Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: SSO Misconfiguration Leading to Privilege Escalation Lead to Full Organization Takeover + SSO Email…
════════════════════════
𐀪 Author: ali alhassoun
════════════════════════
Time: Thu, 05 Mar 2026 23:41:29 GMT
════════════════════════
Tags: #sso #privilege_escalation #bug_bounty #cybersecurity #account_takeover
Title: Malware Development with NIM — InfoStealers 101
════════════════════════
𐀪 Author: Edgar Huemac Sanchez Hernandez
════════════════════════
Time: Fri, 06 Mar 2026 00:49:46 GMT
════════════════════════
Tags: #coding #hacking #cybersecurity #malware #software_development
Title: Wenn gute Hacker ins Gefängnis kommen: Die paradoxe Realität der Cybersecurity in Berlin
════════════════════════
𐀪 Author: Fatihbadem
════════════════════════
Time: Thu, 05 Mar 2026 23:11:49 GMT
════════════════════════
Tags: #hacking #pentesting
Title: Burp Suite : The Beginners Guide
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
Time: Thu, 05 Mar 2026 23:49:36 GMT
════════════════════════
Tags: #linux #linux_tutorial #burpsuite #ethical_hacking
Title: What is Metasploit | The Beginner’s Guide
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
Time: Thu, 05 Mar 2026 23:34:32 GMT
════════════════════════
Tags: #kali_linux #linux #ethical_hacking #metasploit
Title: Server Side Template Injection (SSTI ) Got Exploited
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
Time: Fri, 06 Mar 2026 02:46:00 GMT
════════════════════════
Tags: #bugbounty_writeup #ssti_vulnerability #ethical_hacking #cybersecurity #bug_bounty
Title: Analisis Malware Android: Penyamaran PT POS Indonesia sebagai SMS Stealer.
════════════════════════
𐀪 Author: Damiereee
════════════════════════
Time: Fri, 06 Mar 2026 01:52:55 GMT
════════════════════════
Tags: #bug_bounty #android_pentesting #infosec #malware_analysis #cybersecurity
Title: How I Found a “Zombie Bug” That Refused to Die: A Lesson in Logic Flaws
════════════════════════
𐀪 Author: Abdelkafi Habbeddine
════════════════════════
Time: Fri, 06 Mar 2026 01:25:36 GMT
════════════════════════
Tags: #cybersecurity #bug_bounty
Title: HackMyVM: Skid Walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
Time: Fri, 06 Mar 2026 02:27:12 GMT
════════════════════════
Tags: #ctf_writeup #ctf #hacking #hackmyvm #ctf_walkthrough
Title: From Zero to RF Security Engineer
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
Time: Fri, 06 Mar 2026 02:14:35 GMT
════════════════════════
Tags: #radio #programming #rf_security #hacking
Title: How Hackers Break Into Companies Without Cracking a Single Password
════════════════════════
𐀪 Author: Armansyah hakim
════════════════════════
Time: Fri, 06 Mar 2026 01:08:51 GMT
════════════════════════
Tags: #hacking #data_security #cybersecurity #social_engineering #information_security
Title: Unmasking the Shadows: A Global Hunt for PlugX Staging Infrastructure
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Fri, 06 Mar 2026 03:38:27 +0000
════════════════════════
Tags: #Malware #C2 Procurement #Cloudflare Evasion #cybersecurity #Expired Domains #infosec #Mustang Panda #PlugX #RedDelta #threat intelligence #UNC6384
Title: Unmasking Genisys: The AI-Powered Ad Fraud Scheme Silently Hijacking Your Smartphone
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Fri, 06 Mar 2026 03:27:42 +0000
════════════════════════
Tags: #Malware #AI Fraud #App Spoofing #cybersecurity #digital advertising #Genisys #Google Play Protect #IAS Threat Lab #infosec #malware #Mobile Ad Fraud
Title: Exposed in Plain Sight: Critical Privacy Flaw Defeats Viber’s Anti-Censorship ‘Cloak’ Mode
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Fri, 06 Mar 2026 03:14:15 +0000
════════════════════════
Tags: #Vulnerability Report #Censorship Bypass #Cloak Mode #CVE_2025_13476 #cybersecurity #DPI Evasion #infosec #Patch Alert #Privacy Flaw #Rakuten Viber #TLS Fingerprinting
Title: OpenAI Unveils GPT-5.4: The “Professional” Frontier with Native Computer Control and 1M Token Context
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Fri, 06 Mar 2026 02:19:50 +0000
════════════════════════
Tags: #Technology #AI Agents #API pricing #Computer_Use AI #Context Window #GPT_5.4 #GPT_5.4 Pro #OpenAI #OSWorld #presentation generation #spreadsheet modeling #Tech News 2026
Title: Sovereign & AI-Native: Broadcom’s VMware Telco Cloud Platform 9 Rewrites the TCO Rulebook at MWC 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Fri, 06 Mar 2026 01:56:46 +0000
════════════════════════
Tags: #Technology #5G Core #AI_native #Broadcom #GPU virtualization #MWC 2026 #NVMe Memory Tiering #Sovereign Cloud #TCO reduction #Tech News 2026 #Telco Cloud Platform 9 #vmware #vSAN ESA
Title: The iPhone’s Shadow: Why the MacBook Neo is Trapped with 8GB of RAM and a Single Chip
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Fri, 06 Mar 2026 01:51:55 +0000
════════════════════════
Tags: #Technology #8GB memory #A18 Pro #Apple #entry_level MacBook #iPhone 16 Pro #laptop hardware #MacBook Neo #RAM limits #Tech News 2026 #TSMC InFO_POP
Title: The Cart is Empty: Why OpenAI is Abandoning In-App Shopping to Become an “AI Discovery Engine”
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Fri, 06 Mar 2026 01:41:07 +0000
════════════════════════
Tags: #Technology #AI Shopping #Amazon #ChatGPT #digital advertising #e_commerce #google search #monetization strategy #OpenAI #product discovery #Shopify #Tech News 2026
Title: Bypassing Rate Limits via Race Conditions
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
Time: Fri, 06 Mar 2026 04:04:28 GMT
════════════════════════
Tags: #bug_bounty #brute_force_login #brute_force #race_condition #bypassing_rate_limit
Title: When Deleting One File Deletes Everything: An Unauthenticated BOLA in an AI Analytics Portal
════════════════════════
𐀪 Author: Xp10it
════════════════════════
Time: Fri, 06 Mar 2026 03:46:00 GMT
════════════════════════
Tags: #hacking #cybersecurity #bug_bounty #bug_bounty_tips #bug_bounty_writeup
Title: 5 Mistakes I Made as a Cybersecurity Beginner
════════════════════════
𐀪 Author: loopXvedant
════════════════════════
Time: Fri, 06 Mar 2026 03:31:00 GMT
════════════════════════
Tags: #ctf #bug_bounty #cybersecurity #hacking