Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Cyber Escalation: Multi-Vector Attacks Surge Following “Operation Epic Fury”
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 03 Mar 2026 08:18:19 +0000
════════════════════════
Tags: #Cyber Security #Cyber Warfare #cybersecurity #Hacktivism #infosec #Iran Cyber Threats #Iron Dome Hack #Operation Epic Fury #Operation Roaring Lion #threat intelligence #Unit 42
Title: The strangest scenario I’ve found: Improper authentication
════════════════════════
𐀪 Author: k4e
════════════════════════
Time: Tue, 03 Mar 2026 08:17:25 GMT
════════════════════════
Tags: #bug_bounty_writeup #bug_bounty_tips #bug_bounty
Title: I Made a Store Pay Me to Buy a $1337 Jacket — On Holi.
════════════════════════
𐀪 Author: TEJAS
════════════════════════
Time: Tue, 03 Mar 2026 07:39:30 GMT
════════════════════════
Tags: #cybersecurity #ethical_hacking #hacking #bug_bounty #web_security
Title: The “Intended Behavior” Gaslight: The Broken Reality of Bug Bounty Bureaucracy
════════════════════════
𐀪 Author: Vivek PS
════════════════════════
Time: Tue, 03 Mar 2026 07:22:35 GMT
════════════════════════
Tags: #programming #cybersecurity #artificial_intelligence #web_development #bug_bounty
Title: Mastering Application Security Code Review Today
════════════════════════
𐀪 Author: Application Security Master
════════════════════════
Time: Tue, 03 Mar 2026 07:56:20 GMT
════════════════════════
Tags: #appsecmaster_llc #application_security #code_review_tool
Title: Active Directory Attack Cheat Sheet
════════════════════════
𐀪 Author: jaejun835
════════════════════════
Time: Tue, 03 Mar 2026 08:33:27 GMT
════════════════════════
Tags: #hacking #active_directory #cheatsheet #cybersecurity #pnpt
Title: Is Quantum Encryption the End of Hacking — or Just the Beginning of a New Cybersecurity Era?
════════════════════════
𐀪 Author: R TechReview
════════════════════════
Time: Tue, 03 Mar 2026 07:47:45 GMT
════════════════════════
Tags: #cybersecurity #encryption #hacking #quantum_encryption #end_to_end_encryption
Title: Offensive Security Proving Grounds Write-up: Muddy
════════════════════════
𐀪 Author: Henry Post
════════════════════════
Time: Tue, 03 Mar 2026 07:20:26 GMT
════════════════════════
Tags: #oscp #hacking #oscp_preparation
Title: SMA Terbaik untuk Masa Depan di Bidang IT dan Cyber security
════════════════════════
𐀪 Author: Ali Ridlo
════════════════════════
Time: Tue, 03 Mar 2026 07:14:57 GMT
════════════════════════
Tags: #penetration_testing #ethical_hacking #growth_hacking #hacking
Title: From Streaming Redirect to Suspicious Payload: A Mini Threat Analysis Case Study
════════════════════════
𐀪 Author: ..
════════════════════════
Time: Tue, 03 Mar 2026 07:21:02 GMT
════════════════════════
Tags: #cybersecurity #infosec #threat_analysis
Title: Monitoring AWS Services Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead ‍
════════════════════════
Time: Tue, 03 Mar 2026 08:45:14 GMT
════════════════════════
Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough #cybersecurity #aws_monitoring
Title: Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Tue, 03 Mar 2026 14:50:00 +0530
════════════════════════
Tags: No_Tags
Title: How Insecure JavaScript Handling Leads to DOM-Based Vulnerabilities
════════════════════════
𐀪 Author: Naveen TK
════════════════════════
Time: Tue, 03 Mar 2026 10:45:57 GMT
════════════════════════
Tags: #javanoscript #web_security #cybersecurity #bug_bounty #xss_vulnerability
Title: Anthropic Just Released Claude Code Security, and the Internet Declared Bug Hunting Dead
════════════════════════
𐀪 Author: Muhammad Haider Tallal
════════════════════════
Time: Tue, 03 Mar 2026 09:42:10 GMT
════════════════════════
Tags: #software_engineering #artificial_intelligence #cybersecurity #2026technology #bug_bounty
Title: PNPT OSINT Techniques Cheat Sheet
════════════════════════
𐀪 Author: jaejun835
════════════════════════
Time: Tue, 03 Mar 2026 10:19:41 GMT
════════════════════════
Tags: #hacking #osnit #cybersecurity #pnpt #cheatsheet
Title: PsExec Hunt Lab — Cyberdefenders
════════════════════════
𐀪 Author: Yrddry
════════════════════════
Time: Tue, 03 Mar 2026 09:51:53 GMT
════════════════════════
Tags: #cybersecurity #digital_forensics #hacking #blue_team #ctf_writeup
Title: The Security Gaps Hiding in Everyday IT Operations
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
Time: Tue, 03 Mar 2026 09:43:59 GMT
════════════════════════
Tags: #cyber_security_awareness #cyberattack #cybersecurity #hacking #technology
Title: Linux Local Privilege Escalation — Skills Assessment
════════════════════════
𐀪 Author: Psychopath-Traveler
════════════════════════
Time: Tue, 03 Mar 2026 09:12:31 GMT
════════════════════════
Tags: #ctf_walkthrough #privilege_escalation #penetration_testing #cybersecurity #hacking
Title: How to Download View-Only / Non-Downloadable Videos from Google Drive
════════════════════════
𐀪 Author: Hack Storage
════════════════════════
Time: Tue, 03 Mar 2026 08:54:00 GMT
════════════════════════
Tags: #hacking #hacking_tools #cybersecurity #technology #tutorial
Title: How Security Teams Use LeakRadar to Find Exposures in 10 Minutes
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
Time: Tue, 03 Mar 2026 09:01:01 GMT
════════════════════════
Tags: #enterprise_security #infosec #threat_intelligence #technology #cybersecurity