Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Multi-Step Exploitation Strategies: How Small Bugs Turn Into Critical Bounties
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
Time: Mon, 23 Feb 2026 10:11:59 GMT
════════════════════════
Tags: #security #business #cybersecurity #hacking #bug_bounty
Title: NFC Payment Test at Olympics Will Inspire Mobile Attackers to Go for the Gold
════════════════════════
𐀪 Author: Jimmy Shah
════════════════════════
Time: Mon, 23 Feb 2026 10:29:49 GMT
════════════════════════
Tags: #fuzzing #olympics #nfc_tags #hacking
Title: How Decentralized Codex Security Recovered Our Bitcoin Investment After the December 13 Trading App…
════════════════════════
𐀪 Author: BLOCKCHAIN
════════════════════════
Time: Mon, 23 Feb 2026 10:23:23 GMT
════════════════════════
Tags: #hacking #decentralized_finance #decentralized #security #xcode
Title: How We Made Engineers Love Security
════════════════════════
𐀪 Author: Achraf Ameddah
════════════════════════
Time: Mon, 23 Feb 2026 09:32:23 GMT
════════════════════════
Tags: #security #hacking #software_engineering #ctf #learning
Title: Weekly Threat Intelligence Report 9 Feb 2026
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
Time: Mon, 23 Feb 2026 09:23:08 GMT
════════════════════════
Tags: #infosec #hacking #threat_intelligence #cybersecurity #cyberattack
Title: Analysis of Windows Notepad Remote Code Execution Vulnerability (CVE-2026-20841)
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
Time: Mon, 23 Feb 2026 09:16:48 GMT
════════════════════════
Tags: #threat_intelligence #cyberattack #vulnerability #cybersecurity #hacking
Title: 3 Ways Attackers Monetize Your Leaked Credentials Within 24 Hours
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
Time: Mon, 23 Feb 2026 09:01:01 GMT
════════════════════════
Tags: #data_breach #cybersecurity #technology #threat_intelligence #infosec
Title: From a Simple Client-Side Mistake to Full Read/Write Access of an Internal Support System.
════════════════════════
𐀪 Author: Yousef Elsheikh
════════════════════════
Time: Mon, 23 Feb 2026 11:01:00 GMT
════════════════════════
Tags: #bug_bounty #bugbounty_writeup #javanoscript #bug_bounty_tips #penetration_testing
Title: The Website Didn’t Need to Be Hacked. It Exposed Itself. Twice.
════════════════════════
𐀪 Author: TEJAS
════════════════════════
Time: Mon, 23 Feb 2026 10:31:22 GMT
════════════════════════
Tags: #cybersecurity #penetration_testing #information_disclosure #ethical_hacking #portswigger
Title: Ligolo-ng Tutorial — Pivoting, Tunneling and Port Forwarding
════════════════════════
𐀪 Author: Ahmed Elmahgob
════════════════════════
Time: Mon, 23 Feb 2026 10:18:07 GMT
════════════════════════
Tags: #red_teaming #ligolo_ng #oscp #pivoting #penetration_testing
Title: Regular Expressions
════════════════════════
𐀪 Author: Citadel Cybersec
════════════════════════
Time: Mon, 23 Feb 2026 09:29:57 GMT
════════════════════════
Tags: #intrusion_detection #regex #regex_for_security #cybersecurity #tryhackme
Title: TryHackMe — OWASP Top 10 2025: Insecure Data Handling (Walkthrough)
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
Time: Mon, 23 Feb 2026 09:20:11 GMT
════════════════════════
Tags: #tryhackme_owasp_top_10 #owasp_top_10 #tryhackme #tryhackme_walkthrough #tryhackme_writeup
Title: icmp walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
Time: Mon, 23 Feb 2026 10:15:13 GMT
════════════════════════
Tags: #cve #ethical_hacking #information_security #cybersecurity #vulnerability
Title: How Exposed Endpoints Increase Risk Across LLM Infrastructure
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Mon, 23 Feb 2026 17:28:00 +0530
════════════════════════
Tags: No_Tags
Title: Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Mon, 23 Feb 2026 15:50:00 +0530
════════════════════════
Tags: No_Tags
Title: Hackers Use Excel Exploit to Hide XWorm 7.2 in JPEG Files, Hijack PCs
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
Time: Mon, 23 Feb 2026 11:54:06 +0000
════════════════════════
Tags: #Security #Malware #Phishing Scam #Cyber Attack #Cybersecurity #Excel #Invoice #Phishing #RAT #Scam #Windows #XWorm
Title: Bypassing CSP via JSONP Callback Injection: Intigriti Challenge 0226 Write-up
════════════════════════
𐀪 Author: marchenaa
════════════════════════
Time: Mon, 23 Feb 2026 11:09:31 GMT
════════════════════════
Tags: #ctf_writeup #intigriti #bug_bounty
Title: SAST vs Claude Code Security: A Deep Dive
════════════════════════
𐀪 Author: Brett Crawley
════════════════════════
Time: Mon, 23 Feb 2026 11:01:41 GMT
════════════════════════
Tags: #claude_code #sast #application_security
Title: It was just a staging server: Security Lessons I Learned the Hard Way.
════════════════════════
𐀪 Author: Princewill Onyenanu
════════════════════════
Time: Mon, 23 Feb 2026 12:14:21 GMT
════════════════════════
Tags: #technology #cryptocurrency #cybersecurity #hacking #cloud_computing
Title: Writeup for picoCTF challenge “dont-use-client-side”
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
Time: Mon, 23 Feb 2026 12:01:01 GMT
════════════════════════
Tags: #ctf_writeup #hacking #picoctf #ctf #cybersecurity
Title: How to Find Information About Anyone
════════════════════════
𐀪 Author: mohandika
════════════════════════
Time: Mon, 23 Feb 2026 11:48:06 GMT
════════════════════════
Tags: #personal_data #social_engineering #cybersecurity #unc1069 #hacking