Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: How I Finally Bypass the Banking App Root Detection in Android
════════════════════════
𐀪 Author: Sahil LyfetAstic
════════════════════════
Time: Mon, 23 Feb 2026 23:01:41 GMT
════════════════════════
Tags: #root_android_phone #security #banking #android #hacking
Title: # Approaching Firmware Security Assessments: From Interface Identification to Vulnerability…
════════════════════════
𐀪 Author: Marwan Atia
════════════════════════
Time: Mon, 23 Feb 2026 23:20:20 GMT
════════════════════════
Tags: #infosec #cybersecurity #firmware #penetration_testing #hardware_security
Title: How a Single Exported ContentProvider Can Break an Entire Application’s Security Model
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
Time: Tue, 24 Feb 2026 00:07:08 GMT
════════════════════════
Tags: #cybersecurity #android #android_pentesting #penetration_testing #8ksec
Title: Network Scanning with Scapy: A Beginner’s Guide to ICMP Scanning
════════════════════════
𐀪 Author: Eddie Artis Jr.
════════════════════════
Time: Mon, 23 Feb 2026 23:17:33 GMT
════════════════════════
Tags: #cybersecurity #network_security #computer_networking #penetration_testing #python
Title: Become a Hacker | Tryhackme
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
Time: Mon, 23 Feb 2026 23:48:07 GMT
════════════════════════
Tags: #become_a_hacker #tryhackme
Title: I spent $11. In Ai Agent to recon and exploit
════════════════════════
𐀪 Author: Ahmad A Abdulla
════════════════════════
Time: Tue, 24 Feb 2026 00:01:16 GMT
════════════════════════
Tags: #ai #bug_bounty_tips #information_security #hacker #bugbounty_writeup
Title: Chrome Alert: High-Severity Flaws in Media and Tint Engine Trigger Emergency Update
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 01:49:58 +0000
════════════════════════
Tags: #Vulnerability Report #Chrome Security Update #CVE_2026_3061 #CVE_2026_3062 #CVE_2026_3063 #Cyber Security #google chrome #infosec #out_of_bounds read #Sandbox Escape #Tint Engine #WebGPU
Title: Recon? Fuzzing? Exploitation? No just a web sec write-up.
════════════════════════
𐀪 Author: 123456789uwu
════════════════════════
Time: Tue, 24 Feb 2026 02:41:36 GMT
════════════════════════
Tags: #hackerone #bug_bounty #bug_bounty_writeup #cybersecurity
Title: The Ultimate Public Crime Scene: Why Web3 Hackers Don’t Need Server Logs
════════════════════════
𐀪 Author: Tabrez Mukadam
════════════════════════
Time: Tue, 24 Feb 2026 02:31:01 GMT
════════════════════════
Tags: #web3 #cryptocurrency #cybersecurity #bug_bounty #blockchain
Title: 12 Seconds Is All You Need to Take a Summarized Note!!
════════════════════════
𐀪 Author: Alareqi
════════════════════════
Time: Tue, 24 Feb 2026 02:23:07 GMT
════════════════════════
Tags: #bug_bounty #obsidian #ai #fabric #notes
Title: HackIta: la piattaforma italiana per diventare davvero operativo nel penetration testing
════════════════════════
𐀪 Author: Campamudassir
════════════════════════
Time: Tue, 24 Feb 2026 02:26:16 GMT
════════════════════════
Tags: #linux #penetration_testing #windows #cybersecurity #hacking
Title: Vulnhub: Book-Shelf: 1 Walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
Time: Tue, 24 Feb 2026 01:45:44 GMT
════════════════════════
Tags: #hacking #cybersecurity #ctf_writeup #ctf
Title: Intigriti Challenge 0226 : Stored XSS & CSP Bypass
════════════════════════
𐀪 Author: Achraf (@40rbidd3n)
════════════════════════
Time: Tue, 24 Feb 2026 02:34:29 GMT
════════════════════════
Tags: #ctf #intigriti #xss_attack #bugbounty_writeup #ctf_writeup
Title: Machine-Speed Intrusions: How One Hacker Used DeepSeek and Claude to Scale a Global Campaign
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 03:00:36 +0000
════════════════════════
Tags: #Cybercriminals #@goyaramen #AI Cyberattacks #ARXON #Claude AI #Cyber Security #DeepSeek #Fortinet Vulnerability #HexStrike #infosec #LLM Automation #threat intelligence
Title: Become a Sponsor on Cyber Kalki Matrix — Permanent Visibility in the Cyber Kalki Intelligence…
════════════════════════
𐀪 Author: ElonMuskTheAntichrist
════════════════════════
Time: Tue, 24 Feb 2026 03:32:09 GMT
════════════════════════
Tags: #bug_bounty #ethical_hacking #coding #cybersecurity
Title: Advent of The Relics 1 — A Call from the Museum
════════════════════════
𐀪 Author: Adindazara
════════════════════════
Time: Tue, 24 Feb 2026 04:30:14 GMT
════════════════════════
Tags: #hackthebox_writeup
Title: When /phpmyadmin Isn’t Hidden Anymore: An Exposed Database Panel
════════════════════════
𐀪 Author: Manav
════════════════════════
Time: Tue, 24 Feb 2026 05:31:00 GMT
════════════════════════
Tags: #infosec #penetration_testing #bug_bounty_writeup #bug_bounty
Title: Claude Code Security Found 500 Vulnerabilities. A Smarter Scanner That Still Needs a Human.
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
Time: Tue, 24 Feb 2026 05:55:43 GMT
════════════════════════
Tags: #cybersecurity #claude_code #ai #application_security #careers
Title: How to Prevent SQL Injection in Modern Applications
════════════════════════
𐀪 Author: Mark L. Hill
════════════════════════
Time: Tue, 24 Feb 2026 06:38:51 GMT
════════════════════════
Tags: #sql #web_development #sql_injection #hacking
Title: AoTR2 — Operation Winter Blackout — HackTheBox
════════════════════════
𐀪 Author: Yrddry
════════════════════════
Time: Tue, 24 Feb 2026 06:20:52 GMT
════════════════════════
Tags: #cybersecurity #hackthebox #hacking #ctf_writeup #hackthebox_writeup
Title: Wide OpenClaw: Abusing Loose Permissions for the Powerful AI Assistant
════════════════════════
𐀪 Author: grepStrength
════════════════════════
Time: Tue, 24 Feb 2026 06:05:27 GMT
════════════════════════
Tags: #agentic_ai #cybersecurity #generative_ai_tools #cybersecurity_awareness #hacking