Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Tryhackme “Tomghost” CTF Writeup
════════════════════════
𐀪 Author: sabR
════════════════════════
Time: Wed, 25 Feb 2026 17:07:22 GMT
════════════════════════
Tags: #pentesting #cybersecurity #ctf_writeup #tryhackme #ctf
Title: Lab: Reflected XSS into Attribute with Angle Brackets HTML-Encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
Time: Wed, 25 Feb 2026 20:16:24 GMT
════════════════════════
Tags: #xss_attack #bug_bounty #cybersecurity #hacking #ctf
Title: The Old Con, Upgraded
════════════════════════
𐀪 Author: Raphael Savastano
════════════════════════
Time: Wed, 25 Feb 2026 19:19:27 GMT
════════════════════════
Tags: #cio #infosec #cybersecurity #fraud_prevention #ciso
Title: VulnOSv2
════════════════════════
𐀪 Author: Rohithrrohi
════════════════════════
Time: Wed, 25 Feb 2026 20:45:02 GMT
════════════════════════
Tags: #vulnos2 #penetration_testing
Title: What Is A Subdomain And How To Perform Subdomain Enumaration?
════════════════════════
𐀪 Author: Kutay Söker
════════════════════════
Time: Wed, 25 Feb 2026 20:22:58 GMT
════════════════════════
Tags: #cybersecurity #web_penetration_testing #attack_surface_management #subdomains_enumeration #penetration_testing
Title: TryHackMe | Defensive Security Intro | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
Time: Wed, 25 Feb 2026 19:48:58 GMT
════════════════════════
Tags: #cybersecurity #tryhackme #cyber_security_awareness #tryhackme_writeup #tryhackme_walkthrough
Title: THM: Vulnerability Capstone
════════════════════════
𐀪 Author: Murad Salem
════════════════════════
Time: Wed, 25 Feb 2026 19:32:14 GMT
════════════════════════
Tags: #tryhackme #vulnerability #cybersecurity #exploit #python
Title: HackTheBox | Dancing | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
Time: Wed, 25 Feb 2026 19:49:26 GMT
════════════════════════
Tags: #htb #hackthebox #hackthebox_walkthrough #hackthebox_writeup #ctf
Title: Why Intelligent Contract Solutions Are Replacing Traditional CLM Systems
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
Time: Wed, 25 Feb 2026 20:11:57 +0000
════════════════════════
Tags: #Technology #Fintech #CLM #Contract Lifecycle Management #Intelligent Contract Solutions
Title: US Sanctions Russian Exploit Broker Over Stolen US Cyber Tools
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
Time: Wed, 25 Feb 2026 19:29:40 +0000
════════════════════════
Tags: #Cyber Crime #Laws & Legalities #Security #Cybersecurity #Operation Zero #US Treasury #USA
Title: Don’t Switch Targets, Here’s How Sticking to One Company Makes You a Better Bug Hunter
════════════════════════
𐀪 Author: Sirat Sami (analyz3r)
════════════════════════
Time: Wed, 25 Feb 2026 21:49:59 GMT
════════════════════════
Tags: #hackerone #bug_bounty
Title: Mythic C2 Framework
════════════════════════
𐀪 Author: Allen Ace
════════════════════════
Time: Wed, 25 Feb 2026 22:22:20 GMT
════════════════════════
Tags: #ethical_hacking #cybersecurity #command_and_control #threat_detection #red_team
Title: North Korea’s Lazarus Group Deploys Medusa Ransomware Against U.S. Healthcare
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 00:06:52 +0000
════════════════════════
Tags: #Cybercriminals #cyber_espionage #Healthcare Cybersecurity #infosec #Lazarus Group #Medusa Ransomware #North Korea APT #RaaS #Ransomware_as_a_Service #Stonefly #threat intelligence
Title: Critical SQL Injection Vulnerability Found in ‘ormar’ Python Library
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 00:00:54 +0000
════════════════════════
Tags: #Vulnerability Report #AppSec #CVE_2026_26198 #database security #FastAPI #infosec #ormar #Patch Alert #Python Security #sql injection #SQLalchemy #Vulnerability
Title: From Shodan Recon to Multiple Security Flaws in the Same Program
════════════════════════
𐀪 Author: Marwan Elshamy
════════════════════════
Time: Thu, 26 Feb 2026 00:47:58 GMT
════════════════════════
Tags: #hackerone #bug_bounty #cybersecurity #shodan #ethical_hacking
Title: Exposing the Hidden Dangers of IoT Bridge Attacks on Smart Home Devices
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
Time: Wed, 25 Feb 2026 23:42:13 GMT
════════════════════════
Tags: #hacking #iot #infosec #cybersecurity #smart_home
Title: 5 Million-Dollar Gaps in Cybersecurity No One Is Filling
════════════════════════
𐀪 Author: J.C. James
════════════════════════
Time: Thu, 26 Feb 2026 00:22:28 GMT
════════════════════════
Tags: #investment #cybersecurity #infosec #ai
Title: TryHackMe Journey — John the Ripper: The Basics (Task 04)
════════════════════════
𐀪 Author: Kevin Li
════════════════════════
Time: Thu, 26 Feb 2026 00:17:59 GMT
════════════════════════
Tags: #tryhackme #python #self_improvement #career_change #cybersecurity
Title: Proving Grounds — Practice — Graph
════════════════════════
𐀪 Author: Makoyi
════════════════════════
Time: Thu, 26 Feb 2026 00:49:54 GMT
════════════════════════
Tags: #oscp #penetration_testing #ethical_hacking #ctf
Title: Intigriti Challenge 2026 — Stored XSS to Admin Flag
════════════════════════
𐀪 Author: Pot4to
════════════════════════
Time: Wed, 25 Feb 2026 23:51:18 GMT
════════════════════════
Tags: #xss_attack #ctf_writeup #xss_vulnerability #ctf #cybersecurity