Daily Writeups – Telegram
Daily Writeups
3.2K subscribers
106K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Day 1- CEH V13 Cybersecurity Learning Journey
════════════════════════
𐀪 Author: Arun kumar G
════════════════════════
Time: Tue, 13 Jan 2026 18:20:28 GMT
════════════════════════
Tags: #ethical_hacking #cybersecurity #windows_privilege_esc #windows_user
Title: Dumping Full db through Apache superset
════════════════════════
𐀪 Author: Ahmed Algohary
════════════════════════
Time: Tue, 13 Jan 2026 17:59:37 GMT
════════════════════════
Tags: #python #pentesting #apache #ethical_hacking #apache_superset
Title: When “Excellent Security” Still Fails: A Real-World SSRF Lesson
════════════════════════
𐀪 Author: Tyreek Haynes
════════════════════════
Time: Tue, 13 Jan 2026 19:43:08 GMT
════════════════════════
Tags: #dream_machine_pro #ssrf #cybersecurity #information_technology #internet
Title: When ‘Dead’ Pets Come Back to Life: A Bug I Found on a Pet Platform
════════════════════════
𐀪 Author: SK3PT1K3R
════════════════════════
Time: Tue, 13 Jan 2026 21:34:44 GMT
════════════════════════
Tags: #cybersecurity #bug_bounty #api #bugbounty_writeup #business_logic
Title: Top 5 AI Tools Every Bug Bounty Hunter Should Know
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
Time: Tue, 13 Jan 2026 20:04:07 GMT
════════════════════════
Tags: #ai_hacking #bug_bounty #cybersecurity #top_5 #ethical_hacking
Title: Dig Dug: TryHackMe WriteUp
════════════════════════
𐀪 Author: Bridget
════════════════════════
Time: Tue, 13 Jan 2026 20:39:16 GMT
════════════════════════
Tags: #infosec #dns #tryhackme_writeup #tryhackme #dns_security
Title: Data Heist — Hackviser Real-World Scenario Walkthrough
════════════════════════
𐀪 Author: Hussein 404
════════════════════════
Time: Tue, 13 Jan 2026 21:18:59 GMT
════════════════════════
Tags: #data_heist #penetration_testing #hackviser #ctf #cybersecurity
Title: Attacktive Directory TryHackME walkthrough
════════════════════════
𐀪 Author: Nishchay Manhas
════════════════════════
Time: Tue, 13 Jan 2026 20:20:28 GMT
════════════════════════
Tags: #ctf_walkthrough #cybersecurity #tryhackme #ctf_writeup #ctf
Title: About Cyber security: Protecting Your Digital Life Every Day
════════════════════════
𐀪 Author: Sourav Krishnan
════════════════════════
Time: Tue, 13 Jan 2026 21:03:29 GMT
════════════════════════
Tags: #cybercrime #ethical_hacking #training_institute #cybersecurity #learning
Title: CVE-2026-22718: EOL Spring CLI Tool for VS Code Found Vulnerable to Command Injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 13 Jan 2026 23:48:23 +0000
════════════════════════
Tags: #Vulnerability Report #Command Injection #CVE_2026_22718 #developer security #end_of_life #EOL #Spring CLI #VS Code Extension #vulnerability management #Yue Liu
Title: From 403 Forbidden to $$$$ How a Simple Extension Bypass Led to Unauthenticated Access to Private…
════════════════════════
𐀪 Author: KiRaaDx
════════════════════════
Time: Tue, 13 Jan 2026 22:09:30 GMT
════════════════════════
Tags: #cybersecurity #bug_bounty_tips #bug_bounty
Title: Can you Realistcally Hack a Wifi Network In 2026 — I Tried.
════════════════════════
𐀪 Author: Alex Grande
════════════════════════
Time: Tue, 13 Jan 2026 23:32:49 GMT
════════════════════════
Tags: #security #ethical_hacking #hacking #technology #cybersecurity
Title: Cybersecurity Ethical Hacking — Discover the Top 3 Career Strategies for Career Advancement
════════════════════════
𐀪 Author: Franklin Rhodes
════════════════════════
Time: Tue, 13 Jan 2026 23:32:07 GMT
════════════════════════
Tags: #hacking #cybersecurity #kali_linux #careers #infosec
Title: How IDS, IPS, and Load Balancing Detection Tools Work in Penetration Testing
════════════════════════
𐀪 Author: mohandika
════════════════════════
Time: Tue, 13 Jan 2026 23:28:00 GMT
════════════════════════
Tags: #security #penetration_testing #cybersecurity #load_balancing #ids_ips
Title: IPC via Message Queue
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
Time: Tue, 13 Jan 2026 23:05:13 GMT
════════════════════════
Tags: #cybersecurity #hackthebox #reverse_engineering #tryhackme #malware
Title: Advent of Cyber — Day 16 — Forensics: Registry Furensics
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
Time: Tue, 13 Jan 2026 23:03:16 GMT
════════════════════════
Tags: #cybersecurity #tryhackme_walkthrough #advent_of_cyber_2025 #tryhackme_writeup #tryhackme
Title: Advent of Cyber — Day 15 — Web Attack Forensics: Drone Alone
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
Time: Tue, 13 Jan 2026 22:53:37 GMT
════════════════════════
Tags: #cybersecurity #advent_of_cyber_2025 #tryhackme_walkthrough #tryhackme_writeup #tryhackme
Title: Siemens Issues Critical Alert for Maximum 10.0 Vulnerability in Industrial Systems
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 01:44:10 +0000
════════════════════════
Tags: #Vulnerability #Critical Vulnerability #CVSS 10 #Factory Automation #ICS security #Industrial Edge #Industrial IoT #SCADA #Siemens #SIMATIC
Title: Critical SAP Alert: S/4HANA SQL Injection & Wily RCE Threaten Financial Data
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 01:29:08 +0000
════════════════════════
Tags: #Vulnerability Report #ABAP Security #CVE_2026_0500 #CVE_2026_0501 #ERP Security #Patch Day #Remote Code Execution #SAP S/4HANA #SAP Security #sql injection #Wily Introscope
Title: Fortinet Critical Alert: CVE-2025-64155 RCE & Config Leaks Exposed
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 00:29:27 +0000
════════════════════════
Tags: #Vulnerability Report
Title: VoidLink: The “Cloud-First” Malware Hunting Your Linux Servers
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 00:21:17 +0000
════════════════════════
Tags: #Malware #Check Point Research #Chinese Threat Actor #Cloud Security #Cobalt Strike #container security #DevOps Security #eBPF #Kubernetes Security #Linux Malware #supply chain attack #VoidLink #Zig Programming Language