Daily Writeups
3.3K subscribers
1 photo
116K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Fake wallet app on Apple store leads to $420,000 theft with nearly 6 BTC stolen
════════════════════════
𐀪 Author: Coin Headlines
════════════════════════
Time: Mon, 13 Apr 2026 21:11:23 GMT
════════════════════════
Tags: #cryptocurrency #hacking #cyber_security_awareness #bitcoin
Title: ENG | TryHackMe Basic Pentesting CTF Solution
════════════════════════
𐀪 Author: Efe Özel
════════════════════════
Time: Mon, 13 Apr 2026 21:03:24 GMT
════════════════════════
Tags: #ctf #cybersecurity #pentesting #hacking #tryhackme
Title: Cybersecurity Technical Writer | Translating Technical Complexity into Business Protection
════════════════════════
𐀪 Author: Petersmuditha
════════════════════════
Time: Mon, 13 Apr 2026 21:56:45 GMT
════════════════════════
Tags: #infosec #data_privacy #cybersecurity #technical_writing #digital_forensics
Title: Blaster v2.0 — A Modular Evolution of a Security Reconnaissance Framework
════════════════════════
𐀪 Author: Muhammad Usman Faridi
════════════════════════
Time: Mon, 13 Apr 2026 21:49:45 GMT
════════════════════════
Tags: #infosec #red_team #cybersecurity #python #hacking_tools
Title: [HackTheBox Sherlocks] OpTinselTrace-4 (Network forensics of Printer traffic)
════════════════════════
𐀪 Author: Chicken0248
════════════════════════
Time: Mon, 13 Apr 2026 21:53:29 GMT
════════════════════════
Tags: #hackthebox #cybersecurity #network_forensics #blue_team #hackthebox_writeup
Title: HackTheBox Sherlocks — OpTinselTrace-3 (Memory dump forensics with volatility)
════════════════════════
𐀪 Author: Chicken0248
════════════════════════
Time: Mon, 13 Apr 2026 21:52:45 GMT
════════════════════════
Tags: #blue_team #digital_forensics #hackthebox_writeup #hackthebox #cybersecurity
Title: HTB University CTF 2025: Tinsel Trouble Clearing Forensics Challenges
════════════════════════
𐀪 Author: Loay Salah
════════════════════════
Time: Mon, 13 Apr 2026 21:28:23 GMT
════════════════════════
Tags: #hackthebox #digital_forensics #network_security #incident_response #hackthebox_writeup
Title: CVE-2023–6972 Wordpress Backup Migration ≤1.3.9 Arbitrary File Deletion Case Study
════════════════════════
𐀪 Author: phantom_hat
════════════════════════
Time: Mon, 13 Apr 2026 22:53:20 GMT
════════════════════════
Tags: #cve #wordpress #rce #exploit #security_research
Title: Blind SQL injection with time delays and information retrieval
════════════════════════
𐀪 Author: Mohamed Ahmed
════════════════════════
Time: Mon, 13 Apr 2026 22:04:18 GMT
════════════════════════
Tags: #sql_injection #cybersecurity #web_security #portswigger #pentesting
Title: Guía de OAuth: Vulnerabilidades, Vectores de Ataque y Seguridad
════════════════════════
𐀪 Author: JPablo13
════════════════════════
Time: Tue, 14 Apr 2026 00:01:01 GMT
════════════════════════
Tags: #technology #web_development #cybersecurity #bug_bounty #hacking
Title: I Saw Someone Build an AI-Powered Kali Lab at BSides San Diego. Then I Built My Own.
════════════════════════
𐀪 Author: erik
════════════════════════
Time: Mon, 13 Apr 2026 23:49:54 GMT
════════════════════════
Tags: #ai #bug_bounty #cybersecurity #docker
Title: JWT Editor: The Burp Suite Extension That Turns Token Testing from Guesswork into a Science
════════════════════════
𐀪 Author: Ajay Yadav
════════════════════════
Time: Mon, 13 Apr 2026 23:36:01 GMT
════════════════════════
Tags: #penetration_testing #ethical_hacking #bug_bounty #web_security #cybersecurity
Title: Regex Injection ve E-posta Parametre Manipülasyonu ile Hesap Ele Geçirme
════════════════════════
𐀪 Author: Şahnur Eren Aloğlu
════════════════════════
Time: Mon, 13 Apr 2026 23:48:07 GMT
════════════════════════
Tags: #regex #web_security #hacking #pentester
Title: We’re Building the Thing Mike Frantzen Is Asking For
════════════════════════
𐀪 Author: R. Demetri Vallejos
════════════════════════
Time: Mon, 13 Apr 2026 23:31:28 GMT
════════════════════════
Tags: #ai #artificial_intelligence #cybersecurity #hacking #computer_science
Title: TryHackMe — Ra: Writeup
════════════════════════
𐀪 Author: Taher Borgi
════════════════════════
Time: Mon, 13 Apr 2026 23:44:22 GMT
════════════════════════
Tags: #active_directory #cybersecurity #ethical_hacking #penetration_testing #tryhackme
Title: Building Secure APIs at Scale: A Practical Guide to SSO, MFA, and RBAC
════════════════════════
𐀪 Author: Vaishnavius Apply
════════════════════════
Time: Mon, 13 Apr 2026 23:28:13 GMT
════════════════════════
Tags: #microservices #oauth #software_engineering #backend_development #api_security
Title: The High-Stakes Return of 0xFFF: ‘notnullOSX’ Stealer Targets macOS Crypto Whales
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 14 Apr 2026 02:30:33 +0000
════════════════════════
Tags: #Malware #0xFFF #alh1mik #ClickFix #Crypto Stealer #cyber_espionage #DeFi Security #Go malware #Hardware Wallet #macOS Malware #Moonlock Lab #notnullOSX
Title: The Billion-Dollar Invite: How UNC1069’s Fake Meetings Hijack Crypto Fortunes
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 14 Apr 2026 02:14:31 +0000
════════════════════════
Tags: #Cybercriminals #BlueNoroff #Cryptocurrency Security #cyber_espionage #macOS Malware #North Korea APT #phishing #Session Hijacking #social engineering #UNC1069 #Web3
Title: Industrial Key Leak: Critical 9.3 CVSS Flaws Expose Mitsubishi’s GENESIS64 and ICONICS Suite
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 14 Apr 2026 01:46:46 +0000
════════════════════════
Tags: #Vulnerability Report #Credential Disclosure #CVE_2025_14815 #CVE_2025_14816 #GENESIS64 #ICONICS Suite #ICS #Industrial Security #infosec #Mitsubishi Electric #SCADA #sql server
Title: Critical SSRF Flaw Discovered in Axios – CVE-2025-62718 (CVSS 9.3)
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 14 Apr 2026 01:35:47 +0000
════════════════════════
Tags: #Vulnerability Report #Axios #CVE_2025_62718 #data exfiltration #Hostname Normalization #infosec #NO_PROXY #Node.js Security #ssrf #vulnerability management #web development
Title: ⚙️ 11. — Method-based Access Control Can Be Circumvented
════════════════════════
𐀪 Author: The4v1
════════════════════════
Time: Tue, 14 Apr 2026 01:15:07 GMT
════════════════════════
Tags: #web_security #cybersecurity #portswigger #bug_bounty