Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Pentesting Android #1: Bongkar Insecure Local Storage di AndroGoat
════════════════════════
𐀪 Author: Ibnu Hibban
════════════════════════
Time: Tue, 03 Mar 2026 02:59:48 GMT
════════════════════════
Tags: #ethical_hacking #cybersecurity #android
Title: How I Reached 1,000+ Followers & 5M Impressions in 50 Days on X (Organically)
════════════════════════
𐀪 Author: Ritesh Roushan
════════════════════════
Time: Tue, 03 Mar 2026 03:31:00 GMT
════════════════════════
Tags: #backend_development #software_development #personal_growth #personal_development #xs
Title: Hacking DVWA: A Deep Dive into Reflected and Stored XSS
════════════════════════
𐀪 Author: Mawira Victor
════════════════════════
Time: Tue, 03 Mar 2026 03:30:24 GMT
════════════════════════
Tags: #reflected_xss #xss_vulnerability #stored_xss #cybersecurity #dvwa
Title: ‍♂️ Pulling Off the Heist: A Methodical HTB Takedown
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
Time: Tue, 03 Mar 2026 06:12:24 GMT
════════════════════════
Tags: #ctf_writeup #hacking #web_security #bug_bounty #cybersecurity
Title: Portswigger Walkthrough Lab: Username enumeration via subtly different responses
════════════════════════
𐀪 Author: Mukilan Baskaran
════════════════════════
Time: Tue, 03 Mar 2026 06:05:26 GMT
════════════════════════
Tags: #portswigger #information_security #hacking #ethical_hacking #bug_bounty
Title: Turning Threat Intelligence into Bug Bounty Gold: A Practical Workflow
════════════════════════
𐀪 Author: Iski
════════════════════════
Time: Tue, 03 Mar 2026 05:54:05 GMT
════════════════════════
Tags: #info_sec_writeups #hacking #bug_bounty #cybersecurity #bug_bounty_tips
Title: From Zero to Recon: How Beginners Can Start Bug Bounty Hunting the Smart Way
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
Time: Tue, 03 Mar 2026 06:21:03 GMT
════════════════════════
Tags: #red_team #infosec #hacking #bug_bounty #cybersecurity
Title: The Secret Bug Hunter Browser Extension Replaced Burp
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
Time: Tue, 03 Mar 2026 05:16:22 GMT
════════════════════════
Tags: #cybersecurity #bug_bounty #bug_bounty_tool #bug_bounty_tips #bug_hunting
Title: Top ethical hacking certification course available online with placement support
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
Time: Tue, 03 Mar 2026 06:39:46 GMT
════════════════════════
Tags: #cybersecurity #ethical_hacking #certification #education #hacking
Title: How Phishing Attacks Work in 2026 — Techniques, Examples & Defence
════════════════════════
𐀪 Author: Kuboid Secure Layer
════════════════════════
Time: Tue, 03 Mar 2026 06:22:21 GMT
════════════════════════
Tags: #cybersecurity #phishing #hacking
Title: Security Importance
════════════════════════
𐀪 Author: Saiful Gazi
════════════════════════
Time: Tue, 03 Mar 2026 05:34:47 GMT
════════════════════════
Tags: #hacking #wordpress #web_development #website_design #security
Title: How Ethical Hacking Books Build a Strong Foundation for Cybersecurity Careers
════════════════════════
𐀪 Author: Emma Jones
════════════════════════
Time: Tue, 03 Mar 2026 05:02:41 GMT
════════════════════════
Tags: #cybersecurity #programming #ethical_hacking #hacking
Title: Solving a Bugforge Challenge — Exploiting LFI in Cafe Club
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
Time: Tue, 03 Mar 2026 06:08:25 GMT
════════════════════════
Tags: #ethical_hacking #bugforge #caido #cybersecurity #web_penetration_testing
Title: OSINT Writeup — Roam the World (500)
════════════════════════
𐀪 Author: Midhun S
════════════════════════
Time: Tue, 03 Mar 2026 05:57:14 GMT
════════════════════════
Tags: #digital_forensics #ethical_hacking #osint #cybersecurity #capture_the_flag
Title: AI Is Now the Biggest Cybersecurity Threat — And the Best Defense.
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
Time: Tue, 03 Mar 2026 05:43:57 GMT
════════════════════════
Tags: #ethical_hacking #ai #cybersecurity #cyber_security_awareness #information_security
Title: THM Room Writeup — Road
════════════════════════
𐀪 Author: Kostas Ereksonas
════════════════════════
Time: Tue, 03 Mar 2026 06:54:28 GMT
════════════════════════
Tags: #tryhackme_walkthrough #tryhackme #tryhackme_writeup #sql_injection #sql
Title: Day 13 :I Tried to Freeze the Database but it Stared Back;)
════════════════════════
𐀪 Author: Issan
════════════════════════
Time: Tue, 03 Mar 2026 06:00:49 GMT
════════════════════════
Tags: #ctf #offensive_security #web_penetration_testing #vapt #sql_injection
Title: Exploiting Server-Side Parameter Pollution in a REST URL
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
Time: Tue, 03 Mar 2026 07:01:54 GMT
════════════════════════
Tags: #bug_bounty #http_parameter_pollution #broken_access_control #account_takeover #bug_bounty_tips
Title: Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Tue, 03 Mar 2026 12:38:00 +0530
════════════════════════
Tags: No_Tags
Title: SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Tue, 03 Mar 2026 12:23:00 +0530
════════════════════════
Tags: No_Tags
Title: Cyber Escalation: Multi-Vector Attacks Surge Following “Operation Epic Fury”
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 03 Mar 2026 08:18:19 +0000
════════════════════════
Tags: #Cyber Security #Cyber Warfare #cybersecurity #Hacktivism #infosec #Iran Cyber Threats #Iron Dome Hack #Operation Epic Fury #Operation Roaring Lion #threat intelligence #Unit 42