Daily Writeups – Telegram
Daily Writeups
3.32K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: picoCTF | Ph4nt0m 1ntrud3r
════════════════════════
𐀪 Author: M.Daffa Hakiki
════════════════════════
Time: Sun, 01 Mar 2026 16:25:54 GMT
════════════════════════
Tags: #cybersecurity #ctf_writeup #ethical_hacking #picoctf
Title: Day 11 — Extracting Data Without Seeing It (Boolean-Based Blind SQL Injection)
════════════════════════
𐀪 Author: Issan
════════════════════════
Time: Sun, 01 Mar 2026 15:15:13 GMT
════════════════════════
Tags: #sql_injection #ethical_hacking #vapt #ctf #pentesting
Title: API SECURITY CONTROLS - Part7
════════════════════════
𐀪 Author: crązŷrąiɲ
════════════════════════
Time: Sun, 01 Mar 2026 16:48:50 GMT
════════════════════════
Tags: #api_security
Title: How I Found 4 Vulnerabilities in 3 Days — Beginner Journey
════════════════════════
𐀪 Author: MhndFi
════════════════════════
Time: Sun, 01 Mar 2026 18:24:35 GMT
════════════════════════
Tags: #bug_bounty #hacking #web_security #infosec #cybersecurity
Title: Backend Mastery: The Real Bug Bounty Superpower (2026 Guide)
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
Time: Sun, 01 Mar 2026 18:16:52 GMT
════════════════════════
Tags: #programming #technology #bug_bounty_tips #bug_bounty #cybersecurity
Title: A Practical Guide to Finding Broken Access Control (BAC)
════════════════════════
𐀪 Author: NullSec
════════════════════════
Time: Sun, 01 Mar 2026 17:44:53 GMT
════════════════════════
Tags: #broken_access_control #bug_bounty_tips #abc #web_app_pentesting #bug_bounty
Title: Running Multiple Bug Bounty Targets at the Same Time — Is It Legal?
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
Time: Sun, 01 Mar 2026 17:37:04 GMT
════════════════════════
Tags: #cybersecurity #bug_bounty #vulnerability #hacking #security
Title: Cyber Threat Profiles of Iranian Threat Actors & Iranian Cyber Proxies
════════════════════════
𐀪 Author: SIMKRA
════════════════════════
Time: Sun, 01 Mar 2026 18:40:47 GMT
════════════════════════
Tags: #war #information_security #threat_intelligence #hacking #cybersecurity
Title: Mitigating Risk in Mendix Applications
════════════════════════
𐀪 Author: Thijs de Jong
════════════════════════
Time: Sun, 01 Mar 2026 18:25:37 GMT
════════════════════════
Tags: #software_development #hacking #security #low_code #mendix
Title: The Edge AI Paradox: Why “Privacy-First” Devices Are a Hacker’s Best Friend
════════════════════════
𐀪 Author: Jose Baena Cobos
════════════════════════
Time: Sun, 01 Mar 2026 18:04:32 GMT
════════════════════════
Tags: #cloud_computing #machine_learning #ai #hacking #cybersecurity
Title: One Time Pad (OTP): The Unbreakable Cipher
════════════════════════
𐀪 Author: Mahdi
════════════════════════
Time: Sun, 01 Mar 2026 18:26:06 GMT
════════════════════════
Tags: #cryptography #programming #cybersecurity #information_security #infosec
Title: From EAP to NTLM: What Happens After 802.1X Reaches the Server
════════════════════════
𐀪 Author: winnietheSUii
════════════════════════
Time: Sun, 01 Mar 2026 17:08:44 GMT
════════════════════════
Tags: #infosec #cybersecurity #network_security #computer_networking
Title: Simple Hack-The-Box Security Architecture Takeaways (Part 1)
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
Time: Sun, 01 Mar 2026 18:20:04 GMT
════════════════════════
Tags: #web_services #penetration_testing #api #hackthebox
Title: Dc4 Write-up
════════════════════════
𐀪 Author: Tugrulakagunduz
════════════════════════
Time: Sun, 01 Mar 2026 17:15:20 GMT
════════════════════════
Tags: #penetration_testing #ethical_hacking #ctf_writeup #exploit #cybersecurity
Title: RootMe — TryHackMe Walkthrough | Complete Beginner-Friendly Write-Up
════════════════════════
𐀪 Author: Sneha
════════════════════════
Time: Sun, 01 Mar 2026 17:14:43 GMT
════════════════════════
Tags: #cybersecurity #penetration_testing
Title: Client-Server Basics
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
Time: Sun, 01 Mar 2026 17:59:33 GMT
════════════════════════
Tags: #client_server_basics #tryhackme
Title: Certified THM SEC1 with the (almost) chaos
════════════════════════
𐀪 Author: Chananya Choosak
════════════════════════
Time: Sun, 01 Mar 2026 17:29:55 GMT
════════════════════════
Tags: #cybersecurity #tryhackme #sec1
Title: From Drupal RCE to Root: DC-1 Walkthrough (Vulnhub)
════════════════════════
𐀪 Author: Satyamsatyarthi
════════════════════════
Time: Sun, 01 Mar 2026 20:19:23 GMT
════════════════════════
Tags: #hacking #vulnhub_walkthrough #cybersecurity #privilege_escalation #labs
Title: Poster Postgres RDBMS (THM) Tryhackme WriteUp Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
Time: Sun, 01 Mar 2026 19:58:11 GMT
════════════════════════
Tags: #hacking #rdbms #tryhackme #postgresql #coding
Title: 10 Administrator-to-SYSTEM Privilege Escalation Techniques Every Red Teamer MUST Master
════════════════════════
𐀪 Author: Candy Wong
════════════════════════
Time: Sun, 01 Mar 2026 16:11:45 GMT
════════════════════════
Tags: #offensive_security #hacking #privilege_escalation #red_team #post_exploitation
Title: The Anatomy of an Insecure Web App: Lessons from a Penetration Test
════════════════════════
𐀪 Author: Joseph Oxan
════════════════════════
Time: Sun, 01 Mar 2026 20:51:29 GMT
════════════════════════
Tags: #ethical_hacking #web_security #penetration_testing #web_development #cybersecurity