Daily Writeups – Telegram
Daily Writeups
3.32K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: TryHackMe — Intro To Pwntools
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
Time: Fri, 27 Feb 2026 23:09:05 GMT
════════════════════════
Tags: #writeup #ctf_writeup #tryhackme_walkthrough #tryhackme #tryhackme_writeup
Title: Kali Linux Serisi#1: Yeni Başlayanlar İçin Kali Linux Nedir ve Neden Kullanılır?
════════════════════════
𐀪 Author: Şüheda Yavuz
════════════════════════
Time: Sat, 28 Feb 2026 00:10:32 GMT
════════════════════════
Tags: #ethical_hacking #kali_linux #bilgi_güvenliği #linux #siber_guvenlik
Title: File Upload Exploit to Root Access — RootMe TryHackMe
════════════════════════
𐀪 Author: Mohamed Sayed (U S A N)
════════════════════════
Time: Sat, 28 Feb 2026 00:10:30 GMT
════════════════════════
Tags: #file_upload #rce #compromise #privilege_escalation #web_vulnerabilities
Title: Massive SonicWall Reconnaissance Campaign Signals Imminent Ransomware Strikes
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Sat, 28 Feb 2026 01:23:33 +0000
════════════════════════
Tags: #Cybercriminals #Akira ransomware #Attack surface mapping #CVE_2024_53704 #Fog Ransomware #GreyNoise #infosec #reconnaissance #SonicOS #SonicWall #SSL VPN #threat intelligence
Title: AI-Powered Bug Hunting: 20 Tools to Dominate Your Next Recon
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
Time: Sat, 28 Feb 2026 02:41:27 GMT
════════════════════════
Tags: #bug_bounty #ai_tools #ai #ethical_hacking #cybersecurity
Title: 13 Dark Web OSINT Tools You’ll Wish You Knew About Sooner
════════════════════════
𐀪 Author: cybrNK
════════════════════════
Time: Sat, 28 Feb 2026 02:42:09 GMT
════════════════════════
Tags: #osint #cybersecurity #hacking #intelligence #darkweb
Title: Phone Numbers Hide DARK SECRETS. This Chrome Hack Exposes Them Instantly!
════════════════════════
𐀪 Author: cybrNK
════════════════════════
Time: Sat, 28 Feb 2026 02:40:39 GMT
════════════════════════
Tags: #chrome #osint #cyber_security_awareness #hacking #cybersecurity
Title: How I completed eJPTv2 in 6 hours ?Tips and Tricks (2026)
════════════════════════
𐀪 Author: ARoy
════════════════════════
Time: Sat, 28 Feb 2026 02:41:22 GMT
════════════════════════
Tags: #ine_security #cybersecurity #infosec #ejpt #my_ejpt_experience
Title: Top 10 Skills Every Ethical Hacker Must Master
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
Time: Sat, 28 Feb 2026 02:40:20 GMT
════════════════════════
Tags: #tech #ethical_hacking #roadmaps #cybersecurity #infosec
Title: What is OS command injection?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
Time: Sat, 28 Feb 2026 02:48:51 GMT
════════════════════════
Tags: #binaryshield #cybersecurity #penetration_testing #os_command_injection #ethical_hacking
Title: What are JWT vulnerabilities?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
Time: Sat, 28 Feb 2026 02:48:14 GMT
════════════════════════
Tags: #jwt #cybersecurity #binaryshield #penetration_testing #ethical_hacking
Title: ️ Unearthing the Truth in DC-1 | From Drupalgeddon to Root ️
════════════════════════
𐀪 Author: Nicholas Mullenski
════════════════════════
Time: Sat, 28 Feb 2026 02:41:50 GMT
════════════════════════
Tags: #technology #penetration_testing #offsec #cybersecurity #ethical_hacking
Title: Ensuring Windows Security
════════════════════════
𐀪 Author: Aj
════════════════════════
Time: Sat, 28 Feb 2026 02:41:48 GMT
════════════════════════
Tags: #windows_security #cybersecurity #penetration_testing #microsoft_windows_series #windows
Title: We Thought It Was Just a Slow Computer… — Until the Ransomware Note Appeared
════════════════════════
𐀪 Author: WEBULITY
════════════════════════
Time: Sat, 28 Feb 2026 00:56:38 GMT
════════════════════════
Tags: #ai_agent #technology #ethical_hacking #blockchain_technology #ransomware
Title: Securing AI-Powered APIs: What API Security Looks Like in the Age of LLMs
════════════════════════
𐀪 Author: Maryblessing
════════════════════════
Time: Sat, 28 Feb 2026 02:19:33 GMT
════════════════════════
Tags: #api_security #llm #ai #cybersecurity #api
Title: Critical CISA Advisory Unmasks Severe Flaws in EV2GO Charging Networks
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Sat, 28 Feb 2026 03:50:05 +0000
════════════════════════
Tags: #Vulnerability Report #CISA advisory #Critical Infrastructure #CVE_2026_24731 #EV Charging Security #EV2GO #ICS #ICSA_26_057_04 #industrial control systems #infosec #OCPP #WebSocket Vulnerability
Title: Lab: DOM XSS in document.write sink using source location.search inside a select element
════════════════════════
𐀪 Author: mayhack
════════════════════════
Time: Sat, 28 Feb 2026 03:39:16 GMT
════════════════════════
Tags: #xss_attack #hacking #cybersecurity #ctf #bug_bounty
Title: Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Sat, 28 Feb 2026 10:27:00 +0530
════════════════════════
Tags: No_Tags
Title: Google Groups OSINT for Pentesting
════════════════════════
𐀪 Author: Abhirup Konwar
════════════════════════
Time: Sat, 28 Feb 2026 06:10:27 GMT
════════════════════════
Tags: #bug_bounty_tips #bug_bounty #hacking #osint #osint_tool
Title: What is Bug Bounty And How Real Hackers Find Bugs
════════════════════════
𐀪 Author: Novashield
════════════════════════
Time: Sat, 28 Feb 2026 05:28:52 GMT
════════════════════════
Tags: #bug_bounty #vulnerability #hacker #cyber_security_awareness #privacy
Title: The path to the core
════════════════════════
𐀪 Author: Progsky
════════════════════════
Time: Sat, 28 Feb 2026 06:49:27 GMT
════════════════════════
Tags: #hacking #cybersecurity #ethical_hacking