labs
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:25:27 GMT
════════════════════════
⌗ Tags: #idn #cybersecurity #idn_homograph #it_consulting #zen8labs
Medium
Beware of IDN homograph attacks: A Deceptive trick that can trap you
Do you know what an IDN is or how it can attack your data? Here is the chance to understand IDNs in greater detail
⤷ Title: Simulation and Testing of Autonomous Cybersecurity Systems: Methodologies for Simulating…
════════════════════════
𐀪 Author: Anahita Tasdighi
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:16:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #python #technology #space #javascript
════════════════════════
𐀪 Author: Anahita Tasdighi
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:16:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #python #technology #space #javascript
Medium
Simulation and Testing of Autonomous Cybersecurity Systems: Methodologies for Simulating…
Simulation and Testing of Autonomous Cybersecurity Systems: Methodologies for Simulating Cyber-Attacks in Space to Test Effectiveness and Human Interactions