Daily Writeups – Telegram
Daily Writeups
3.21K subscribers
105K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Start Earning with Cybersecurity — Even Before You Graduate
════════════════════════
𐀪 Author: Core Academy
════════════════════════
Time: Fri, 01 Aug 2025 05:54:19 GMT
════════════════════════
Tags: #microsoft #cybersecurity #digital_marketing #google #it
Title: Windows XP Penetration Testing And Exploiting.
════════════════════════
𐀪 Author: Tarunmk
════════════════════════
Time: Fri, 01 Aug 2025 05:07:49 GMT
════════════════════════
Tags: #windows_xp #penetration_testing #msfconsole
Title: TryHackme: Boiler CTF Writeup
════════════════════════
𐀪 Author: Yash Rustagi
════════════════════════
Time: Fri, 01 Aug 2025 05:33:34 GMT
════════════════════════
Tags: #ctf_walkthrough #ctf #privilege_escalation #tryhackme
1
Title: SAP NetWeaver Flaw Exploited: Auto-Color Linux Backdoor Targets US Chemical Company
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Fri, 01 Aug 2025 08:11:25 +0000
════════════════════════
Tags: #Malware #Vulnerability
Title: Cybercrime Fueling War? Thai-Cambodian Conflict Linked to “Cyber Slave” Scams
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Fri, 01 Aug 2025 08:06:27 +0000
════════════════════════
Tags: #Cybercriminals #Cambodia #Conflict #Cyber Slave Camps #cybercrime #Geopolitics #National Security #Scams #Thailand
Title: Critical BIOS Flaws in Lenovo Desktops Expose SMM to Privilege Escalation
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Fri, 01 Aug 2025 08:03:58 +0000
════════════════════════
Tags: #Vulnerability #BIOS #cybersecurity #firmware #IdeaCentre #Insyde Software #Lenovo #privilege escalation #SMM #vulnerability #Yoga AIO
Title: Solving the challenges of a bug bounty program manager (BBPM). Strategic execution for security leaders.
════════════════════════
𐀪 Author: Eleanor Barlow
════════════════════════
Time: Fri, 01 Aug 2025 00:00:00 GMT
════════════════════════
Tags: #Business Insights
Title: Week 7 — Learning Basic Concepts of Cybersecurity
════════════════════════
𐀪 Author: Aang
════════════════════════
Time: Fri, 01 Aug 2025 08:11:23 GMT
════════════════════════
Tags: #bug_bounty_tips #bug_bounty #information_security #information_technology #ethical_hacking
Title: Fixing the BloodHound Startup Error on Kali Linux
════════════════════════
𐀪 Author: Prath
════════════════════════
Time: Fri, 01 Aug 2025 07:32:17 GMT
════════════════════════
Tags: #bloodhound #active_directory #hackthebox #bug_bounty #pentesting
Title: How 3 Free Recon Tools found 40 Bugs — Helped To Score $1200 in Bug Bounties
════════════════════════
𐀪 Author: Rashadul Islam
════════════════════════
Time: Fri, 01 Aug 2025 07:22:11 GMT
════════════════════════
Tags: #cybersecurity #ai #writing #bug_bounty #technology
Title: Hacked the AI, Got the Bounty: Obfuscation & Prompt Injection Techniques for Red Teamers
════════════════════════
𐀪 Author: CyberTechAjju
════════════════════════
Time: Fri, 01 Aug 2025 07:11:24 GMT
════════════════════════
Tags: #bug_bounty #llm #ai #jailbreak #cybersecurity
Title: Getting Started with Sysmon — System Monitoring for Windows
════════════════════════
𐀪 Author: Samuel George
════════════════════════
Time: Thu, 31 Jul 2025 23:25:43 GMT
════════════════════════
Tags: #system_monitor #cyber_security_awareness #application_security #information_security #sysmon
Title: My First 7 Days on TryHackMe
════════════════════════
𐀪 Author: Pawan natekar
════════════════════════
Time: Fri, 01 Aug 2025 08:19:38 GMT
════════════════════════
Tags: #tryhackme #cybersecurity #hackthebox #internet_of_things #hacking
Title: CoinDCX Hack Explained: Hornet’s Role in the Aftermath
════════════════════════
𐀪 Author: Kapil Kathiriya
════════════════════════
Time: Fri, 01 Aug 2025 07:28:21 GMT
════════════════════════
Tags: #exchange #cryptocurrency #security #hacking #blockchain
Title: It is a blessing (Confidential data) in disguise (Part 2)
════════════════════════
𐀪 Author: wh0arey0u
════════════════════════
Time: Fri, 01 Aug 2025 08:56:58 GMT
════════════════════════
Tags: #digital_forensics #cybersecurity #data_exfiltration #dfir
Title: Tracing Crypto: A Forensic Investigator’s Guide
════════════════════════
𐀪 Author: Wehire Laumech Beturaniza
════════════════════════
Time: Fri, 01 Aug 2025 08:51:55 GMT
════════════════════════
Tags: #cybersecurity #digital_forensics #law_enforcement
Title: Top 5 Mistakes of Cybersecurity Small Businesses Make and How to Prevent Them
════════════════════════
𐀪 Author: Zohakashif
════════════════════════
Time: Fri, 01 Aug 2025 08:50:31 GMT
════════════════════════
Tags: #mistakes_to_avoid #cybercrime #cybersecurity #how_to_fix_them #small_business
Title: Siber Güvenlikte Psikolojik Savaş: Sosyal Mühendisliğin Evrimi
════════════════════════
𐀪 Author: enes mercan
════════════════════════
Time: Fri, 01 Aug 2025 08:46:44 GMT
════════════════════════
Tags: #cybersecurity #it
Title: SafeLine WAF + Load Balancing: A Multi-WAF Setup With Failover
════════════════════════
𐀪 Author: Quella
════════════════════════
Time: Fri, 01 Aug 2025 08:33:29 GMT
════════════════════════
Tags: #webdev #safeline_waf #cybersecurity
Title: NCSC CTF 2025 Forensics writeup
════════════════════════
𐀪 Author: Mustafaalzaareer
════════════════════════
Time: Fri, 01 Aug 2025 08:28:46 GMT
════════════════════════
Tags: #digital_forensics #cybersecurity #windows_forensics #network_forensics #dfir