Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: SMA Terbaik untuk Masa Depan di Bidang IT dan Cyber security
════════════════════════
𐀪 Author: Ali Ridlo
════════════════════════
Time: Tue, 03 Mar 2026 07:14:57 GMT
════════════════════════
Tags: #penetration_testing #ethical_hacking #growth_hacking #hacking
Title: From Streaming Redirect to Suspicious Payload: A Mini Threat Analysis Case Study
════════════════════════
𐀪 Author: ..
════════════════════════
Time: Tue, 03 Mar 2026 07:21:02 GMT
════════════════════════
Tags: #cybersecurity #infosec #threat_analysis
Title: Monitoring AWS Services Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead ‍
════════════════════════
Time: Tue, 03 Mar 2026 08:45:14 GMT
════════════════════════
Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough #cybersecurity #aws_monitoring
Title: Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Tue, 03 Mar 2026 14:50:00 +0530
════════════════════════
Tags: No_Tags
Title: How Insecure JavaScript Handling Leads to DOM-Based Vulnerabilities
════════════════════════
𐀪 Author: Naveen TK
════════════════════════
Time: Tue, 03 Mar 2026 10:45:57 GMT
════════════════════════
Tags: #javanoscript #web_security #cybersecurity #bug_bounty #xss_vulnerability
Title: Anthropic Just Released Claude Code Security, and the Internet Declared Bug Hunting Dead
════════════════════════
𐀪 Author: Muhammad Haider Tallal
════════════════════════
Time: Tue, 03 Mar 2026 09:42:10 GMT
════════════════════════
Tags: #software_engineering #artificial_intelligence #cybersecurity #2026technology #bug_bounty
Title: PNPT OSINT Techniques Cheat Sheet
════════════════════════
𐀪 Author: jaejun835
════════════════════════
Time: Tue, 03 Mar 2026 10:19:41 GMT
════════════════════════
Tags: #hacking #osnit #cybersecurity #pnpt #cheatsheet
Title: PsExec Hunt Lab — Cyberdefenders
════════════════════════
𐀪 Author: Yrddry
════════════════════════
Time: Tue, 03 Mar 2026 09:51:53 GMT
════════════════════════
Tags: #cybersecurity #digital_forensics #hacking #blue_team #ctf_writeup
Title: The Security Gaps Hiding in Everyday IT Operations
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
Time: Tue, 03 Mar 2026 09:43:59 GMT
════════════════════════
Tags: #cyber_security_awareness #cyberattack #cybersecurity #hacking #technology
Title: Linux Local Privilege Escalation — Skills Assessment
════════════════════════
𐀪 Author: Psychopath-Traveler
════════════════════════
Time: Tue, 03 Mar 2026 09:12:31 GMT
════════════════════════
Tags: #ctf_walkthrough #privilege_escalation #penetration_testing #cybersecurity #hacking
Title: How to Download View-Only / Non-Downloadable Videos from Google Drive
════════════════════════
𐀪 Author: Hack Storage
════════════════════════
Time: Tue, 03 Mar 2026 08:54:00 GMT
════════════════════════
Tags: #hacking #hacking_tools #cybersecurity #technology #tutorial
Title: How Security Teams Use LeakRadar to Find Exposures in 10 Minutes
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
Time: Tue, 03 Mar 2026 09:01:01 GMT
════════════════════════
Tags: #enterprise_security #infosec #threat_intelligence #technology #cybersecurity
Title: The Illusion of Cloud Security: Why Growing Companies Must Validate Before They Scale
════════════════════════
𐀪 Author: ANSI Technologies
════════════════════════
Time: Tue, 03 Mar 2026 10:19:50 GMT
════════════════════════
Tags: #cloud_security #cyber_risk #penetration_testing #risk_management #vulnerability_assessment
Title: OWASP WSTG Guide: Testing Configuration & Deployment for Web Security
════════════════════════
𐀪 Author: Habibi
════════════════════════
Time: Tue, 03 Mar 2026 10:38:13 GMT
════════════════════════
Tags: #deployment #web_security #ethical_hacking
Title: Best Web Security Mitigations Every Developer Should Follow
════════════════════════
𐀪 Author: Shayaan Khan
════════════════════════
Time: Tue, 03 Mar 2026 09:59:59 GMT
════════════════════════
Tags: #security #technology #ethical_hacking #coding #cybersecurity
Title: Why Most Beginner Hackers Never Make Money (And How to Avoid Their Mistakes)
════════════════════════
𐀪 Author: Satyam Pathania
════════════════════════
Time: Tue, 03 Mar 2026 09:42:35 GMT
════════════════════════
Tags: #ethical_hacking #money #beginner #cybersecurity #technology
Title: RSA Cipher Challenge — Cryptography Writeup
════════════════════════
𐀪 Author: Santhosh Kumar R
════════════════════════
Time: Tue, 03 Mar 2026 09:01:00 GMT
════════════════════════
Tags: #rsa_algorithm #ctf_writeup #cybersecurity #ethical_hacking #cryptography
Title: AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Tue, 03 Mar 2026 17:00:00 +0530
════════════════════════
Tags: No_Tags
Title: Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Tue, 03 Mar 2026 16:40:00 +0530
════════════════════════
Tags: No_Tags
Title: I tried to solve the CTF challenge about login by brute forcing the website
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
Time: Tue, 03 Mar 2026 12:17:31 GMT
════════════════════════
Tags: #hacking #ctf #web_exploitation #brute_force_attack
Title: From a Simple Export Button to Full Data Exposure — Discovering a Broken Access Control in a SaaS…
════════════════════════
𐀪 Author: Dedrknex
════════════════════════
Time: Tue, 03 Mar 2026 12:16:54 GMT
════════════════════════
Tags: #hacking #bugbounty_writeup #cybersecurity #idor #ethical_hacking