Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Assessment Methodologies: Enumeration CTF 1
════════════════════════
𐀪 Author: Prasad
════════════════════════
Time: Wed, 04 Mar 2026 06:33:59 GMT
════════════════════════
Tags: #cybersecurity #bug_bounty #ctf
Title: CeWL vs Crunch: How to Build Smart Wordlists for Bug Bounty Recon
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
Time: Wed, 04 Mar 2026 06:27:07 GMT
════════════════════════
Tags: #hacking #security #bug_bounty #linux #cybersecurity
Title: The Easiest RCE? How One Node.js Variable Creates Chaos
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
Time: Wed, 04 Mar 2026 05:34:09 GMT
════════════════════════
Tags: #cybersecurity #hacking #bug_bounty #bug_bounty_tips #bug_bounty_writeup
Title: Web Application Security: Hands-On Practice (Chapter 13 from The Web Application Hacker’s Handbook)
════════════════════════
𐀪 Author: Aditya Kumar
════════════════════════
Time: Wed, 04 Mar 2026 06:34:28 GMT
════════════════════════
Tags: #hacking #cybersecurity #notes #web_application_security #chapter_13
Title: How Hackers Attack Websites
════════════════════════
𐀪 Author: Saiful Gazi
════════════════════════
Time: Wed, 04 Mar 2026 06:27:09 GMT
════════════════════════
Tags: #web_security #wordpress #cybersecurity #hacking #security
Title: The 3-Day Fast: My Body Ate Itself, and My Focus Spiked 40%
════════════════════════
𐀪 Author: Adi Insights and Innovations
════════════════════════
Time: Wed, 04 Mar 2026 06:19:24 GMT
════════════════════════
Tags: #fasting #personal_development #health #hacking #biohacking
Title: Proven Success with Ethical Hacking Course in Trivandrum Training Center
════════════════════════
𐀪 Author: Niranjandotnot
════════════════════════
Time: Wed, 04 Mar 2026 05:56:06 GMT
════════════════════════
Tags: #hacking
Title: Proving Grounds — Practice — Flimsy
════════════════════════
𐀪 Author: Makoyi
════════════════════════
Time: Wed, 04 Mar 2026 05:00:42 GMT
════════════════════════
Tags: #oscp #penetration_testing #ctf #ethical_hacking
1
Title: TryHackMe Monitoring AWS Services writeup
════════════════════════
𐀪 Author: ayed djalil
════════════════════════
Time: Wed, 04 Mar 2026 06:26:44 GMT
════════════════════════
Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough
Title: Screaming Into the Void Taught Me to Think
════════════════════════
𐀪 Author: Shivani
════════════════════════
Time: Wed, 04 Mar 2026 04:57:12 GMT
════════════════════════
Tags: #twitter #xs #void #critical_thinking #thought_leadership
Title: APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Wed, 04 Mar 2026 13:44:00 +0530
════════════════════════
Tags: No_Tags
Title: Digital Phantoms: Unmasking the Iranian Cyber Syndicates Fueling the 2026 Middle East Conflict
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 07:19:35 +0000
════════════════════════
Tags: #Cyber Security #Check Point Research #Cotton Sandstorm #Educated Manticore #Handala Hack Team #IRGC cyber #Middle East cyberwar 2026 #MOIS #MuddyWater #WezRat #WhiteLock ransomware
Title: The invisible Splinter: How a Hidden Node.js Flaw Bypasses 160 Million Weekly Security Guards
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 07:18:32 +0000
════════════════════════
Tags: #Vulnerability #ClientRequest #CVE_2018_12116 #HackerOne #HTTP request splitting #http_proxy_middleware #Node.js #r3verii #superagent #Tech News 2026 #TOCTOU #Vulnerability Research #web security
Title: Predictable Secrets: The “Null Key” Flaw in Matrix’s Vodozemac Library That Could Expose Conversational History
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 07:17:02 +0000
════════════════════════
Tags: #Vulnerability #cryptographic audit #end_to_end encryption #Matrix #null key attack #Olm #protocol downgrade #Rust security #Soatok #Tech News 2026 #Vodozemac #X25519
Title: The Trust Trap: How Hackers Weaponize Legitimate Google and Microsoft Login Pages via OAuth Redirection
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 07:15:05 +0000
════════════════════════
Tags: #Cybercriminals #Credential Theft #DLL Sideloading #EvilProxy #Google Accounts #Microsoft Defender #Microsoft Entra ID #OAuth redirection #phishing 2026 #RFC 6749 #Tech News 2026
Title: The Unstoppable Hive: Aeternum C2 Abandons Servers to Command Botnets via the Polygon Blockchain
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 07:12:57 +0000
════════════════════════
Tags: #Malware #Aeternum C2 #Anti_Virtualization #BOTNET #C2 Infrastructure #cybersecurity #decentralization #Kleenscan #Polygon Blockchain #Qrator Labs #smart contracts #Tech News 2026
Title: Man’s Best Friend or Trojan Horse? Critical “Root” Flaws Unmasked in Unitree Robotic Canines
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 07:10:23 +0000
════════════════════════
Tags: #Vulnerability #CVE_2026_27509 #CVE_2026_27510 #Eclipse CycloneDDS #hardware hacking #IoT vulnerabilities #Python injection #remote code execution #robotic security #Tech News 2026 #Unitree Go2
Title: The Skeleton Key: How Google’s “Safe” Maps Keys Silently Became Gemini Credentials
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 07:09:01 +0000
════════════════════════
Tags: #Data Leak #AIStudio #API key security #cybersecurity research #Data Breach 2026 #firebase #Gemini API #google cloud #privilege escalation #Tech News 2026 #Truffle Security
Title: Jumping the Gap: APT37’s “Ruby Jumper” Campaign Weaponizes Cloud Storage and USBs to Breach Isolated Networks
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 07:01:03 +0000
════════════════════════
Tags: #Cybercriminals #air_gapped network #APT37 #Cybersecurity 2026 #RESTLEAF #Ruby Jumper #ScarCruft #SNAKEDROPPER #THUMBSBD #USB Malware #Velvet Chollima #VIRUSTASK #Zoho WorkDrive #Zscaler ThreatLabz
Title: Context Is Everything: A Practical Guide to XSS
════════════════════════
𐀪 Author: Marduk I Am
════════════════════════
Time: Wed, 04 Mar 2026 08:33:05 GMT
════════════════════════
Tags: #web_security #cross_site_noscripting #cybersecurity #ethical_hacking #bug_bounty
Title: Building an Enterprise .NET 10 API — Part 2: Security & Authentication
════════════════════════
𐀪 Author: Marc Kenneth Lomio & Melrose Mejidana
════════════════════════
Time: Wed, 04 Mar 2026 07:55:40 GMT
════════════════════════
Tags: #user_authorization #user_authentication #application_security