Daily Writeups – Telegram
Daily Writeups
3.2K subscribers
105K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Tea App Hack: Disassembling The Ridiculous App Source Code
════════════════════════
𐀪 Author: Jan Kammerath
════════════════════════
Time: Fri, 01 Aug 2025 14:50:23 GMT
════════════════════════
Tags: #software_development #technology #programming #hacking #information_security
Title: HTB Starting Point Tier 1 Appointment ve Sequel Makineleri Çözümleri ile Bilinmesi Gerekenler
════════════════════════
𐀪 Author: Burhan Demir
════════════════════════
Time: Fri, 01 Aug 2025 14:33:01 GMT
════════════════════════
Tags: #hackthebox #ctf #cybersecurity #hacking
Title: INSIDE QILIN RANSOMWARE AFFILIATE PANEL
════════════════════════
𐀪 Author: Rakesh Krishnan
════════════════════════
Time: Fri, 01 Aug 2025 13:57:49 GMT
════════════════════════
Tags: #hacking #infosec #ransomware #information_security #cybersecurity
Title: Part 4: “Fileless Persistence” — The Malware That Came to Stay
════════════════════════
𐀪 Author: Kunal Rajour
════════════════════════
Time: Fri, 01 Aug 2025 13:41:35 GMT
════════════════════════
Tags: #cybersecurity #hacking #fileless_malware #windows_security #tech_humor
Title: NodeBlog — HackTheBox
════════════════════════
𐀪 Author: S4ntiHack
════════════════════════
Time: Fri, 01 Aug 2025 13:41:01 GMT
════════════════════════
Tags: #ciberseguridad #pentesting #hackthebox_writeup #hacking #hackthebox
Title: Software Integrity Failures: Are You Unknowingly Serving Malicious Code?
════════════════════════
𐀪 Author: Aravind S V
════════════════════════
Time: Fri, 01 Aug 2025 13:45:20 GMT
════════════════════════
Tags: #cybersecurity #web_development #supply_chain #infosec
Title: DSViper ile Antivirüs Atlama: Adım Adım Rehber
════════════════════════
𐀪 Author: Mikail Güven Çiçek
════════════════════════
Time: Fri, 01 Aug 2025 14:52:36 GMT
════════════════════════
Tags: #dsviper #cybersecurity #obfuscation #cybertool
Title: Facts About Data Breaches Demonstrate Financial Impact
════════════════════════
𐀪 Author: Mitchell Barrick
════════════════════════
Time: Fri, 01 Aug 2025 14:43:43 GMT
════════════════════════
Tags: #cybercrime #cybersecurity #cyber_security_awareness #finance #data_breach
Title: ️ Vulnerability Scanning and Automated Management on Linux Systems
════════════════════════
𐀪 Author: Esra Kayhan
════════════════════════
Time: Fri, 01 Aug 2025 14:42:05 GMT
════════════════════════
Tags: #openvas #linux_security #vulnerability_management #cloud_security_automation #cybersecurity
Title: RoomShield Protocol – Declaration 001
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
Time: Fri, 01 Aug 2025 14:25:10 GMT
════════════════════════
Tags: #entrepreneurship #cybersecurity #coding #deep_learning #machine_learning
Title: CyberArk Workflows — How Accounts, Safes, and Sessions Work Together
════════════════════════
𐀪 Author: Terence Imoma
════════════════════════
Time: Fri, 01 Aug 2025 14:20:00 GMT
════════════════════════
Tags: #privileged_access_mgmt #cyberark #zero_trust #identityaccess_management #cybersecurity
Title: Hacker vs. Hacker — TryHackMe writeup
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
Time: Fri, 01 Aug 2025 14:17:26 GMT
════════════════════════
Tags: #tryhackme #ethical_hacking #ctf_writeup #linux #cybersecurity
Title: Home Lab Chronicles: Part 02 — Suricata IDS/IPS and Squid Transparent Proxy Integration
════════════════════════
𐀪 Author: Suprim Devkota
════════════════════════
Time: Fri, 01 Aug 2025 14:15:10 GMT
════════════════════════
Tags: #squid #cybersecurity #opnsense #suricata #homelab
Title: RoomShield Protocol
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
Time: Fri, 01 Aug 2025 14:14:40 GMT
════════════════════════
Tags: #cybersecurity #coding #data_science #deep_learning #artificial_intelligence
Title: Enterprise Browser DLP: How Mammoth Secures Sensitive Data in Hybrid Work Environments
════════════════════════
𐀪 Author: Mammoth Cyber
════════════════════════
Time: Fri, 01 Aug 2025 14:13:13 GMT
════════════════════════
Tags: #information_security #artificial_intelligence #ai #cybersecurity #data
Title: Why XSS Is Not (Usually) Possible in JSON Responses: Cross-Site Scripting in JSON Responses
════════════════════════
𐀪 Author: Jython
════════════════════════
Time: Fri, 01 Aug 2025 14:37:19 GMT
════════════════════════
Tags: #json_api #xss_attack #penetration_testing #xss_vulnerability #exploitation
Title: Exploiting Misconfigured DNS for Enumeration and Zone Transfer
════════════════════════
𐀪 Author: Mkirahmet
════════════════════════
Time: Fri, 01 Aug 2025 13:51:03 GMT
════════════════════════
Tags: #penetration_testing #hackthebox #hackthebox_walkthrough #ethical_hacking #dns
Title: Comp AI secures $2.6M pre-seed to disrupt SOC 2 market
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
Time: Fri, 01 Aug 2025 14:27:28 +0000
════════════════════════
Tags: #Press Release
Title: Why Domain Monitoring Is Essential for a Company
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
Time: Fri, 01 Aug 2025 16:38:00 GMT
════════════════════════
Tags: #data_breach #cybersecurity #technology #privacy #bug_bounty
Title: How to Install Parrot OS on VMware Workstation 17 (Fix Boot Errors)
════════════════════════
𐀪 Author: Shawn
════════════════════════
Time: Fri, 01 Aug 2025 16:02:55 GMT
════════════════════════
Tags: #linux #pentesting #bug_bounty #cybersecurity #vmware
Title: eJPT Zero to Hero: Post Exploitation CTF 1
════════════════════════
𐀪 Author: Zaynah Smith-DaSilva
════════════════════════
Time: Fri, 01 Aug 2025 16:41:04 GMT
════════════════════════
Tags: #ctf #ctf_writeup #hacking #ejpt #red_team