Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: How to Approach High-Value Authentication Bug Bounty Programs
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
Time: Tue, 24 Feb 2026 10:57:24 GMT
════════════════════════
Tags: #privacy #bug_bounty #hacking #security #cybersecurity
Title: D001 to V001 — Hacked Your Account!
════════════════════════
𐀪 Author: Ghost
════════════════════════
Time: Tue, 24 Feb 2026 10:41:52 GMT
════════════════════════
Tags: #hacking #bug_bounty #penetration_testing
Title: Taking 2FA for 9000$
════════════════════════
𐀪 Author: Anonymous Traiger
════════════════════════
Time: Tue, 24 Feb 2026 10:15:25 GMT
════════════════════════
Tags: #hackerrank #bug_bounty #osint #cybersecurity #jobs
Title: Hacking Active Directory: From Initial Foothold to Domain Admin
════════════════════════
𐀪 Author: Candy Wong
════════════════════════
Time: Tue, 24 Feb 2026 09:51:21 GMT
════════════════════════
Tags: #red_team #purple_team #offensive_security #hacking #active_directory
Title: What One Infected Laptop Reveals About Your Entire Company
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
Time: Tue, 24 Feb 2026 09:01:01 GMT
════════════════════════
Tags: #data_breach #infosec #technology #cybersecurity #enterprise_security
Title: Penetration Test Web Application Security Tips
════════════════════════
𐀪 Author: Application Security Master
════════════════════════
Time: Tue, 24 Feb 2026 09:53:22 GMT
════════════════════════
Tags: #web_penetration_testing #penetration_testing #test_web_application
Title: iOS 9.3.5 Security Research & Penetration Testing
════════════════════════
𐀪 Author: aadhil m
════════════════════════
Time: Tue, 24 Feb 2026 09:01:54 GMT
════════════════════════
Tags: #ethical_hacking #ios_security #legacy_apple_devices #penetration_testing #jailbreaking
Title: Pre-Security (New) TryHackme
════════════════════════
𐀪 Author: FrijolSec
════════════════════════
Time: Tue, 24 Feb 2026 10:34:04 GMT
════════════════════════
Tags: #cybersecurity #tryhackme
Title: Inspect HTML-picoCTF
════════════════════════
𐀪 Author: Vishvambhar ranoshe
════════════════════════
Time: Tue, 24 Feb 2026 09:31:24 GMT
════════════════════════
Tags: #picoctf #cybersecurity_writeups #info_sec_writeups #picoctf_2022
Title: One Invite Feature, One Race Condition — 4 Bugs Later
════════════════════════
𐀪 Author: Raslanco
════════════════════════
Time: Mon, 23 Feb 2026 17:03:06 GMT
════════════════════════
Tags: #bug_bounty_tips #bug_bounty #infosec_write_ups #bug_bounty_writeup #bugs
Title: Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Tue, 24 Feb 2026 17:28:00 +0530
════════════════════════
Tags: No_Tags
Title: Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Tue, 24 Feb 2026 17:22:00 +0530
════════════════════════
Tags: No_Tags
Title: Romanian Hacker Extradited to US Admits Hacking Oregon State Network
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
Time: Tue, 24 Feb 2026 12:26:52 +0000
════════════════════════
Tags: #Cyber Crime #Catalin Dragomir #Cybersecurity #data breach #Oregon #Romania
Title: New ZeroDayRAT Malware Claims Full Monitoring of Android and iOS Devices
════════════════════════
𐀪 Author: Waqas
════════════════════════
Time: Tue, 24 Feb 2026 11:27:50 +0000
════════════════════════
Tags: #Security #Android #Malware #Anatsa #Cybersecurity #Cyberthint #iOS #MaaS #Scam #Spyware #Telegram #ZeroDayRAT
Title: Bug Bounties Are the New Gold Rush (But Most Hunters Will Go Broke)
════════════════════════
𐀪 Author: Joshua Certain
════════════════════════
Time: Tue, 24 Feb 2026 11:08:35 GMT
════════════════════════
Tags: #bug_bounty #cybersecurity #bug_bounty_tips #hackerone
Title: A Structured Penetration Testing Walkthrough Using Metasploitable 2
════════════════════════
𐀪 Author: Charitymkakina
════════════════════════
Time: Tue, 24 Feb 2026 12:46:53 GMT
════════════════════════
Tags: #metasploitable #cybersecurity #penetration_testing
Title: Tryhackme | Vulnerability Capstone Challenge
════════════════════════
𐀪 Author: jaejun835
════════════════════════
Time: Tue, 24 Feb 2026 12:52:32 GMT
════════════════════════
Tags: #tryhackme #rce #ctf_writeup #vulnerability_capstone #vulnerability_management
Title: loly Walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
Time: Tue, 24 Feb 2026 10:55:08 GMT
════════════════════════
Tags: #cybersecurity #ethical_hacking #cve #vulnerability #information_security
Title: What’s On the Menu?: Exploiting the Damn Vulnerable RESTaurant.
════════════════════════
𐀪 Author: Khadijat Suleman
════════════════════════
Time: Tue, 24 Feb 2026 12:15:10 GMT
════════════════════════
Tags: #cybersecurity #api #owasp_api_security_top_10 #hawd #api_security
Title: Sendmarc Releases DMARCbis Fireside Chat Featuring Co-Editor Todd Herr
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
Time: Tue, 24 Feb 2026 14:46:58 +0000
════════════════════════
Tags: #Press Release #CISO #Monitoring
Title: How to Maximize DDoS Readiness with Proactive Protection Strategies
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
Time: Tue, 24 Feb 2026 14:29:21 +0000
════════════════════════
Tags: #Security #Cyber Attack #Cybersecurity #DDOS #DDoS attack #IoT