Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: When a Report Generator Lets You Write the Query (in Production)
════════════════════════
𐀪 Author: Jobson
════════════════════════
Time: Sat, 28 Feb 2026 09:16:20 GMT
════════════════════════
Tags: #vulnerability #sql_injection #hacking #bug_bounty #penetration_testing
Title: The 3 Filters That Turn LeakRadar Into a Bug Bounty Weapon
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
Time: Sat, 28 Feb 2026 09:01:00 GMT
════════════════════════
Tags: #hacking #cybersecurity #bug_bounty_tips #infosec #bug_bounty
Title: Shady Oaks Financial writeup (BFLA) (Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
Time: Sat, 28 Feb 2026 09:58:46 GMT
════════════════════════
Tags: #hacking #ctf #ctf_writeup
Title: Cloning a Bank UI Won’t Hack It! Here’s Why.
════════════════════════
𐀪 Author: Rishabh Srivastava
════════════════════════
Time: Sat, 28 Feb 2026 09:44:33 GMT
════════════════════════
Tags: #web_development #csrf #hacking #security #banking
Title: Certified Ethical Hacking
════════════════════════
𐀪 Author: Gigadexterity
════════════════════════
Time: Sat, 28 Feb 2026 09:41:01 GMT
════════════════════════
Tags: #ethical_hacking #malware #ai #hacking
Title: Wiz Cloud Hunting Games Challenge Writeup: A Complete Cloud Attack Chain
════════════════════════
𐀪 Author: Bpple
════════════════════════
Time: Sat, 28 Feb 2026 09:26:15 GMT
════════════════════════
Tags: #hacking #security #web_development #aws #cloud_computing
Title: Strong Passwords vs Weak Passwords: The Small Habit That Prevents Big Breaches
════════════════════════
𐀪 Author: Rela Lumbini
════════════════════════
Time: Sat, 28 Feb 2026 09:45:55 GMT
════════════════════════
Tags: #digital_security #strong_password #weak_passwords #infosec_write_ups #infosec
Title: Incident Response and Digital Forensics in Cybersecurity
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
Time: Sat, 28 Feb 2026 10:38:17 GMT
════════════════════════
Tags: #penetration_testing #cybersecurity_online #ethical_hacking_course #codered_pro_cybersecurity
Title: SQL Injection Vulnerability in Appointment Check-In Endpoint — Patient Queue Management System…
════════════════════════
𐀪 Author: Ravi Pipalwa
════════════════════════
Time: Sat, 28 Feb 2026 10:23:33 GMT
════════════════════════
Tags: #web_application_security #penetration_testing #sql_injection #cve #cve_hunting
Title: Stored Cross-Site Scripting (XSS) in Reservation Management — SourceCodester Resort Reservation…
════════════════════════
𐀪 Author: Ravi Pipalwa
════════════════════════
Time: Sat, 28 Feb 2026 10:12:49 GMT
════════════════════════
Tags: #cve #xss_attack #cross_site_noscripting #cve_hunting #penetration_testing
Title: Authentication Bypass | TryHackMe Write-up | Farros
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
Time: Sat, 28 Feb 2026 00:00:30 GMT
════════════════════════
Tags: #tryhackme #authenticity #ctf_writeup #farro #security
Title: 1.Scope, Legality, and Ethics of Ethical Hacking
════════════════════════
𐀪 Author: Waqashk
════════════════════════
Time: Sat, 28 Feb 2026 10:47:32 GMT
════════════════════════
Tags: #ethical_hacking
Title: SOC336 — Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025–21298)
════════════════════════
𐀪 Author: Pablo Rodriguez Sanz
════════════════════════
Time: Sat, 28 Feb 2026 09:44:06 GMT
════════════════════════
Tags: #soc_analyst #blue_team #rce #lets_defend
Title: 5 IoT Vulnerabilities That Stop Projects and How to Avoid Them
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
Time: Sat, 28 Feb 2026 12:35:37 +0000
════════════════════════
Tags: #Security #Technology #Cybersecurity #IoT #Vulnerability
Title: “Bug Bounty Bootcamp #26: SQL Injection Fundamentals — Learning to Speak the Database’s Language”
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
Time: Sat, 28 Feb 2026 12:12:23 GMT
════════════════════════
Tags: #hacking #cybersecurity #technology #bug_bounty #programming
Title: How I Earned a €700 Bounty from an Information Disclosure Vulnerability
════════════════════════
𐀪 Author: DOD cyber solutions
════════════════════════
Time: Sat, 28 Feb 2026 11:23:27 GMT
════════════════════════
Tags: #technology #cybersecurity #bug_bounty #ethical_hacking
Title: How Hackers Actually Hack You — It’s Simpler Than You Think
════════════════════════
𐀪 Author: Mooki W
════════════════════════
Time: Sat, 28 Feb 2026 12:17:28 GMT
════════════════════════
Tags: #cybersecurity #data_privacy #hacking #technology #online_safety
Title: Security & Privacy Audit: poof.new
════════════════════════
𐀪 Author: Nyakojiru
════════════════════════
Time: Sat, 28 Feb 2026 12:44:31 GMT
════════════════════════
Tags: #infosec #solana_network #web3 #cryptocurrency
Title: Kendi Laboratuvarımda Zafiyet Analizi: Nessus ve Metasploitable
════════════════════════
𐀪 Author: Enes Bayraker
════════════════════════
Time: Sat, 28 Feb 2026 12:03:12 GMT
════════════════════════
Tags: #security_operation_center #cybersecurity #blue_team #penetration_testing #vulnerability
Title: Cloud Security Essentials for Modern Organizations
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
Time: Sat, 28 Feb 2026 11:15:58 GMT
════════════════════════
Tags: #cybersecurity_online #penetration_testing #codered_pro_cybersecurity #hands_on_cybersecurity #ethical_hacking_online
Title: Dari Event Viewer Windows Hingga Serangan Brutal SSH | DFIR Write-up
════════════════════════
𐀪 Author: Muhammad Ketsar Ali Abi Wahid
════════════════════════
Time: Sat, 28 Feb 2026 12:19:38 GMT
════════════════════════
Tags: #information_security #digital_forensics #ethical_hacking #cybersecurity #capture_the_flag