Daily Writeups – Telegram
Daily Writeups
3.21K subscribers
106K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Hacker At Work:Recon Workflow Process
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
Time: Mon, 12 Jan 2026 19:05:12 GMT
════════════════════════
Tags: #kali_linux #ethical_hacking #cybersecurity #bug_bounty #hacking
Title: The Bug Bounty Toolkit (2026): Tools, Workflows, and Real-World Recon That Actually Finds Bugs
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
Time: Mon, 12 Jan 2026 18:37:37 GMT
════════════════════════
Tags: #cybersecurity #ethical_hacking #bug_bounty #pentesting #reconnaissance
Title: Lab: Authentication bypass via encryption oracle
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
Time: Mon, 12 Jan 2026 18:56:10 GMT
════════════════════════
Tags: #ctf_writeup #ctf #pentesting #hacking #portswigger
Title: HTB — Agile Writeup
════════════════════════
𐀪 Author: Ayça Gül
════════════════════════
Time: Mon, 12 Jan 2026 18:40:22 GMT
════════════════════════
Tags: #hackthebox #hacking #hackthebox_writeup
Title: Bir Hacker’ın Oyun Alanı: Hibrit Sızma Testi Laboratuvarında Adım Adım Pentest
════════════════════════
𐀪 Author: Arda
════════════════════════
Time: Mon, 12 Jan 2026 19:57:14 GMT
════════════════════════
Tags: #pivoting #sızma_testi #siber_guvenlik #infosec
Title: Cybersecurity Basics: The Roadmap I Wish I Had When I Started
════════════════════════
𐀪 Author: Thapaswin
════════════════════════
Time: Mon, 12 Jan 2026 19:43:41 GMT
════════════════════════
Tags: #linux #cybersecurity #infosec #tech_career #learning_to_code
Title: Siber Güvenlik Laboratuvarı Notları: Teorik Temeller, Araçlar ve Metodolojiler
════════════════════════
𐀪 Author: Arda
════════════════════════
Time: Mon, 12 Jan 2026 18:56:21 GMT
════════════════════════
Tags: #infosec #ethical_hacking #cybersecurity #siber_guvenlik #penetration_testing
Title: Modern Vulnerability Management & Penetration Testing Services
════════════════════════
𐀪 Author: IT_Engineer
════════════════════════
Time: Mon, 12 Jan 2026 19:26:49 GMT
════════════════════════
Tags: #attacker #penetration_testing #vulnerability_management #cybersecurity #vulnerability
Title: Rivalry — Hackviser Real-World Scenario Walkthrough
════════════════════════
𐀪 Author: Hussein 404
════════════════════════
Time: Mon, 12 Jan 2026 19:16:47 GMT
════════════════════════
Tags: #rivalry #hackviser #penetration_testing #cybersecurity #capt
Title: Void — Hackviser Real-World Scenario Walkthrough
════════════════════════
𐀪 Author: Hussein 404
════════════════════════
Time: Mon, 12 Jan 2026 19:01:13 GMT
════════════════════════
Tags: #hackviser #ctf #penetration_testing #cybersecurity #void
Title: Information Gathering’s Assessment
════════════════════════
𐀪 Author: db1M
════════════════════════
Time: Mon, 12 Jan 2026 18:21:22 GMT
════════════════════════
Tags: #penetration_testing #reconnaissance #web_penetration_testing
Title: # Stop Wasting Hours Setting Up Your Parrot OS — Here’s an Open Source Tool That Does It in Minutes
════════════════════════
𐀪 Author: Zahradeen Muazu
════════════════════════
Time: Mon, 12 Jan 2026 19:35:40 GMT
════════════════════════
Tags: #shell_noscript #linux #parrotos #programming #ethical_hacking
Title: This Bug Bounty Recon is much PEAKKK!!!!!!
════════════════════════
𐀪 Author: Alham Rizvi(ExoidSec)
════════════════════════
Time: Mon, 12 Jan 2026 20:07:28 GMT
════════════════════════
Tags: #ethical_hacking #hacking #bug_hunting #bug_bounty #cybersecurity
Title: Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure
════════════════════════
𐀪 Author: Red Asgard
════════════════════════
Time: Mon, 12 Jan 2026 21:01:33 GMT
════════════════════════
Tags: #malware_analysis #north_korea #threat_intelligence #hacking #cybersecurity
Title: Why Telecommunications Companies Are Primary Targets for State-Sponsored Hackers
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
Time: Mon, 12 Jan 2026 20:18:26 GMT
════════════════════════
Tags: #hacking #telecommunication #critical_infrastructure #cybersecurity #cybercrime
Title: Your IDE Might Betray You Before You Run Anything
════════════════════════
𐀪 Author: Ryan W
════════════════════════
Time: Mon, 12 Jan 2026 20:52:26 GMT
════════════════════════
Tags: #cybersecurity #android_app_development #android_developers #software_engineering #infosec
Title: 0day-CTF
════════════════════════
𐀪 Author: guyvolvo
════════════════════════
Time: Mon, 12 Jan 2026 21:19:39 GMT
════════════════════════
Tags: #tryhackme #ctf_writeup #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
Title: Siber Güvenlikte Teknik Yeterlilik Kadar Önemli Bir Kavram: Etik
════════════════════════
𐀪 Author: Ahmet EVREN
════════════════════════
Time: Mon, 12 Jan 2026 21:57:01 GMT
════════════════════════
Tags: #ransomware #ethical_hacking #infosec #data_privacy
Title: Day 4: Users and Privileges in Linux
════════════════════════
𐀪 Author: Mohammad-AL-Momani
════════════════════════
Time: Mon, 12 Jan 2026 20:33:36 GMT
════════════════════════
Tags: #self_improvement #cybersecurity #money #ethical_hacking
Title: Russian BlueDelta (Fancy Bear) Uses PDFs to Steal Logins in Just 2 Seconds
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
Time: Mon, 12 Jan 2026 22:14:03 +0000
════════════════════════
Tags: #Security #BlueDelta #Cyber Attack #Cybersecurity #europe #Fancy Bear #Iran #Israel #Malware #Russia #Turkiye
Title: Dig Dug TryHackMe Write UP
════════════════════════
𐀪 Author: cat0x01
════════════════════════
Time: Mon, 12 Jan 2026 22:17:22 GMT
════════════════════════
Tags: #bug_bounty #cybersecurity #pentesting #ctf #tryhackme