Daily Writeups – Telegram
Daily Writeups
3.19K subscribers
107K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: What I Found While Analyzing a Fake Banking App
════════════════════════
𐀪 Author: Adwaith S
════════════════════════
Time: Sat, 17 Jan 2026 16:57:31 GMT
════════════════════════
Tags: #ethical_hacking #android_malware #malware_analysis #cyber_security_awareness
Title: Practical Roadmap for Learning File Upload Vulnerabilities
════════════════════════
𐀪 Author: Daniel Hammoud
════════════════════════
Time: Sat, 17 Jan 2026 16:21:14 GMT
════════════════════════
Tags: #bug_bounty_tips #web_security #cybersecurity #roadmaps #file_upload_vulnerability
Title: How my valid critical bug got rejected
════════════════════════
𐀪 Author: TheCyberAryan
════════════════════════
Time: Sat, 17 Jan 2026 19:15:56 GMT
════════════════════════
Tags: #ethical_hacking #bug_bounty #cybersecurity
Title: How I Discovered a Dependency Confusion Vulnerability in a Ruby Application Leading to RCE
════════════════════════
𐀪 Author: Ahmed Tarek
════════════════════════
Time: Sat, 17 Jan 2026 19:06:39 GMT
════════════════════════
Tags: #pentesting #bug_bounty #dependency_confusion #bug_bounty_tips #ruby
Title: ANTHEM TryHackMe Writeup/Walkthrough
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
Time: Sat, 17 Jan 2026 19:55:04 GMT
════════════════════════
Tags: #tryhackme #cybersecurity #ctf #pentesting #hacking
Title: Agent Sudo THM Writeup/Walkthrough
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
Time: Sat, 17 Jan 2026 19:49:47 GMT
════════════════════════
Tags: #hacking #pentesting #ctf #tryhackme #cybersecurity
Title: How I Cracked the eCPPTv3 at 16
════════════════════════
𐀪 Author: Joel Morillas Pagan (Ghxstsec)
════════════════════════
Time: Sat, 17 Jan 2026 18:28:38 GMT
════════════════════════
Tags: #pentesting #ecppt #cibersecurity #hacking
Title: Why Encryption Alone Doesn’t Make Systems Secure
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
Time: Sat, 17 Jan 2026 18:16:43 GMT
════════════════════════
Tags: #ethical_hacking #infosec #encryption #cybersecurity #offensive_security
Title: What Are Command and Control (C2) Servers and Why Do They Matter?
════════════════════════
𐀪 Author: Bishal Poudel
════════════════════════
Time: Sat, 17 Jan 2026 18:03:21 GMT
════════════════════════
Tags: #cybersecurity #threat_intelligence #malware #network_security #infosec
Title: “And Then There Were None”: Achieving My PNPT in 2025!
════════════════════════
𐀪 Author: Jinendar Kothari
════════════════════════
Time: Sat, 17 Jan 2026 19:28:40 GMT
════════════════════════
Tags: #offensive_security #tcm_security #certification #penetration_testing #cybersecurity
Title: Cyber Law in Bangladesh (2026)
════════════════════════
𐀪 Author: Kazi Sabbir
════════════════════════
Time: Sat, 17 Jan 2026 18:23:08 GMT
════════════════════════
Tags: #cyber_law #cybercrime #cybersecurity #law #ethical_hacking
Title: XSS Payload Crafting and WAF Bypass: A Beginner‑Friendly Guide
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
Time: Sat, 17 Jan 2026 18:13:47 GMT
════════════════════════
Tags: #bug_bounty_tips #cybersecurity #waf #bug_bounty_writeup #xss_attack
Title: Hidden in the Source: Discovering Reflected XSS via Manual Code Review
════════════════════════
𐀪 Author: Samet Yiğit
════════════════════════
Time: Sat, 17 Jan 2026 20:26:14 GMT
════════════════════════
Tags: #bug_bounty_writeup #bug_bounty_tips #bug_bounty
Title: The Double Life of Your JPEGs: Privacy Leaks and Hidden Payloads
════════════════════════
𐀪 Author: Xiao Paw
════════════════════════
Time: Sat, 17 Jan 2026 20:25:10 GMT
════════════════════════
Tags: #infosec #osint #cybersecurity #hacking #privacy
Title: SSTI Explained: HTB Hacknet Walkthrough
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
Time: Sat, 17 Jan 2026 20:48:20 GMT
════════════════════════
Tags: #hackthebox #technology #infosec #tech #cybersecurity
Title: HackTheBox Module: Password Attacks | Credentials Hunting in Network Traffic
════════════════════════
𐀪 Author: Sunain
════════════════════════
Time: Sat, 17 Jan 2026 20:08:01 GMT
════════════════════════
Tags: #hackthebox #packet_capture #wireshark #hackthebox_writeup #networking
Title: SQL Injection Lab(THM)
════════════════════════
𐀪 Author: Tarek Monoar
════════════════════════
Time: Sat, 17 Jan 2026 20:54:30 GMT
════════════════════════
Tags: #sqli #sqlite3 #sqlite #database #sql
Title: Nested Comment Bypass file upload
════════════════════════
𐀪 Author: Muhammad Syahrul Haniawan
════════════════════════
Time: Sat, 17 Jan 2026 23:03:18 GMT
════════════════════════
Tags: #hacking #bug_bounty #cybersecurity
Title: Why the #1 Vulnerability Isn’t About Hacking, It’s About Walking Through Open Doors
════════════════════════
𐀪 Author: Wnellygrace
════════════════════════
Time: Sat, 17 Jan 2026 23:05:30 GMT
════════════════════════
Tags: #web_security #cybersecurity #application_security #broken_access_control #owasp
Title: Why IoT Security Research Lives at the Intersection of RF and Cybersecurity
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
Time: Sat, 17 Jan 2026 23:26:32 GMT
════════════════════════
Tags: #wifi #hacking #cybersecurity #pentesting #iot
Title: Hackear la Física, no la Matemática: Cómo construí un simulador de Ataque de Canal Lateral (SCA) en…
════════════════════════
𐀪 Author: Methodwhite
════════════════════════
Time: Sun, 18 Jan 2026 00:46:33 GMT
════════════════════════
Tags: #python #hacking #cryptography #cybersecurity #reverse_engineering