Daily Writeups – Telegram
Daily Writeups
3.21K subscribers
105K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: PenligentAI · 1, August 2025
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
Time: Fri, 01 Aug 2025 08:06:27 GMT
════════════════════════
Tags: #cybersecurity #ai_penetration_testing #penetration_testing #ethical_hacking
Title: Meet the New Wave of AI-Native Security Innovators
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
Time: Fri, 01 Aug 2025 08:04:24 GMT
════════════════════════
Tags: #llm #penetration_testing #ethical_hacking #cybersecurity #ai_penetration_testing
Title: Penligent.ai: Unveiling the Shocking Power and Challenges of LLM‑Based Penetration Testing
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
Time: Fri, 01 Aug 2025 07:59:39 GMT
════════════════════════
Tags: #ai_penetration_testing #penetration_testing #cybersecurity #llm
Title: Vulnerability Assessment and Penetration Testing
════════════════════════
𐀪 Author: Shubhamrawat
════════════════════════
Time: Fri, 01 Aug 2025 07:36:06 GMT
════════════════════════
Tags: #vulnerability_assessment #penetration_testing
Title: Certified Ethical Hacking Course in Calicut — Start Today
════════════════════════
𐀪 Author: bilalinternship
════════════════════════
Time: Fri, 01 Aug 2025 07:01:30 GMT
════════════════════════
Tags: #cybersecurity #ethical_hacking
Title: RCE in Apache OFBiz: What Devs Should Know About CVE-2023–49070
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
Time: Fri, 01 Aug 2025 07:24:14 GMT
════════════════════════
Tags: #vulnerability #rce #cybersecurity
Title: Root-Me: SQL Injection — Authentication
════════════════════════
𐀪 Author: _marwankhodair_
════════════════════════
Time: Fri, 01 Aug 2025 08:16:32 GMT
════════════════════════
Tags: #mssql #sql_server #sql_injection #sql #mysql
Title: Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Fri, 01 Aug 2025 14:14:00 +0530
════════════════════════
Tags: No_Tags
Title: Dork for AI LLM Chatbot
════════════════════════
𐀪 Author: rr-1k
════════════════════════
Time: Fri, 01 Aug 2025 10:26:55 GMT
════════════════════════
Tags: #llm #chatgpt #hacking #ai #bug_bounty
Title: “Burp + Extensions = JS Recon on Steroids: From Endpoints to Exploits”
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
Time: Fri, 01 Aug 2025 09:02:44 GMT
════════════════════════
Tags: #information_security #cybersecurity #ai #infosec #bug_bounty
Title: The Shodan & FOFA Hack No One Wants You to Know About
════════════════════════
𐀪 Author: KonaN
════════════════════════
Time: Fri, 01 Aug 2025 09:01:45 GMT
════════════════════════
Tags: #bug_hunting #bug_bounty #hacking #cybersecurity #penetration_testing
Title: Threat Modeling for Developers
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
Time: Fri, 01 Aug 2025 10:40:31 GMT
════════════════════════
Tags: #application_security #devsecops #threat_modeling #secure_development #software_security
Title: Sandboxing: A Safe Space for Dangerous Code
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
Time: Fri, 01 Aug 2025 10:39:16 GMT
════════════════════════
Tags: #threat_mitigation #isolation #andboxing #application_security #code_security
Title: HTB Challenge — CriticalOps
════════════════════════
𐀪 Author: MEGAZORD
════════════════════════
Time: Fri, 01 Aug 2025 10:43:47 GMT
════════════════════════
Tags: #challenge #htb_writeup #hacking #htb_walkthrough #web
Title: How Misconfigured Computer Accounts Lead to Hidden Privilege Escalation in Active Directory
════════════════════════
𐀪 Author: Sebastian Kandler
════════════════════════
Time: Fri, 01 Aug 2025 10:11:47 GMT
════════════════════════
Tags: #security #hacking #technology #penetration_testing #cybersecurity
Title: Expert Lecture II
════════════════════════
𐀪 Author: unknownman
════════════════════════
Time: Fri, 01 Aug 2025 09:52:58 GMT
════════════════════════
Tags: #cybersecurity #security_operation_center #hacking #penetration_testing #inkor
Title: Top 10 WiFi Hacking Tools Used by Ethical Hackers: Introduction
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
Time: Fri, 01 Aug 2025 09:44:28 GMT
════════════════════════
Tags: #wifihacking #ethical_hacker #wifi_hacking_tools #hacking #hackerslist
Title: The Digital Dojo: Mastering Offensive Security with AI-Powered Python Cyber Ranges
════════════════════════
𐀪 Author: SR
════════════════════════
Time: Fri, 01 Aug 2025 09:33:24 GMT
════════════════════════
Tags: #artificial_intelligence #cybersecurity #security #hacking #python
Title: DLL Injection: It’s Not as Scary as It Sounds
════════════════════════
𐀪 Author: SilentInject
════════════════════════
Time: Fri, 01 Aug 2025 09:06:27 GMT
════════════════════════
Tags: #cybersecurity #reverse_engineering #hacking #dll_injection #software_development
Title: Attacking Windows Credential Manager — HTB Module Walkthrough
════════════════════════
𐀪 Author: Redsnorlax
════════════════════════
Time: Fri, 01 Aug 2025 09:05:28 GMT
════════════════════════
Tags: #hacking #windows #windowscredentialmanager #uac #hackthebox
Title: Storm-2603 Strikes: DNS-Controlled Backdoor Found in Global Ransomware Attacks
════════════════════════
𐀪 Author: CYber VIaz
════════════════════════
Time: Fri, 01 Aug 2025 10:55:38 GMT
════════════════════════
Tags: #ransomware #hacking #cybersecurity #microsoft_security #infosec