<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CyberTrick</title>
    <link>https://cybertrick.org</link>
    <description>Cybersecurity Tips, Research, and Guides</description>
    <language>en-us</language>
    <lastBuildDate>Sun, 05 Apr 2026 12:14:47 GMT</lastBuildDate>
    <atom:link href="https://cybertrick.org/rss.xml" rel="self" type="application/rss+xml"/>
    
    <item>
      <title><![CDATA[ Hack The Box: ExpressWay — Full Walkthrough]]></title>
      <link>https://cybertrick.org/blog/hack-the-box-expressway-full-walkthrough</link>
      <guid isPermaLink="true">https://cybertrick.org/blog/hack-the-box-expressway-full-walkthrough</guid>
      <description><![CDATA[]]></description>
      <pubDate>Mon, 30 Mar 2026 23:04:41 GMT</pubDate>
      <category>ctf-writeup</category>
      <category>HackTheBoxWriteup</category>
      <category>Linux</category>
      <category>PrivilegeEscalation</category>
      <category>Cybersecurity</category>
      <category>EthicalHacking</category>
      <category>CyberTrick</category>
    </item>
    <item>
      <title><![CDATA[IDOR — The Most Underrated Vulnerability (And Why It’s Everywhere)]]></title>
      <link>https://cybertrick.org/blog/idor-the-most-underrated-vulnerability</link>
      <guid isPermaLink="true">https://cybertrick.org/blog/idor-the-most-underrated-vulnerability</guid>
      <description><![CDATA[]]></description>
      <pubDate>Wed, 25 Mar 2026 09:51:18 GMT</pubDate>
      <category>guide</category>
      <category>IDOR</category>
      <category>Cybersecurity</category>
      <category>WebSecurity</category>
      <category>EthicalHacking</category>
      <category>BugBounty</category>
      <category>CyberTrick</category>
    </item>
    <item>
      <title><![CDATA[Git & GitHub for Hackers — Version Control from Zero to Real-World Usage]]></title>
      <link>https://cybertrick.org/blog/git-github-for-hackers</link>
      <guid isPermaLink="true">https://cybertrick.org/blog/git-github-for-hackers</guid>
      <description><![CDATA[]]></description>
      <pubDate>Wed, 25 Mar 2026 09:39:54 GMT</pubDate>
      <category>guide</category>
      <category>Git</category>
      <category>GitHub</category>
      <category>Cybersecurity</category>
      <category>VersionControl</category>
      <category>EthicalHacking</category>
      <category>CyberTrick</category>
    </item>
    <item>
      <title><![CDATA[Bash vs PowerShell vs CMD — Which One Should Hackers Learn?]]></title>
      <link>https://cybertrick.org/blog/bash-vs-powershell-vs-cmd-which-one-should-hackers-learn</link>
      <guid isPermaLink="true">https://cybertrick.org/blog/bash-vs-powershell-vs-cmd-which-one-should-hackers-learn</guid>
      <description><![CDATA[]]></description>
      <pubDate>Wed, 25 Mar 2026 09:32:38 GMT</pubDate>
      <category>security-research</category>
      <category>Bash</category>
      <category>PowerShell</category>
      <category>CMD</category>
      <category>Cybersecurity</category>
      <category>EthicalHacking</category>
      <category>Linux</category>
      <category>Windows</category>
      <category>CyberTrick</category>
    </item>
    <item>
      <title><![CDATA[ PowerShell Fundamentals for Hackers — From Basics to Real-World Usage]]></title>
      <link>https://cybertrick.org/blog/powershell-fundamentals-for-hackers</link>
      <guid isPermaLink="true">https://cybertrick.org/blog/powershell-fundamentals-for-hackers</guid>
      <description><![CDATA[]]></description>
      <pubDate>Wed, 25 Mar 2026 09:21:15 GMT</pubDate>
      <category>guide</category>
      <category>PowerShell</category>
      <category>Cybersecurity</category>
      <category>Windows</category>
      <category>Automation</category>
      <category>EthicalHacking</category>
      <category>CyberTrick</category>
    </item>
    <item>
      <title><![CDATA[Linux Fundamentals for Hackers — Part 2: Permissions, Processes, Automation & Real-World Usage]]></title>
      <link>https://cybertrick.org/blog/linux-fundamentals-for-hackers-part-2</link>
      <guid isPermaLink="true">https://cybertrick.org/blog/linux-fundamentals-for-hackers-part-2</guid>
      <description><![CDATA[Linux Fundamentals for Hackers — Part 2: Permissions, Processes, Automation & Real-World Usage]]></description>
      <pubDate>Mon, 23 Mar 2026 20:49:23 GMT</pubDate>
      <category>guide</category>
      <category>Linux</category>
      <category>Cybersecurity</category>
      <category>Bash</category>
      <category>SSH</category>
      <category>Automation</category>
      <category>EthicalHacking</category>
      <category>CyberTrick</category>
    </item>
    <item>
      <title><![CDATA[Linux Fundamentals for Hackers — Part 1: Command Line & Core Concepts]]></title>
      <link>https://cybertrick.org/blog/linux-fundamentals-for-hackers-part-1</link>
      <guid isPermaLink="true">https://cybertrick.org/blog/linux-fundamentals-for-hackers-part-1</guid>
      <description><![CDATA[]]></description>
      <pubDate>Mon, 23 Mar 2026 20:30:05 GMT</pubDate>
      <category>guide</category>
      <category>Linux</category>
      <category>Cybersecurity</category>
      <category>Terminal</category>
      <category>CommandLine</category>
    </item>
    <item>
      <title><![CDATA[Advanced Guide to Vulnerability Classification: CVE, CWE, CVSS, CPE & NVD (2026)]]></title>
      <link>https://cybertrick.org/blog/advanced-guide-to-vulnerability-classification-cve-cwe-cvss-cpe-nvd-2026</link>
      <guid isPermaLink="true">https://cybertrick.org/blog/advanced-guide-to-vulnerability-classification-cve-cwe-cvss-cpe-nvd-2026</guid>
      <description><![CDATA[]]></description>
      <pubDate>Sun, 22 Mar 2026 14:46:04 GMT</pubDate>
      <category>security-research</category>
      <category>cybersecurity</category>
      <category>vulnerability management</category>
      <category>CVE</category>
      <category>CWE</category>
      <category>CVSS</category>
      <category>CPE</category>
      <category>NVD</category>
      <category>vulnerability classification</category>
      <category>security engineering</category>
      <category>pentesting</category>
      <category>ethical hacking</category>
      <category>information security</category>
      <category>risk assessment</category>
      <category>exploit development</category>
      <category>bug bounty</category>
      <category>blue team</category>
      <category>red team</category>
      <category>security research</category>
      <category>threat intelligence</category>
      <category>vulnerability scanning</category>
    </item>
    <item>
      <title><![CDATA[Ultimate Nmap Guide 2026 | Complete Network Scanning Tutorial]]></title>
      <link>https://cybertrick.org/blog/ultimate-nmap-guide-2026-complete-network-scanning-tutorial</link>
      <guid isPermaLink="true">https://cybertrick.org/blog/ultimate-nmap-guide-2026-complete-network-scanning-tutorial</guid>
      <description><![CDATA[]]></description>
      <pubDate>Fri, 20 Mar 2026 11:49:41 GMT</pubDate>
      <category>guide</category>
      <category>nmap</category>
      <category>cybersecurity</category>
      <category>pentesting</category>
      <category>networking</category>
      <category>ethical hacking</category>
    </item>
  </channel>
</rss>