Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Wed, 25 Feb 2026 23:16:00 +0530
════════════════════════
Tags: No_Tags
Title: Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Wed, 25 Feb 2026 22:30:00 +0530
════════════════════════
Tags: No_Tags
Title: I Built a Recon & Attack Vector Mapper Online Tool for Bug Bounty
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
Time: Wed, 25 Feb 2026 18:15:56 GMT
════════════════════════
Tags: #bug_bounty_tool #bug_bounty #ai #cybersecurity #automation
Title: Zero-click account takeover worth 1500€
════════════════════════
𐀪 Author: Sakshi Rathore
════════════════════════
Time: Wed, 25 Feb 2026 18:14:03 GMT
════════════════════════
Tags: #penetration_testing #cybersecurity #bug_bounty_tips #bug_bounty
Title: Cross-Site Request Forgery Leading to Account Takeover
════════════════════════
𐀪 Author: montaser mohsen
════════════════════════
Time: Wed, 25 Feb 2026 17:42:22 GMT
════════════════════════
Tags: #csrf #account_takeover #bug_bounty #bug_bounty_writeup #bug_bounty_tips
Title: CVE-2026–2256: From AI Prompt to Full System Compromise
════════════════════════
𐀪 Author: Itamar Yochpaz
════════════════════════
Time: Wed, 25 Feb 2026 18:48:19 GMT
════════════════════════
Tags: #hacking #cybersecurity #vulnerability_research #artificial_intelligence #ai_agent
Title: When Your Car Gets Hacked: The Real World of Automotive Cybersecurity
════════════════════════
𐀪 Author: Budhdi Sharma
════════════════════════
Time: Wed, 25 Feb 2026 17:31:12 GMT
════════════════════════
Tags: #automotive_cybersecurity #cybersecurity #self_driving_cars #automotive #hacking
Title: TryHackMe: Web Enumeration Walkthrough
════════════════════════
𐀪 Author: Tega Akperiojire (cyber_with_tega)
════════════════════════
Time: Wed, 25 Feb 2026 18:03:22 GMT
════════════════════════
Tags: #tryhackme #web_enumeration #cybersecurity #tryhackme_walkthrough #reconnaissance
Title: Tryhackme “Tomghost” CTF Writeup
════════════════════════
𐀪 Author: sabR
════════════════════════
Time: Wed, 25 Feb 2026 17:07:22 GMT
════════════════════════
Tags: #pentesting #cybersecurity #ctf_writeup #tryhackme #ctf
Title: Lab: Reflected XSS into Attribute with Angle Brackets HTML-Encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
Time: Wed, 25 Feb 2026 20:16:24 GMT
════════════════════════
Tags: #xss_attack #bug_bounty #cybersecurity #hacking #ctf
Title: The Old Con, Upgraded
════════════════════════
𐀪 Author: Raphael Savastano
════════════════════════
Time: Wed, 25 Feb 2026 19:19:27 GMT
════════════════════════
Tags: #cio #infosec #cybersecurity #fraud_prevention #ciso
Title: VulnOSv2
════════════════════════
𐀪 Author: Rohithrrohi
════════════════════════
Time: Wed, 25 Feb 2026 20:45:02 GMT
════════════════════════
Tags: #vulnos2 #penetration_testing
Title: What Is A Subdomain And How To Perform Subdomain Enumaration?
════════════════════════
𐀪 Author: Kutay Söker
════════════════════════
Time: Wed, 25 Feb 2026 20:22:58 GMT
════════════════════════
Tags: #cybersecurity #web_penetration_testing #attack_surface_management #subdomains_enumeration #penetration_testing
Title: TryHackMe | Defensive Security Intro | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
Time: Wed, 25 Feb 2026 19:48:58 GMT
════════════════════════
Tags: #cybersecurity #tryhackme #cyber_security_awareness #tryhackme_writeup #tryhackme_walkthrough
Title: THM: Vulnerability Capstone
════════════════════════
𐀪 Author: Murad Salem
════════════════════════
Time: Wed, 25 Feb 2026 19:32:14 GMT
════════════════════════
Tags: #tryhackme #vulnerability #cybersecurity #exploit #python
Title: HackTheBox | Dancing | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
Time: Wed, 25 Feb 2026 19:49:26 GMT
════════════════════════
Tags: #htb #hackthebox #hackthebox_walkthrough #hackthebox_writeup #ctf
Title: Why Intelligent Contract Solutions Are Replacing Traditional CLM Systems
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
Time: Wed, 25 Feb 2026 20:11:57 +0000
════════════════════════
Tags: #Technology #Fintech #CLM #Contract Lifecycle Management #Intelligent Contract Solutions
Title: US Sanctions Russian Exploit Broker Over Stolen US Cyber Tools
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
Time: Wed, 25 Feb 2026 19:29:40 +0000
════════════════════════
Tags: #Cyber Crime #Laws & Legalities #Security #Cybersecurity #Operation Zero #US Treasury #USA
Title: Don’t Switch Targets, Here’s How Sticking to One Company Makes You a Better Bug Hunter
════════════════════════
𐀪 Author: Sirat Sami (analyz3r)
════════════════════════
Time: Wed, 25 Feb 2026 21:49:59 GMT
════════════════════════
Tags: #hackerone #bug_bounty
Title: Mythic C2 Framework
════════════════════════
𐀪 Author: Allen Ace
════════════════════════
Time: Wed, 25 Feb 2026 22:22:20 GMT
════════════════════════
Tags: #ethical_hacking #cybersecurity #command_and_control #threat_detection #red_team