Daily Writeups – Telegram
Daily Writeups
3.19K subscribers
107K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Cyber Law in Bangladesh (2026)
════════════════════════
𐀪 Author: Kazi Sabbir
════════════════════════
Time: Sat, 17 Jan 2026 18:23:08 GMT
════════════════════════
Tags: #cyber_law #cybercrime #cybersecurity #law #ethical_hacking
Title: XSS Payload Crafting and WAF Bypass: A Beginner‑Friendly Guide
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
Time: Sat, 17 Jan 2026 18:13:47 GMT
════════════════════════
Tags: #bug_bounty_tips #cybersecurity #waf #bug_bounty_writeup #xss_attack
Title: Hidden in the Source: Discovering Reflected XSS via Manual Code Review
════════════════════════
𐀪 Author: Samet Yiğit
════════════════════════
Time: Sat, 17 Jan 2026 20:26:14 GMT
════════════════════════
Tags: #bug_bounty_writeup #bug_bounty_tips #bug_bounty
Title: The Double Life of Your JPEGs: Privacy Leaks and Hidden Payloads
════════════════════════
𐀪 Author: Xiao Paw
════════════════════════
Time: Sat, 17 Jan 2026 20:25:10 GMT
════════════════════════
Tags: #infosec #osint #cybersecurity #hacking #privacy
Title: SSTI Explained: HTB Hacknet Walkthrough
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
Time: Sat, 17 Jan 2026 20:48:20 GMT
════════════════════════
Tags: #hackthebox #technology #infosec #tech #cybersecurity
Title: HackTheBox Module: Password Attacks | Credentials Hunting in Network Traffic
════════════════════════
𐀪 Author: Sunain
════════════════════════
Time: Sat, 17 Jan 2026 20:08:01 GMT
════════════════════════
Tags: #hackthebox #packet_capture #wireshark #hackthebox_writeup #networking
Title: SQL Injection Lab(THM)
════════════════════════
𐀪 Author: Tarek Monoar
════════════════════════
Time: Sat, 17 Jan 2026 20:54:30 GMT
════════════════════════
Tags: #sqli #sqlite3 #sqlite #database #sql
Title: Nested Comment Bypass file upload
════════════════════════
𐀪 Author: Muhammad Syahrul Haniawan
════════════════════════
Time: Sat, 17 Jan 2026 23:03:18 GMT
════════════════════════
Tags: #hacking #bug_bounty #cybersecurity
Title: Why the #1 Vulnerability Isn’t About Hacking, It’s About Walking Through Open Doors
════════════════════════
𐀪 Author: Wnellygrace
════════════════════════
Time: Sat, 17 Jan 2026 23:05:30 GMT
════════════════════════
Tags: #web_security #cybersecurity #application_security #broken_access_control #owasp
Title: Why IoT Security Research Lives at the Intersection of RF and Cybersecurity
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
Time: Sat, 17 Jan 2026 23:26:32 GMT
════════════════════════
Tags: #wifi #hacking #cybersecurity #pentesting #iot
Title: Hackear la Física, no la Matemática: Cómo construí un simulador de Ataque de Canal Lateral (SCA) en…
════════════════════════
𐀪 Author: Methodwhite
════════════════════════
Time: Sun, 18 Jan 2026 00:46:33 GMT
════════════════════════
Tags: #python #hacking #cryptography #cybersecurity #reverse_engineering
Title: 10 Must-Know Malware Analysis Interview Questions (with Scenario-Based Answers)
════════════════════════
𐀪 Author: Vikas Singh Panwar
════════════════════════
Time: Sat, 17 Jan 2026 23:54:43 GMT
════════════════════════
Tags: #ransomware #hacking #malware #cybersecurity #interview
Title: Mastering iOS Pentesting: Part 2 — Shell Access, File Transfers, IPA-App Signing, TrollStore & IPA…
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
Time: Sun, 18 Jan 2026 00:46:28 GMT
════════════════════════
Tags: #cybersecurity #penetration_testing #mobile_security #information_security #cybercrime
Title: Speaking in Binary — Packet Crafting & Manipulation with Scapy
════════════════════════
𐀪 Author: KOJO
════════════════════════
Time: Sun, 18 Jan 2026 03:49:54 GMT
════════════════════════
Tags: #scapy #ethical_hacking #hacking #cybersecurity
Title: Digital Cartography — Mapping the Attack Surface with Nmap
════════════════════════
𐀪 Author: KOJO
════════════════════════
Time: Sun, 18 Jan 2026 03:47:40 GMT
════════════════════════
Tags: #nmap #cybersecurity #ethical_hacking
Title: WAFs Made Simple: Why They Can’t Block Everything (And How They Really Work)
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
Time: Sun, 18 Jan 2026 03:49:25 GMT
════════════════════════
Tags: #bug_bounty_writeup #bug_bounty_tips #waf
Title: Jangan Asal Klik Link! Kenapa “Phishing” Adalah Musuh Nomor 1 Akun Digital Kita.
════════════════════════
𐀪 Author: Arsal Naufal
════════════════════════
Time: Sun, 18 Jan 2026 04:52:27 GMT
════════════════════════
Tags: #phising #hacking #scammer #social_media #scam_warning
Title: Hello World
════════════════════════
𐀪 Author: Brad
════════════════════════
Time: Sun, 18 Jan 2026 04:31:02 GMT
════════════════════════
Tags: #penetration_testing #information_security #hello_world
Title: Beyond the Network: Cracking the Application and the Human Firewall
════════════════════════
𐀪 Author: Keith Gabriel
════════════════════════
Time: Sun, 18 Jan 2026 03:59:23 GMT
════════════════════════
Tags: #cybersecurity #cyberguy #penetration_testing #ethical_hacking #cyber
Title: When Rate Limits Lie: A Quiet Path to Account Takeover
════════════════════════
𐀪 Author: PevinKumar A
════════════════════════
Time: Sun, 18 Jan 2026 07:50:29 GMT
════════════════════════
Tags: #bug_bounty #penetration_testing #ethical_hacking #cybersecurity
Title: Root Me — XSS Stored 1
════════════════════════
𐀪 Author: LiGhTZod
════════════════════════
Time: Sun, 18 Jan 2026 06:07:35 GMT
════════════════════════
Tags: #bug_bounty #web_hacking #cybersecurity