⤷ Title: Darkhole 1: Full Compromise
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 11:35:39 GMT
════════════════════════
⌗ Tags: #vulnerable_vm #vulnhub_writeup #vulnhub_walkthrough #cybersecurity
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 11:35:39 GMT
════════════════════════
⌗ Tags: #vulnerable_vm #vulnhub_writeup #vulnhub_walkthrough #cybersecurity
Medium
Darkhole 1: Full Compromise
A quiet profile update and a lax file‑upload rule opened a path from a standard user to admin and then to full system control. This writeup…
⤷ Title: Becoming Nyells: The Girl Who Chose Code, Creativity & Cybersecurity
════════════════════════
𐀪 Author: Nyelliembu
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 11:32:33 GMT
════════════════════════
⌗ Tags: #web_development #cybersecurity #self_improvement #web_design #learning
════════════════════════
𐀪 Author: Nyelliembu
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 11:32:33 GMT
════════════════════════
⌗ Tags: #web_development #cybersecurity #self_improvement #web_design #learning
Medium
Becoming Nyells: The Girl Who Chose Code, Creativity & Cybersecurity
There was a time I thought tech was only for people who spoke in algorithms and wore hoodies that said root access granted. I was wrong.
⤷ Title: AD Labs: From Domain-Joined Linux to Compromised DC(AD CS)
════════════════════════
𐀪 Author: Hishamrazak
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 11:22:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #active_directory #red_team #penetration_testing
════════════════════════
𐀪 Author: Hishamrazak
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 11:22:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #active_directory #red_team #penetration_testing
Medium
AD Labs: From Domain-Joined Linux to Compromised DC(AD CS)
Here for the attacking environment i’m using one of the labs from vulnlab(Hybrid)
⤷ Title: A Case Study in Digital Forensics | TryHackMe CRM Snatch
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 11:48:35 GMT
════════════════════════
⌗ Tags: #digital_forensics #tryhackme_writeup #tryhackme_walkthrough #forensics #tryhackme
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 11:48:35 GMT
════════════════════════
⌗ Tags: #digital_forensics #tryhackme_writeup #tryhackme_walkthrough #forensics #tryhackme
Medium
A Case Study in Digital Forensics | TryHackMe CRM Snatch
Intro
⤷ Title: Unlocking the Hacker’s Arsenal: A Deep Dive into the IHA089 Cybersecurity Toolkit (2025)
════════════════════════
𐀪 Author: Nktechinfo
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:32:00 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #technology #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Nktechinfo
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:32:00 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #technology #cybersecurity #bug_bounty
Medium
Unlocking the Hacker’s Arsenal: A Deep Dive into the IHA089 Cybersecurity Toolkit (2025)
Introduction
⤷ Title: OWASP Top 10 2025 in a Nutshell
════════════════════════
𐀪 Author: PARADOX
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:05:04 GMT
════════════════════════
⌗ Tags: #hacking #penetration_testing #cybersecurity #software_development #bug_bounty
════════════════════════
𐀪 Author: PARADOX
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:05:04 GMT
════════════════════════
⌗ Tags: #hacking #penetration_testing #cybersecurity #software_development #bug_bounty
Medium
OWASP Top 10 2025 in a Nutshell
Hey there, back again with another post! 😄
⤷ Title: Full Attack Chain: How Chained IDORs on Thrive Global Exposed Confidential Employee Wellness data
════════════════════════
𐀪 Author: Mayur Pandya
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:03:33 GMT
════════════════════════
⌗ Tags: #idor #api_security #bug_bounty_tips #bug_bounty #graphql
════════════════════════
𐀪 Author: Mayur Pandya
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:03:33 GMT
════════════════════════
⌗ Tags: #idor #api_security #bug_bounty_tips #bug_bounty #graphql
Medium
Full Attack Chain: How Chained IDORs on Thrive Global Exposed Confidential Employee Wellness and Engagement Data of Microsoft,…
Introduction
⤷ Title: Self Proccess Injection With CPP
════════════════════════
𐀪 Author: 0xc4t
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:44:31 GMT
════════════════════════
⌗ Tags: #process_injection #malware #red_team #hacking #code_injection
════════════════════════
𐀪 Author: 0xc4t
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:44:31 GMT
════════════════════════
⌗ Tags: #process_injection #malware #red_team #hacking #code_injection
Medium
Self Proccess Injection With CPP
Self process injection occurs when a program loads or executes a malicious payload in its own address space (rather than writing to or…
⤷ Title: How To Detect When Cellphone/Smartphone is Hacked | Professional Hacking Services
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:17:47 GMT
════════════════════════
⌗ Tags: #hacking #android #apple #ios #technology
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:17:47 GMT
════════════════════════
⌗ Tags: #hacking #android #apple #ios #technology
Medium
How To Detect When Cellphone/Smartphone is Hacked | Professional Hacking Services
How To Detect When Cellphone/Smartphone is Hacked | Professional Hacking Services introduction A cellphone, or mobile phone, is a portable electronic device used for communication over a network. It …
⤷ Title: I Got A Phishing Email From ‘Substack’ And I Totally Fell For It
════════════════════════
𐀪 Author: MianAbdul Manan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:01:33 GMT
════════════════════════
⌗ Tags: #substack #phishing #this_happened_to_me #hacking #writing
════════════════════════
𐀪 Author: MianAbdul Manan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:01:33 GMT
════════════════════════
⌗ Tags: #substack #phishing #this_happened_to_me #hacking #writing
Medium
I Got A Phishing Email From ‘Substack’ And I Totally Fell For It
Here’s What I Learned
⤷ Title: North Korean Hackers’ Choice Weapon: Western AI
════════════════════════
𐀪 Author: Perry Choi
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:59:51 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #cybersecurity #north_korean_hacker #cryptocurrency
════════════════════════
𐀪 Author: Perry Choi
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:59:51 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #cybersecurity #north_korean_hacker #cryptocurrency
Medium
North Korean Hackers’ Choice Weapon: Western AI
I remember vividly when a recruiter mentioned the strangest résumé she’d ever seen. It wasn’t sloppy or suspicious — it was too good…
⤷ Title: Mock Interview Questions For Penetration Testing Role
════════════════════════
𐀪 Author: The Daily Cyber News
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:44:34 GMT
════════════════════════
⌗ Tags: #pentesting #hacker #penetration_testing #hacking #cybersecurity
════════════════════════
𐀪 Author: The Daily Cyber News
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:44:34 GMT
════════════════════════
⌗ Tags: #pentesting #hacker #penetration_testing #hacking #cybersecurity
Medium
Mock Interview Questions For Penetration Testing Role
Mock Interview Questions for Penetration Testing Roles (and How Not to Panic During Them)
⤷ Title: 11 Game-Changing Tips: College Student Online Safety & Password Secrets
════════════════════════
𐀪 Author: Chaos Engineer
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:32:00 GMT
════════════════════════
⌗ Tags: #safety #hacking #students #college #technology
════════════════════════
𐀪 Author: Chaos Engineer
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:32:00 GMT
════════════════════════
⌗ Tags: #safety #hacking #students #college #technology
Medium
11 Game-Changing Tips: College Student Online Safety & Password Secrets
Secure your dorm Wi-Fi and accounts. Master password protection and anti-phishing in minutes.
⤷ Title: Hacking, VM, Linux and Networking Introduction
════════════════════════
𐀪 Author: Sobhidasss
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:21:47 GMT
════════════════════════
⌗ Tags: #hacking #networking #computer_science
════════════════════════
𐀪 Author: Sobhidasss
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:21:47 GMT
════════════════════════
⌗ Tags: #hacking #networking #computer_science
Medium
Hacking, VM, Linux and Networking Introduction
Hacking:
⤷ Title: PortSwigger : Authentication vulnerabilities labs
════════════════════════
𐀪 Author: Abdelhamid Elbouz
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:14:51 GMT
════════════════════════
⌗ Tags: #portswigger #authentication #penetration_testing #cybersecurity #hacking
════════════════════════
𐀪 Author: Abdelhamid Elbouz
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:14:51 GMT
════════════════════════
⌗ Tags: #portswigger #authentication #penetration_testing #cybersecurity #hacking
Medium
PortSwigger : Authentication vulnerabilities labs
Vulnerabilities in other authentication mechanisms
⤷ Title: How Hackers Use Steam Games to Empty Your Bitcoin Wallet
════════════════════════
𐀪 Author: LearnWithMe
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 11:54:35 GMT
════════════════════════
⌗ Tags: #games #hacking #cryptocurrency
════════════════════════
𐀪 Author: LearnWithMe
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 11:54:35 GMT
════════════════════════
⌗ Tags: #games #hacking #cryptocurrency
Medium
How Hackers Use Steam Games to Empty Your Bitcoin Wallet
You fire up a new $5 indie on Steam. Fifteen minutes later, your hot wallet is empty.
⤷ Title: From MSP to Federal Cloud: Why Zero Breaches Matter More Than Certifications
════════════════════════
𐀪 Author: Joshua Michael Hall
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:25:30 GMT
════════════════════════
⌗ Tags: #federal_contracting #infosec #cloud_security #msp #cybersecurity
════════════════════════
𐀪 Author: Joshua Michael Hall
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:25:30 GMT
════════════════════════
⌗ Tags: #federal_contracting #infosec #cloud_security #msp #cybersecurity
Medium
From MSP to Federal Cloud: Why Zero Breaches Matter More Than Certifications
Real security isn’t about preventing the first breach — it’s about being the one who gets called after everyone else failed
⤷ Title: How to hire a professional hacker
════════════════════════
𐀪 Author: Paul Micheal
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:22:17 GMT
════════════════════════
⌗ Tags: #encryption #infosec #data_security #passwords
════════════════════════
𐀪 Author: Paul Micheal
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 12:22:17 GMT
════════════════════════
⌗ Tags: #encryption #infosec #data_security #passwords
Medium
How to hire a professional hacker
Hiring a professional hacker can be a daunting task, especially if you don’t know where to start.
⤷ Title: Audit Escape CyCTF2025
════════════════════════
𐀪 Author: Mohamed Ashraf (LΔzΔru$)
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:33:00 GMT
════════════════════════
⌗ Tags: #ctf_writeup #pentesting #cybersecurity
════════════════════════
𐀪 Author: Mohamed Ashraf (LΔzΔru$)
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:33:00 GMT
════════════════════════
⌗ Tags: #ctf_writeup #pentesting #cybersecurity
Medium
Audit Escape CyCTF2025
Investigating a Cron job running with root privileges
⤷ Title: The Digital Passport Problem: Certificates, CAs, and Common Issues Explained
════════════════════════
𐀪 Author: Arfat Khan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:23:22 GMT
════════════════════════
⌗ Tags: #information_security #ethical_hacking #ssl_certificate #networking #cybersecurity
════════════════════════
𐀪 Author: Arfat Khan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:23:22 GMT
════════════════════════
⌗ Tags: #information_security #ethical_hacking #ssl_certificate #networking #cybersecurity
Medium
The Digital Passport Problem: Certificates, CAs, and Common Issues Explained
Hello everyone! My name is Arfat Khan, and I run a YouTube channel called Arfi Tutorials. I am a bug bounty hunter, penetration tester, and…
⤷ Title: The Factory That Froze
════════════════════════
𐀪 Author: O. J. Okpabi
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:21:55 GMT
════════════════════════
⌗ Tags: #true_crime #cybersecurity #artificial_intelligence #business #technology
════════════════════════
𐀪 Author: O. J. Okpabi
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 13:21:55 GMT
════════════════════════
⌗ Tags: #true_crime #cybersecurity #artificial_intelligence #business #technology
Medium
The Factory That Froze
Ransomware Surge In Industrial Systems