Daily Writeups – Telegram
Daily Writeups
3.19K subscribers
107K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Wachtwoord: 12345 (column)
════════════════════════
𐀪 Author: Johan van de Beek (DjoeGio's Marginalia)
════════════════════════
Time: Sun, 18 Jan 2026 14:57:59 GMT
════════════════════════
Tags: #hacking #jeff_bezos
Title: Listening to Light- The Complete Engineering Guide to Laser Acoustic Surveillance Technology
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
Time: Sun, 18 Jan 2026 14:51:42 GMT
════════════════════════
Tags: #surveillance #software_engineering #guides_and_tutorials #hacking #laser
Title: Detecting Suspicious Activities Using Wireshark: A Comprehensive Guide
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
Time: Sun, 18 Jan 2026 14:32:26 GMT
════════════════════════
Tags: #hacking #suspicious #suspicious_activity #wireshark #man_in_the_middle_attack
Title: Firewalls & Segmentation: Building Digital Walls That Actually Work
════════════════════════
𐀪 Author: Satyam Singh
════════════════════════
Time: Sun, 18 Jan 2026 14:56:40 GMT
════════════════════════
Tags: #infosec #offensive_security #cybersecurity #firewall #network_security
Title: Cyborg — THM Writeups
════════════════════════
𐀪 Author: Alts
════════════════════════
Time: Sun, 18 Jan 2026 13:59:38 GMT
════════════════════════
Tags: #infosec #tryhackme #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
Title: Relevant CTF Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead ‍
════════════════════════
Time: Sun, 18 Jan 2026 14:30:09 GMT
════════════════════════
Tags: #tryhackme #ctf_writeup #tryhackme_walkthrough #ctf_walkthrough #tryhackme_writeup
Title: SOC Workflow Explained: How Cyber Attacks Are Detected and Stopped
════════════════════════
𐀪 Author: Abhinsubej
════════════════════════
Time: Sun, 18 Jan 2026 14:24:14 GMT
════════════════════════
Tags: #siem #cybersecurity_news #cybersecurity #ethical_hacking #soc_analyst
Title: Shadow AI and API Vulnerabilities: The Invisible Wound of Modern Enterprises
════════════════════════
𐀪 Author: Emir Yusuf Nural
════════════════════════
Time: Sun, 18 Jan 2026 15:02:30 GMT
════════════════════════
Tags: #cybersecurity #software_development #api_security #cloud_security #shadow_ai
Title: ID Parametresi Üzerinden Yetki Aşımı /IDOR
════════════════════════
𐀪 Author: Zekikayaalp
════════════════════════
Time: Sun, 18 Jan 2026 15:49:22 GMT
════════════════════════
Tags: #cybersecurity #bugbounty_writeup #idor #pentesting
Title: Starting Your Bug Bounty Journey: Tips for Beginners
════════════════════════
𐀪 Author: Nayan Ghimire
════════════════════════
Time: Sun, 18 Jan 2026 17:33:54 GMT
════════════════════════
Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips
Title: HackerOne HTML Injection Fix Bypass‍
════════════════════════
𐀪 Author: ab.infosec
════════════════════════
Time: Sun, 18 Jan 2026 16:22:17 GMT
════════════════════════
Tags: #cybersecurity #bug_bounty #hacking #hackerone #html_injection
Title: Design-Level Stored XSS in Matomo i18n Rendering
════════════════════════
𐀪 Author: D7
════════════════════════
Time: Sun, 18 Jan 2026 16:14:35 GMT
════════════════════════
Tags: #i18n #web_design #bug_bounty #code #xss_attack
Title: Ghost in the Machine: 6 Shocking Ways Your Operating System Tracks Your Every Move
════════════════════════
𐀪 Author: Omega
════════════════════════
Time: Sun, 18 Jan 2026 17:53:45 GMT
════════════════════════
Tags: #cybersecurity #privacy #technology #digital_forensics #infosec
Title: Walkthrough: Advent of Cyber Prep Track — TryHackMe
════════════════════════
𐀪 Author: Muhammad Usman
════════════════════════
Time: Sun, 18 Jan 2026 16:25:13 GMT
════════════════════════
Tags: #walkthrough #adventofcyberpreptrack #tryhackme #advent_of_cyber_2025
Title: How Attackers Think About Trust (And Defenders Don’t)
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
Time: Sun, 18 Jan 2026 17:00:48 GMT
════════════════════════
Tags: #cybersecurity #zero_trust #ethical_hacking #offensive_security #security_engineering
Title: Entering The Dark Web
════════════════════════
𐀪 Author: Nxgprince
════════════════════════
Time: Sun, 18 Jan 2026 16:32:14 GMT
════════════════════════
Tags: #cybersecurity #ethical_hacking #darkweb #dark_web_link
Title: Simple Logic Breaks Big Systems: The Contract That Ended Before It Started
════════════════════════
𐀪 Author: default_0x
════════════════════════
Time: Sun, 18 Jan 2026 19:47:05 GMT
════════════════════════
Tags: #business_logic #bug_bounty_tips #business_logic_flaw #bug_bounty
Title: The DNS Query I Almost Ignored
════════════════════════
𐀪 Author: ATAF
════════════════════════
Time: Sun, 18 Jan 2026 18:36:58 GMT
════════════════════════
Tags: #cyber_defense #cybersecurity #hacking #blue_team
Title: How Hackers Actually Break Web Apps in 2026
════════════════════════
𐀪 Author: Code Catalyst
════════════════════════
Time: Sun, 18 Jan 2026 18:32:10 GMT
════════════════════════
Tags: #web_security #application #software_development #web_development #hacking
Title: How Hackers Think
════════════════════════
𐀪 Author: Catherine Ma
════════════════════════
Time: Sun, 18 Jan 2026 18:06:31 GMT
════════════════════════
Tags: #hacking #technology #cybersecurity #cybercrime #online_safety
Title: How Hackers Actually Think:
════════════════════════
𐀪 Author: Abdul Ahad
════════════════════════
Time: Sun, 18 Jan 2026 18:01:51 GMT
════════════════════════
Tags: #technology #hacking #ai #cybersecurity #infosec