Daily Writeups
3.31K subscribers
1 photo
117K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Python Cheatsheet for Cloud Networking Protocols: Handling HTTP, HTTPS, and WebSocket Traffic
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
Time: Tue, 28 Jan 2025 12:00:37 GMT
════════════════════════
Tags: #cybersecurity #penetration_testing #network_security #python_security #intrusion_detection
Title: Python Cheatsheet for Exploit Frameworks: For Pentest Tools and Custom Payload Development
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
Time: Sat, 01 Feb 2025 09:23:00 GMT
════════════════════════
Tags: #cybersecurity #pentest_tools #python_security #ethical_hacking #exploit_development
Title: Python Cheatsheet for Penetration Testing: Automating Exploit Development and Reconnaissance
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
Time: Tue, 04 Feb 2025 01:04:28 GMT
════════════════════════
Tags: #cybersecurity #ethical_hacking #exploit_automation #penetration_testing #python_security
Title: Python Cheatsheet for Exploit Payload Crafting: For Pentest Tools and Offensive Security
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
Time: Tue, 04 Feb 2025 04:49:31 GMT
════════════════════════
Tags: #ethical_hacking #exploit_payloads #pentest_techniques #offensive_security #python_security
Title: Python Web API 5 — Securing Your Python Web API: Authentication and Authorization Techniques
════════════════════════
𐀪 Author: Ayşe Kübra Kuyucu
════════════════════════
Time: Mon, 10 Feb 2025 14:02:07 GMT
════════════════════════
Tags: #api_best_practices #python_security #python_authentication #api_security #web_api_authorization
Title: Reinforcement Learning 20 — Securing Reinforcement Learning Systems: Best Practices in Python
════════════════════════
𐀪 Author: Ayşe Kübra Kuyucu
════════════════════════
Time: Wed, 09 Jul 2025 00:26:02 GMT
════════════════════════
Tags: #machine_learning #best_practices #python_security #cybersecurity #reinforcement_learning
Title: Secure Coding Part 8 — Command Injection Attack: Python eval()
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
Time: Wed, 06 Aug 2025 11:25:56 GMT
════════════════════════
Tags: #application_security #command_injection #web_penetration_testing #secure_coding #python_security
Title: Secure Coding Part 9— Command Injection Attack: Python exec() & Seccomp to the rescue
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
Time: Mon, 11 Aug 2025 15:53:16 GMT
════════════════════════
Tags: #command_injection #application_security #seccomp #python_security #secure_coding
Title: SQL Injection Deep Dive: Techniques, Tricks, Prevention & Python Secure Coding
════════════════════════
𐀪 Author: Vaibhav Tiwari
════════════════════════
Time: Wed, 03 Sep 2025 08:54:37 GMT
════════════════════════
Tags: #cybersecurity #sql_injection #python_security #secure_coding #webexploit
Title: File Path Traversal — Why a one-pass ../ filter fails and how to fix it
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
Time: Tue, 16 Sep 2025 20:49:29 GMT
════════════════════════
Tags: #web_security #path_traversal #application_security #python_security #secure_coding
Title: A Practical Guide to Server-Side Template Injection (SSTI)
════════════════════════
𐀪 Author: Redfox Security
════════════════════════
Time: Sat, 29 Nov 2025 09:06:59 GMT
════════════════════════
Tags: #cybersecurity #penetration_testing #web_security #web_development #python_security
Title: The “lc” Leak: Critical 9.3 Severity LangChain Flaw Turns Prompt Injections into Secret Theft
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 25 Dec 2025 00:22:06 +0000
════════════════════════
Tags: #Vulnerability Report #AI Agents #CVE_2025_68664 #data exfiltration #Environment Variables #Information Disclosure #LangChain #LLM Security #Prompt injection #Python Security #Serialization Injection
Title: n8n Sandbox Escape: How CVE-2025-68668 Turns Workflows into Weapons
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 06 Jan 2026 09:44:11 +0000
════════════════════════
Tags: #Vulnerability Report #CVE_2025_68668 #DevSecOps #n8n #Pyodide #Python Security #rce #Sandbox Escape #Vulnerability Analysis #Workflow Automation
Title: CVE-2025-14026: Forcepoint DLP Flaw Lets Attackers Unchain Restricted Python
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 07 Jan 2026 01:53:23 +0000
════════════════════════
Tags: #Vulnerability Report #Arbitrary Code Execution #CERT/CC #CVE_2025_14026 #DLP (Data Loss Prevention) #Enterprise Security #Forcepoint #Python Security #Sandbox Escape