⤷ Title: Marimo Pre-Auth RCE (CVE-2026–39987 / GHSA-2679–6mx9-h9xc): From One WebSocket to Shell
════════════════════════
𐀪 Author: Lakshan Sameera
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 13:31:02 GMT
════════════════════════
⌗ Tags: #marimo #cve_2026_39987 #python_notebook #poc #rce_vulnerability
════════════════════════
𐀪 Author: Lakshan Sameera
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 13:31:02 GMT
════════════════════════
⌗ Tags: #marimo #cve_2026_39987 #python_notebook #poc #rce_vulnerability
Medium
Marimo Pre-Auth RCE (CVE-2026–39987 / GHSA-2679–6mx9-h9xc): From One WebSocket to Shell
Marimo Pre-Auth RCE (CVE-2026–39987 / GHSA-2679–6mx9-h9xc): From One WebSocket to Shell A step-by-step reproduction using a custom Dockerfile + reliable PoC. All testing done in my isolated …
⤷ Title: Bug Bounty 101.1 — Building a Basic Recon Logger in Python
════════════════════════
𐀪 Author: Johnny Meintel
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 17:31:06 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Johnny Meintel
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 17:31:06 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #bug_bounty
Medium
Bug Bounty 101.1 — Building a Basic Recon Logger in Python
Cybersecurity is dead, long live cybersecurity. Vibe coding is all the rage, and security work is not withheld from this dynamic. You can’t…
⤷ Title: The 98% Accuracy Lie: Why I Stopped Trusting Cybersecurity Datasets and Started Building My Own
════════════════════════
𐀪 Author: Hamza Sajid
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 17:12:11 GMT
════════════════════════
⌗ Tags: #security #python #cybersecurity #information_security #hacking
════════════════════════
𐀪 Author: Hamza Sajid
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 17:12:11 GMT
════════════════════════
⌗ Tags: #security #python #cybersecurity #information_security #hacking
Medium
The 98% Accuracy Lie: Why I Stopped Trusting Cybersecurity Datasets and Started Building My Own
I recently decided to build an Intrusion Detection System (IDS). My goal? To build a system that could detect all cyber attacks.
⤷ Title: Automated Pen Testing: Writing Custom Burp Extensions with Python and Jython
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 19:50:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #automation #python #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 19:50:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #automation #python #penetration_testing #bug_bounty
Medium
Automated Pen Testing: Writing Custom Burp Extensions with Python and Jython
If you do any serious bug bounty hunting or penetration testing, you already know the pain. You end up clicking through the exact same…
⤷ Title: The Church of Malware Presents: The Most Braindead Python Botnet We’ve Ever Seen
════════════════════════
𐀪 Author: ekomsSavior
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 23:40:21 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #infosec #hacker #malware
════════════════════════
𐀪 Author: ekomsSavior
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 23:40:21 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #infosec #hacker #malware
Medium
The Church of Malware Presents: The Most Braindead Python Botnet We’ve Ever Seen
┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼
┼┼┼┼┼┼┼┼██┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼██┼┼┼┼┼┼┼┼┼
┼┼┼┼┼┼████▄┼┼┼▄▄▄▄▄▄▄┼┼┼▄████┼┼┼┼┼┼┼…
┼┼┼┼┼┼┼┼██┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼██┼┼┼┼┼┼┼┼┼
┼┼┼┼┼┼████▄┼┼┼▄▄▄▄▄▄▄┼┼┼▄████┼┼┼┼┼┼┼…
⤷ Title: Automated Pen Testing Writing Custom Burp Extensions with Python and Jython
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 19:50:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #automation #python #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 19:50:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #automation #python #penetration_testing #bug_bounty
Medium
Automated Pen Testing: Writing Custom Burp Extensions with Python and Jython
If you do any serious bug bounty hunting or penetration testing, you already know the pain. You end up clicking through the exact same…
⤷ Title: Learn Cybersecurity Like a Pro in 2026
════════════════════════
𐀪 Author: fsocietyhub
════════════════════════
ⴵ Time: Wed, 15 Apr 2026 10:58:12 GMT
════════════════════════
⌗ Tags: #hacking #docker #cybersecurity #python #automation
════════════════════════
𐀪 Author: fsocietyhub
════════════════════════
ⴵ Time: Wed, 15 Apr 2026 10:58:12 GMT
════════════════════════
⌗ Tags: #hacking #docker #cybersecurity #python #automation
Medium
Learn Cybersecurity Like a Pro in 2026
Creating Your Individual Knowledge Base
⤷ Title: VIPERTUNNEL Hijacks Python for Stealthy Ransomware Access
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 16 Apr 2026 07:16:49 +0000
════════════════════════
⌗ Tags: #Malware #Base85 Obfuscation #cybersecurity #DragonForce Ransomware #EvilCorp #infosec #Malware Analysis #Python backdoor #sitecustomize.py #SOCKS5 Proxy #UNC2165 #VIPERTUNNEL
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 16 Apr 2026 07:16:49 +0000
════════════════════════
⌗ Tags: #Malware #Base85 Obfuscation #cybersecurity #DragonForce Ransomware #EvilCorp #infosec #Malware Analysis #Python backdoor #sitecustomize.py #SOCKS5 Proxy #UNC2165 #VIPERTUNNEL
Daily CyberSecurity
VIPERTUNNEL Hijacks Python for Stealthy Ransomware Access
InfoGuard unmasks VIPERTUNNEL, a Python backdoor using sitecustomize.py for stealthy persistence in DragonForce ransomware attacks. Learn how to detect it.
⤷ Title: Bypassing 2FA: How a Flawed SSO Architecture Led to Complete Account Takeover
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Thu, 16 Apr 2026 07:15:25 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #bug_bounty #software_development
════════════════════════
𐀪 Author: Shreyash Mall
════════════════════════
ⴵ Time: Thu, 16 Apr 2026 07:15:25 GMT
════════════════════════
⌗ Tags: #python #cybersecurity #bug_bounty #software_development
Medium
Bypassing 2FA: How a Flawed SSO Architecture Led to Complete Account Takeover
It started as a standard assessment. The target was a primary web portal tightly coupled with a secondary dashboard via Single Sign-On…
⤷ Title: How Drowning in Windows Event Logs Made Me Build My Own Threat-Hunting CLI
════════════════════════
𐀪 Author: judeh0747
════════════════════════
ⴵ Time: Fri, 17 Apr 2026 15:55:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #python
════════════════════════
𐀪 Author: judeh0747
════════════════════════
ⴵ Time: Fri, 17 Apr 2026 15:55:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #python
Medium
How Drowning in Windows Event Logs Made Me Build My Own Threat-Hunting CLI
The first time I tried to run a real incident-response exercise in my lab, I pulled an EVTX file off a compromised VM, opened it in Event…