Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Windows Ransomware Investigation - TryHackMe 25 Days of Cyber Security Day 23
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
Time: Mon, 02 Mar 2026 20:21:55 GMT
════════════════════════
Tags: #ethical_hacking #cybersecurity #tryhackme #blue_team #information_security
Title: API Penetration Testing: Exploiting Vulnerabilities in the Damn Vulnerable RESTaurant
════════════════════════
𐀪 Author: Reduan Islam Badhon
════════════════════════
Time: Mon, 02 Mar 2026 20:36:31 GMT
════════════════════════
Tags: #api #owasp_api_security_top_10 #web_security #api_security #owasp_top_10
Title: Securing AI-Powered APIs: What API Security Looks Like in the Age of LLMs
════════════════════════
𐀪 Author: Esther Kenneth
════════════════════════
Time: Mon, 02 Mar 2026 20:35:04 GMT
════════════════════════
Tags: #cybersecurity #api_security #llm #api #ai_agent
Title: Phishing Pages for Zoom and Google Meet Install Monitoring Tool
════════════════════════
𐀪 Author: Waqas
════════════════════════
Time: Mon, 02 Mar 2026 14:31:14 +0000
════════════════════════
Tags: #Security #Malware #Scams and Fraud #Cybersecurity #Employee Monitoring #Google Meet #Scam #Teramind #Windows #Zoom
Title: The Role of a Smart Contract Security Researcher
════════════════════════
𐀪 Author: Abraham
════════════════════════
Time: Mon, 02 Mar 2026 22:19:04 GMT
════════════════════════
Tags: #web3 #blockchain #cybersecurity #bug_bounty #smart_contract_security
Title: The Return of the Yeti (THM) WriteUp Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
Time: Mon, 02 Mar 2026 22:06:22 GMT
════════════════════════
Tags: #tryhackme #ctf_writeup #networking #ctf #hacking
Title: Control a Pack of AI Coding Agents From My Telegram Group Chat
════════════════════════
𐀪 Author: Itay Shmool
════════════════════════
Time: Mon, 02 Mar 2026 21:56:41 GMT
════════════════════════
Tags: #agentic_ai #artificial_intelligence #entrepreneurship #software_engineering #hacking
Title: Why Cyber Attackers Benefit More from AI Technology than Defenders
════════════════════════
𐀪 Author: Matthew.Rosenquist
════════════════════════
Time: Mon, 02 Mar 2026 21:14:33 GMT
════════════════════════
Tags: #hacking #cybercrime #artificial_intelligence #cybersecurity #ai
Title: How API Pen-Testers Approach Systems: Tools, Mindset, and Methodology
════════════════════════
𐀪 Author: Sharon Nicole Dube
════════════════════════
Time: Mon, 02 Mar 2026 22:23:24 GMT
════════════════════════
Tags: #pentesting #api_tool #penetration_testing #api #pentesting_methodology
Title: StuxCTF | TryHackMe | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
Time: Mon, 02 Mar 2026 21:34:07 GMT
════════════════════════
Tags: #python_programming #tryhackme #tryhackme_walkthrough #tryhackme_writeup #file_upload_vulnerability
Title: HackTheBox Academy | SQL Injection Fundamentals | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
Time: Mon, 02 Mar 2026 22:20:51 GMT
════════════════════════
Tags: #htb #hackthebox_writeup #hackthebox_academy #hackthebox_walkthrough #hackthebox
Title: Exposing an Android SMS-to-Telegram Malware: Reverse Engineering a Real OTP Stealer
════════════════════════
𐀪 Author: razzee
════════════════════════
Time: Mon, 02 Mar 2026 22:33:47 GMT
════════════════════════
Tags: #reverse_engineering #android #malware #ethical_hacking #cybersecurity
Title: How I Built a Lightweight Network Packet Analyzer in Python ️‍♂️
════════════════════════
𐀪 Author: Sriman kundu
════════════════════════
Time: Mon, 02 Mar 2026 21:15:06 GMT
════════════════════════
Tags: #python #programming #ethical_hacking #networking #cybersecurity
Title: How API Pen-Testers Approach Systems: Tools, Mindset, and Methodology
════════════════════════
𐀪 Author: Ngobirifalyne
════════════════════════
Time: Mon, 02 Mar 2026 22:48:42 GMT
════════════════════════
Tags: #api_development #api_integration #api #api_security #api_tool
Title: From Learning APIs to Protecting Systems: My API Security Journey
════════════════════════
𐀪 Author: Sharon Nicole Dube
════════════════════════
Time: Mon, 02 Mar 2026 22:24:55 GMT
════════════════════════
Tags: #cyber_security_solutions #api #cybersecurity #cyber_girl #api_security
Title: Securing AI-Powered APIs: What API Security Looks Like in the Age of LLMs
════════════════════════
𐀪 Author: Veronica Peter
════════════════════════
Time: Mon, 02 Mar 2026 21:05:02 GMT
════════════════════════
Tags: #llm #ai #api_security #api
Title: Beyond the Router: How the Zerobotv9 Botnet is Hijacking Enterprise Automation
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 03 Mar 2026 00:42:35 +0000
════════════════════════
Tags: #Malware #Akamai SIRT #CVE_2025_68613 #CVE_2025_7544 #Enterprise Security #infosec #IoT Malware #Mirai botnet #n8n vulnerability #Tenda router flaw #Zerobotv9
Title: High-Severity XSS Flaw in Angular i18n Turns Language Files into Backdoors
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 03 Mar 2026 00:38:48 +0000
════════════════════════
Tags: #Vulnerability Report #Angular #Application Security #Cross_Site Scripting #CVE_2026_27970 #i18n #ICU Messages #infosec #Internationalization #Patch Alert #Web Security #XSS
Title: From Chat App to Dark Web: How Telegram Became the New Hub for Cybercrime
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 03 Mar 2026 00:27:12 +0000
════════════════════════
Tags: #Cybercriminals #Cybercrime #cybersecurity #Cyfirma #dark web #Digital Black Market #Hacktivism #Malware_as_a_Service #ransomware #Telegram #threat intelligence
Title: The Fake Security Checkup: How a Rogue ‘Google’ App Hijacks Your Digital Life
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 03 Mar 2026 00:22:10 +0000
════════════════════════
Tags: #Cybercriminals #browser security #Cyber Threats #cybersecurity #Google_prism #Malwarebytes #mobile surveillance #phishing #PWA malware #social engineering #Tech News
Title: The Invisible Trap: How Hackers Weaponize the Internet’s Root Infrastructure (.arpa) to Bypass Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 03 Mar 2026 00:16:25 +0000
════════════════════════
Tags: #Cybercriminals #.arpa domain #dangling domains #Domain Hijacking #Infoblox #infosec #infrastructure abuse #IPv6 tunnel #phishing #reverse DNS #TDS #traffic distribution system