Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: My Journey Through MITM Attacks — Part 1: ARP Spoofing
════════════════════════
𐀪 Author: ofek789
════════════════════════
Time: Mon, 23 Feb 2026 07:09:15 GMT
════════════════════════
Tags: #networking #programming #cybersecurity #ethical_hacking #golang
Title: Lets Defend SOC127 — SQL Injection Detected
════════════════════════
𐀪 Author: Winuka Ambegoda
════════════════════════
Time: Mon, 23 Feb 2026 03:09:03 GMT
════════════════════════
Tags: #lets_defend #soc #log_analysis #sql_injection
Title: The First Mobile Hacking Conference Is Coming This March
════════════════════════
𐀪 Author: mh
════════════════════════
Time: Mon, 23 Feb 2026 10:31:25 +0000
════════════════════════
Tags: #NetHunter Hacker #event #Mobile Hacking Conference
Title: Beyond Inspect Element: How I Looted an Application’s Internal Directories Using Only .map Files
════════════════════════
𐀪 Author: Shreejalkc
════════════════════════
Time: Mon, 23 Feb 2026 10:34:15 GMT
════════════════════════
Tags: #reactjs #web_security #penetration_testing #bug_bounty #cybersecurity
Title: Multi-Step Exploitation Strategies: How Small Bugs Turn Into Critical Bounties
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
Time: Mon, 23 Feb 2026 10:11:59 GMT
════════════════════════
Tags: #security #business #cybersecurity #hacking #bug_bounty
Title: NFC Payment Test at Olympics Will Inspire Mobile Attackers to Go for the Gold
════════════════════════
𐀪 Author: Jimmy Shah
════════════════════════
Time: Mon, 23 Feb 2026 10:29:49 GMT
════════════════════════
Tags: #fuzzing #olympics #nfc_tags #hacking
Title: How Decentralized Codex Security Recovered Our Bitcoin Investment After the December 13 Trading App…
════════════════════════
𐀪 Author: BLOCKCHAIN
════════════════════════
Time: Mon, 23 Feb 2026 10:23:23 GMT
════════════════════════
Tags: #hacking #decentralized_finance #decentralized #security #xcode
Title: How We Made Engineers Love Security
════════════════════════
𐀪 Author: Achraf Ameddah
════════════════════════
Time: Mon, 23 Feb 2026 09:32:23 GMT
════════════════════════
Tags: #security #hacking #software_engineering #ctf #learning
Title: Weekly Threat Intelligence Report 9 Feb 2026
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
Time: Mon, 23 Feb 2026 09:23:08 GMT
════════════════════════
Tags: #infosec #hacking #threat_intelligence #cybersecurity #cyberattack
Title: Analysis of Windows Notepad Remote Code Execution Vulnerability (CVE-2026-20841)
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
Time: Mon, 23 Feb 2026 09:16:48 GMT
════════════════════════
Tags: #threat_intelligence #cyberattack #vulnerability #cybersecurity #hacking
Title: 3 Ways Attackers Monetize Your Leaked Credentials Within 24 Hours
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
Time: Mon, 23 Feb 2026 09:01:01 GMT
════════════════════════
Tags: #data_breach #cybersecurity #technology #threat_intelligence #infosec
Title: From a Simple Client-Side Mistake to Full Read/Write Access of an Internal Support System.
════════════════════════
𐀪 Author: Yousef Elsheikh
════════════════════════
Time: Mon, 23 Feb 2026 11:01:00 GMT
════════════════════════
Tags: #bug_bounty #bugbounty_writeup #javanoscript #bug_bounty_tips #penetration_testing
Title: The Website Didn’t Need to Be Hacked. It Exposed Itself. Twice.
════════════════════════
𐀪 Author: TEJAS
════════════════════════
Time: Mon, 23 Feb 2026 10:31:22 GMT
════════════════════════
Tags: #cybersecurity #penetration_testing #information_disclosure #ethical_hacking #portswigger
Title: Ligolo-ng Tutorial — Pivoting, Tunneling and Port Forwarding
════════════════════════
𐀪 Author: Ahmed Elmahgob
════════════════════════
Time: Mon, 23 Feb 2026 10:18:07 GMT
════════════════════════
Tags: #red_teaming #ligolo_ng #oscp #pivoting #penetration_testing
Title: Regular Expressions
════════════════════════
𐀪 Author: Citadel Cybersec
════════════════════════
Time: Mon, 23 Feb 2026 09:29:57 GMT
════════════════════════
Tags: #intrusion_detection #regex #regex_for_security #cybersecurity #tryhackme
Title: TryHackMe — OWASP Top 10 2025: Insecure Data Handling (Walkthrough)
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
Time: Mon, 23 Feb 2026 09:20:11 GMT
════════════════════════
Tags: #tryhackme_owasp_top_10 #owasp_top_10 #tryhackme #tryhackme_walkthrough #tryhackme_writeup
Title: icmp walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
Time: Mon, 23 Feb 2026 10:15:13 GMT
════════════════════════
Tags: #cve #ethical_hacking #information_security #cybersecurity #vulnerability
Title: How Exposed Endpoints Increase Risk Across LLM Infrastructure
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Mon, 23 Feb 2026 17:28:00 +0530
════════════════════════
Tags: No_Tags
Title: Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Mon, 23 Feb 2026 15:50:00 +0530
════════════════════════
Tags: No_Tags
Title: Hackers Use Excel Exploit to Hide XWorm 7.2 in JPEG Files, Hijack PCs
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
Time: Mon, 23 Feb 2026 11:54:06 +0000
════════════════════════
Tags: #Security #Malware #Phishing Scam #Cyber Attack #Cybersecurity #Excel #Invoice #Phishing #RAT #Scam #Windows #XWorm
Title: Bypassing CSP via JSONP Callback Injection: Intigriti Challenge 0226 Write-up
════════════════════════
𐀪 Author: marchenaa
════════════════════════
Time: Mon, 23 Feb 2026 11:09:31 GMT
════════════════════════
Tags: #ctf_writeup #intigriti #bug_bounty