Daily Writeups – Telegram
Daily Writeups
3.2K subscribers
106K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Setting Up and Listening for Incoming Connections: A Complete Guide to Testing Backdoors
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
Time: Wed, 14 Jan 2026 14:32:59 GMT
════════════════════════
Tags: #man_in_the_middle_attack #mitm_attacks #mitm #hacking #backdoor
Title: MongoBleed Explained in Plain English
════════════════════════
𐀪 Author: Faisal Feroz
════════════════════════
Time: Wed, 14 Jan 2026 13:51:27 GMT
════════════════════════
Tags: #security #vulnerability_management #mongodb #cybersecurity #hacking
Title: Security Analysis and Program Hardening on a Flask–SQLite CRUD App
════════════════════════
𐀪 Author: Daifullah Noor Azmi
════════════════════════
Time: Wed, 14 Jan 2026 18:00:21 GMT
════════════════════════
Tags: #web_security #penetration_testing #flask #owasp #cybersecurity
Title: Website Security Scanning Tools: A Practical Guide to 15 Free and Open-Source Options
════════════════════════
𐀪 Author: Ewan Mak
════════════════════════
Time: Wed, 14 Jan 2026 17:44:20 GMT
════════════════════════
Tags: #zero_trust #security #penetration_testing #cloud_security #vulnerability
Title: Try Hack Me- HA Joker CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
Time: Wed, 14 Jan 2026 16:49:44 GMT
════════════════════════
Tags: #tryhackme #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme_writeup
Title: Why Proper Pentest Scoping Determines Project Success
════════════════════════
𐀪 Author: Sachin Sawant
════════════════════════
Time: Wed, 14 Jan 2026 15:12:23 GMT
════════════════════════
Tags: #penetration_testing
Title: CloudGoat AWS SNS Secrets Walkthrough
════════════════════════
𐀪 Author: Spookz
════════════════════════
Time: Wed, 14 Jan 2026 15:02:48 GMT
════════════════════════
Tags: #penetration_testing #cybersecurity #aws #cloudgoat #ethical_hacking
Title: Anthem|TryHackMe
════════════════════════
𐀪 Author: Asjamil
════════════════════════
Time: Wed, 14 Jan 2026 16:53:31 GMT
════════════════════════
Tags: #cybersecurity #tryhackme #web #ctf #tryhackme_writeup
Title: Linux Privilege Escalation Tryhackme
════════════════════════
𐀪 Author: theunknownman
════════════════════════
Time: Wed, 14 Jan 2026 16:23:51 GMT
════════════════════════
Tags: #tryhackme
Title: Firewalls — Writeup
════════════════════════
𐀪 Author: Mahir
════════════════════════
Time: Wed, 14 Jan 2026 16:20:56 GMT
════════════════════════
Tags: #cybersecurity #tryhackme #firewall #tryhackme_writeup
Title: Why Wireshark Finally Made Sense: TryHackMe, College, and the Right Pace
════════════════════════
𐀪 Author: Crystal_cascade14
════════════════════════
Time: Wed, 14 Jan 2026 15:40:01 GMT
════════════════════════
Tags: #tryhackme #cybersecurity #ethical_hacking #wowenintech #tech_education
Title: Why Thinking Like an Attacker Changes Everything in Cybersecurity
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
Time: Wed, 14 Jan 2026 17:36:09 GMT
════════════════════════
Tags: #cybersecurity #offensive_security #internet_security #ethical_hacking #information_security
Title: Ethical Hacking Course in Trivandrum : A Practical Way Into a High Demand Cyber Security Career
════════════════════════
𐀪 Author: Vazeem Akram
════════════════════════
Time: Wed, 14 Jan 2026 17:23:13 GMT
════════════════════════
Tags: #ethical_hacking_training #cybersecurity_training #cybersecurity #ethical_hacking_course #ethical_hacking
Title: Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Thu, 15 Jan 2026 00:33:00 +0530
════════════════════════
Tags: No_Tags
Title: New China Linked VoidLink Linux Malware Targets Major Cloud Providers
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
Time: Wed, 14 Jan 2026 18:37:24 +0000
════════════════════════
Tags: #Malware #Security #Alibaba #AWS #Azure #China #cloud #Cyber Attack #Cyber Crime #Cybersecurity #Google Cloud #Tencent #VoidLink
Title: Structure and reliability in e-commerce platforms
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
Time: Wed, 14 Jan 2026 18:02:33 +0000
════════════════════════
Tags: #eCommerce #Technology #Business #Online Shopping
Title: A 5-Day Bug Bounty Hunt on a Telecom Target: From Recon to RXSS and Open Redirect
════════════════════════
𐀪 Author: SpiX-7
════════════════════════
Time: Wed, 14 Jan 2026 18:25:14 GMT
════════════════════════
Tags: #bug_bounty_tips #cybersecurity #bug_bounty_writeup #bug_bounty #web_penetration_testing
Title: Host Header Injection: A Practical Methodology for Security Testing
════════════════════════
𐀪 Author: Israel Aráoz Severiche
════════════════════════
Time: Wed, 14 Jan 2026 18:09:55 GMT
════════════════════════
Tags: #pentesting #bug_bounty #web_security #hacking #ethical_hacking
Title: Como o Instagram teve dados de usuários expostos em janeiro de 2026: a falha de redefinição de…
════════════════════════
𐀪 Author: Henrique Ribeiro
════════════════════════
Time: Wed, 14 Jan 2026 19:36:53 GMT
════════════════════════
Tags: #api_security #instagram #data_security #infosec #cybersecurity
Title: SUID Permission — The Silent Door to Privilege Escalation
════════════════════════
𐀪 Author: PriOFF
════════════════════════
Time: Wed, 14 Jan 2026 19:12:40 GMT
════════════════════════
Tags: #cybersecurity #linux_security #ethical_hacking #privilege_escalation #penetration_testing
Title: An SSRF Sink You’re Probably Skipping (It Earned Me $700 in Bounties)
════════════════════════
𐀪 Author: Thomas A.
════════════════════════
Time: Wed, 14 Jan 2026 20:42:29 GMT
════════════════════════
Tags: #bug_bounty #cybersecurity #penetration_testing #bug_bounty_writeup #technology