Daily Writeups – Telegram
Daily Writeups
3.19K subscribers
107K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Why Encryption Alone Doesn’t Make Systems Secure
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
Time: Sat, 17 Jan 2026 18:16:43 GMT
════════════════════════
Tags: #ethical_hacking #infosec #encryption #cybersecurity #offensive_security
Title: What Are Command and Control (C2) Servers and Why Do They Matter?
════════════════════════
𐀪 Author: Bishal Poudel
════════════════════════
Time: Sat, 17 Jan 2026 18:03:21 GMT
════════════════════════
Tags: #cybersecurity #threat_intelligence #malware #network_security #infosec
Title: “And Then There Were None”: Achieving My PNPT in 2025!
════════════════════════
𐀪 Author: Jinendar Kothari
════════════════════════
Time: Sat, 17 Jan 2026 19:28:40 GMT
════════════════════════
Tags: #offensive_security #tcm_security #certification #penetration_testing #cybersecurity
Title: Cyber Law in Bangladesh (2026)
════════════════════════
𐀪 Author: Kazi Sabbir
════════════════════════
Time: Sat, 17 Jan 2026 18:23:08 GMT
════════════════════════
Tags: #cyber_law #cybercrime #cybersecurity #law #ethical_hacking
Title: XSS Payload Crafting and WAF Bypass: A Beginner‑Friendly Guide
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
Time: Sat, 17 Jan 2026 18:13:47 GMT
════════════════════════
Tags: #bug_bounty_tips #cybersecurity #waf #bug_bounty_writeup #xss_attack
Title: Hidden in the Source: Discovering Reflected XSS via Manual Code Review
════════════════════════
𐀪 Author: Samet Yiğit
════════════════════════
Time: Sat, 17 Jan 2026 20:26:14 GMT
════════════════════════
Tags: #bug_bounty_writeup #bug_bounty_tips #bug_bounty
Title: The Double Life of Your JPEGs: Privacy Leaks and Hidden Payloads
════════════════════════
𐀪 Author: Xiao Paw
════════════════════════
Time: Sat, 17 Jan 2026 20:25:10 GMT
════════════════════════
Tags: #infosec #osint #cybersecurity #hacking #privacy
Title: SSTI Explained: HTB Hacknet Walkthrough
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
Time: Sat, 17 Jan 2026 20:48:20 GMT
════════════════════════
Tags: #hackthebox #technology #infosec #tech #cybersecurity
Title: HackTheBox Module: Password Attacks | Credentials Hunting in Network Traffic
════════════════════════
𐀪 Author: Sunain
════════════════════════
Time: Sat, 17 Jan 2026 20:08:01 GMT
════════════════════════
Tags: #hackthebox #packet_capture #wireshark #hackthebox_writeup #networking
Title: SQL Injection Lab(THM)
════════════════════════
𐀪 Author: Tarek Monoar
════════════════════════
Time: Sat, 17 Jan 2026 20:54:30 GMT
════════════════════════
Tags: #sqli #sqlite3 #sqlite #database #sql
Title: Nested Comment Bypass file upload
════════════════════════
𐀪 Author: Muhammad Syahrul Haniawan
════════════════════════
Time: Sat, 17 Jan 2026 23:03:18 GMT
════════════════════════
Tags: #hacking #bug_bounty #cybersecurity
Title: Why the #1 Vulnerability Isn’t About Hacking, It’s About Walking Through Open Doors
════════════════════════
𐀪 Author: Wnellygrace
════════════════════════
Time: Sat, 17 Jan 2026 23:05:30 GMT
════════════════════════
Tags: #web_security #cybersecurity #application_security #broken_access_control #owasp
Title: Why IoT Security Research Lives at the Intersection of RF and Cybersecurity
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
Time: Sat, 17 Jan 2026 23:26:32 GMT
════════════════════════
Tags: #wifi #hacking #cybersecurity #pentesting #iot
Title: Hackear la Física, no la Matemática: Cómo construí un simulador de Ataque de Canal Lateral (SCA) en…
════════════════════════
𐀪 Author: Methodwhite
════════════════════════
Time: Sun, 18 Jan 2026 00:46:33 GMT
════════════════════════
Tags: #python #hacking #cryptography #cybersecurity #reverse_engineering
Title: 10 Must-Know Malware Analysis Interview Questions (with Scenario-Based Answers)
════════════════════════
𐀪 Author: Vikas Singh Panwar
════════════════════════
Time: Sat, 17 Jan 2026 23:54:43 GMT
════════════════════════
Tags: #ransomware #hacking #malware #cybersecurity #interview
Title: Mastering iOS Pentesting: Part 2 — Shell Access, File Transfers, IPA-App Signing, TrollStore & IPA…
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
Time: Sun, 18 Jan 2026 00:46:28 GMT
════════════════════════
Tags: #cybersecurity #penetration_testing #mobile_security #information_security #cybercrime
Title: Speaking in Binary — Packet Crafting & Manipulation with Scapy
════════════════════════
𐀪 Author: KOJO
════════════════════════
Time: Sun, 18 Jan 2026 03:49:54 GMT
════════════════════════
Tags: #scapy #ethical_hacking #hacking #cybersecurity
Title: Digital Cartography — Mapping the Attack Surface with Nmap
════════════════════════
𐀪 Author: KOJO
════════════════════════
Time: Sun, 18 Jan 2026 03:47:40 GMT
════════════════════════
Tags: #nmap #cybersecurity #ethical_hacking
Title: WAFs Made Simple: Why They Can’t Block Everything (And How They Really Work)
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
Time: Sun, 18 Jan 2026 03:49:25 GMT
════════════════════════
Tags: #bug_bounty_writeup #bug_bounty_tips #waf
Title: Jangan Asal Klik Link! Kenapa “Phishing” Adalah Musuh Nomor 1 Akun Digital Kita.
════════════════════════
𐀪 Author: Arsal Naufal
════════════════════════
Time: Sun, 18 Jan 2026 04:52:27 GMT
════════════════════════
Tags: #phising #hacking #scammer #social_media #scam_warning
Title: Hello World
════════════════════════
𐀪 Author: Brad
════════════════════════
Time: Sun, 18 Jan 2026 04:31:02 GMT
════════════════════════
Tags: #penetration_testing #information_security #hello_world