Daily Writeups – Telegram
Daily Writeups
3.32K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: The New Voice of Fraud: Cybercrime ‘Supergroup’ Recruits Female Callers to Breach Corporate IT Help Desks
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 02 Mar 2026 00:07:43 +0000
════════════════════════
Tags: #Cybercriminals #Cybercrime Recruitment #Help Desk Security #infosec #LAPSUS$ #MFA Bypass #Scattered LAPSUS$ Hunters #Scattered Spider #ShinyHunters #social engineering #Vishing
Title: Google Dismantles UNC2814’s Global Espionage Network Fueled by Google Sheets
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 02 Mar 2026 00:00:13 +0000
════════════════════════
Tags: #Cybercriminals #C2 #China_nexus #Command and Control #cyber_espionage #Google Sheets API #Google Threat Intelligence Group #GRIDTIDE #infosec #Mandiant #Telecommunications Security #UNC2814
Title: Understanding Torch Dark Web Search and Its Role in Onion Discovery
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
Time: Sun, 01 Mar 2026 23:12:57 GMT
════════════════════════
Tags: #osint #darkweb #infosec #cybersecurity
Title: Sensitive Data Exposure Attack Lab: A Hands-On Journey Through Information Leakage and File…
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
Time: Sun, 01 Mar 2026 23:52:07 GMT
════════════════════════
Tags: #python #cybersecurity #ethical_hacking #penetration_testing #web_development
Title: Steel Mountain -TryHackMe Writeup
════════════════════════
𐀪 Author: Hemantha Krishna Challa
════════════════════════
Time: Mon, 02 Mar 2026 00:15:01 GMT
════════════════════════
Tags: #ethical_hacking #tryhackme #cybersecurity #tryhackme_walkthrough #tryhackme_writeup
Title: TryHackMe: Monday Monitor Challenge Room Walkthrough
════════════════════════
𐀪 Author: Drew Arpino
════════════════════════
Time: Mon, 02 Mar 2026 00:01:01 GMT
════════════════════════
Tags: #cybersecurity #wazuh #tryhackme #tryhackme_writeup #tryhackme_walkthrough
Title: Rate Limiting Your Rails API with Rack::Attack gem
════════════════════════
𐀪 Author: Talha Khalid
════════════════════════
Time: Mon, 02 Mar 2026 00:52:59 GMT
════════════════════════
Tags: #api_rate_limiting #api_security #ruby_on_rails #web_development #rubygems
Title: How I Found a Broken Object Level Authorization (BOLA) in a Real Production App
════════════════════════
𐀪 Author: 77r4sed
════════════════════════
Time: Mon, 02 Mar 2026 00:56:04 GMT
════════════════════════
Tags: #bugbounty_writeup #idor_vulnerability #bug_bounty #bug_bounty_hunter #bug_bounty_tips
Title: Day 3 of getting started to become a Master hacker
════════════════════════
𐀪 Author: Nakul
════════════════════════
Time: Mon, 02 Mar 2026 01:03:33 GMT
════════════════════════
Tags: #penetration_testing #beginners_guide #xs #learning_to_hack #bug_bounty
Title: What Is Burp Suite?
════════════════════════
𐀪 Author: Yamini Yadav_369
════════════════════════
Time: Mon, 02 Mar 2026 02:40:12 GMT
════════════════════════
Tags: #penetration_testing #ethical_hacking #application_security #burpsuite #cybersecurity
Title: What is penetration testing? | What is pen testing?
════════════════════════
𐀪 Author: Fatihbadem
════════════════════════
Time: Mon, 02 Mar 2026 01:51:25 GMT
════════════════════════
Tags: #pentesting #hacking #sodusecure #pentest #cybersecurity
Title: How Hackers Attack Cloud Environments
════════════════════════
𐀪 Author: Md Shafiqul Baten Sumon
════════════════════════
Time: Mon, 02 Mar 2026 01:47:55 GMT
════════════════════════
Tags: #cloud_computing #artificial_intelligence #hacking #cloud_security #cybersecurity
Title: OffSec: Moneybox Walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
Time: Mon, 02 Mar 2026 01:15:48 GMT
════════════════════════
Tags: #ctf_writeup #hacking #cybersecurity #ctf #oscp
Title: The 29-Minute Window: Why AI is No Longer Optional in Cybersecurity
════════════════════════
𐀪 Author: Md Rahat Rahman Akas
════════════════════════
Time: Mon, 02 Mar 2026 01:45:23 GMT
════════════════════════
Tags: #infosec #digital_transformation #technology #cybersecurity #artificial_intelligence
Title: 18 Ways to Root a Linux Box; TryHackMe Linux PrivEsc Walkthrough
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
Time: Mon, 02 Mar 2026 02:14:54 GMT
════════════════════════
Tags: #ethical_hacking #tryhackme_walkthrough #linux #penetration_testing #cybersecurity
Title: HTB Keeper Writeup: How a Danish Dessert Unlocked Root Access
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
Time: Mon, 02 Mar 2026 01:12:58 GMT
════════════════════════
Tags: #cybersecurity #hackthebox #ethical_hacking #penetration_testing #ctf
Title: WSTG-CONF-07
════════════════════════
𐀪 Author: Narathama Firmansyah Putra
════════════════════════
Time: Mon, 02 Mar 2026 01:02:52 GMT
════════════════════════
Tags: #owasp #cybersecurity #penetration_testing
Title: How Race condition leading to business logic flaws affecting
════════════════════════
𐀪 Author: Mesalam_17
════════════════════════
Time: Mon, 02 Mar 2026 04:16:43 GMT
════════════════════════
Tags: #bug_bounty #penetration_testing #cybersecurity #hacking #bugbounty_writeup
Title: How I Found a Broken Object Level Authorization (BOLA) in a Real Production App
════════════════════════
𐀪 Author: 77r4sed
════════════════════════
Time: Mon, 02 Mar 2026 03:56:52 GMT
════════════════════════
Tags: #bug_bounty_tips #bug_bounty #technology #programming #cybersecurity
Title: Dystopia 2035: The War on Privacy & Free Speech_Ep. #26–1
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
Time: Mon, 02 Mar 2026 04:44:01 GMT
════════════════════════
Tags: #privacy #security #hacking #national_security #cybersecurity
Title: RPS-(Rock, Paper, Scissors)-picoCTF
════════════════════════
𐀪 Author: Vishvambhar ranoshe
════════════════════════
Time: Mon, 02 Mar 2026 04:41:38 GMT
════════════════════════
Tags: #infosec #picoctf_2022 #info_sec_writeups #picoctf #cybersecurity