Daily Writeups
3.3K subscribers
1 photo
116K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: 5 Things We Are Going to Continue to Ignore in 2025
════════════════════════
𐀪 Author: BHIS
════════════════════════
Time: Mon, 10 Feb 2025 16:00:00 +0000
════════════════════════
Tags: #Blue Team #Incident Response #John Strand #Red Team #Webcast Wrap_Up #AI #cloud #penetration testing
Title: Unveiling EXIF Metadata: How to Extract Hidden Information from Images
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
Time: Mon, 10 Feb 2025 16:37:57 GMT
════════════════════════
Tags: #bugcrowd #hacking #2025 #exiftool #bug_bounty
Title: How to Start Your Journey in Bug Bounty Hunting
════════════════════════
𐀪 Author: Vipul Sonule
════════════════════════
Time: Mon, 10 Feb 2025 16:16:08 GMT
════════════════════════
Tags: #tools #bug_bounty #technology #penetration_testing #cybersecurity
Title: STIX/TAXII: The Cybersecurity Game-Changer You’re Not Using Yet!”
════════════════════════
𐀪 Author: Paritosh
════════════════════════
Time: Mon, 10 Feb 2025 15:10:22 GMT
════════════════════════
Tags: #threat_intelligence #hacking #information_technology #cybersecurity #bug_bounty
Title: Ever wanted to be a hacker?
════════════════════════
𐀪 Author: Zaina Haider
════════════════════════
Time: Mon, 10 Feb 2025 16:20:58 GMT
════════════════════════
Tags: #generative_ai_tools #ethical_hacking #ethical_hacking_training #technology #hacking
Title: What’s the Secret? Unpacking Command-Line Argument Manipulation
════════════════════════
𐀪 Author: JustAnother-Engineer
════════════════════════
Time: Mon, 10 Feb 2025 15:46:50 GMT
════════════════════════
Tags: #windows #cybersecurity #security #hacking #technology
Title: Hacking SJCAM4000 via Wi-Fi
════════════════════════
𐀪 Author: Cyber ​​Library
════════════════════════
Time: Mon, 10 Feb 2025 15:03:55 GMT
════════════════════════
Tags: #linux #cameras #hacking #wifi
Title: Cyber Briefing: 2025.02.10
════════════════════════
𐀪 Author: CyberMaterial
════════════════════════
Time: Mon, 10 Feb 2025 15:00:03 GMT
════════════════════════
Tags: #cybersecurity #apple #cyber_briefing #technology #infosec
Title: How to Land a Tech Job: Key Tips for Success
════════════════════════
𐀪 Author: Trent W
════════════════════════
Time: Mon, 10 Feb 2025 16:42:29 GMT
════════════════════════
Tags: #jobs #cybersecurity #business #tech #startup
Title: The Financial Sector’s Quantum Reckoning: Why Europol Is Sounding the Alarm
════════════════════════
𐀪 Author: Jason Nathaniel Ader
════════════════════════
Time: Mon, 10 Feb 2025 16:38:17 GMT
════════════════════════
Tags: #cybersecurity #europol #quantum_computing
Title: Mastering Modern Red Teaming Infrastructure Part 4: Advanced OSINT Techniques, Credential…
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
Time: Mon, 10 Feb 2025 16:23:39 GMT
════════════════════════
Tags: #darkweb #osint #cybersecurity #azure #information_security
Title: Conducting ATT&CK Assessments Based on APTs and Client Business Sectors.
════════════════════════
𐀪 Author: h4rd1n
════════════════════════
Time: Mon, 10 Feb 2025 16:18:15 GMT
════════════════════════
Tags: #threat_intelligence #intelligence #cybersecurity #mitre_attack #detection_engineering
Title: The Role of Penetration Testing in Healthcare Cybersecurity
════════════════════════
𐀪 Author: Gil Vidals
════════════════════════
Time: Mon, 10 Feb 2025 16:18:05 GMT
════════════════════════
Tags: #cybersecurity #hipaa_compliance #hipaa
Title: QRishing: When QR Codes become a Hacker’s best Friend
════════════════════════
𐀪 Author: Pavlović Goran
════════════════════════
Time: Mon, 10 Feb 2025 16:16:56 GMT
════════════════════════
Tags: #qrishing #cybersecurity #cybercrime #cyberattack #qr_code
Title: The Future is Now: 5 Tech Trends Shaping 2025
════════════════════════
𐀪 Author: Asma M.
════════════════════════
Time: Mon, 10 Feb 2025 16:07:26 GMT
════════════════════════
Tags: #artificial_intelligence #technology #technology_trends #cybersecurity #future_of_work
Title: I will write data science, tech, business analyst, cybersecurity, data analytics resume
════════════════════════
𐀪 Author: Amelia_cv
════════════════════════
Time: Mon, 10 Feb 2025 15:57:24 GMT
════════════════════════
Tags: #health #business_anayst #business #data_science #cybersecurity
Title: Denial of Service (DoS) Attacks
════════════════════════
𐀪 Author: Hakob Hakobyan
════════════════════════
Time: Mon, 10 Feb 2025 15:53:24 GMT
════════════════════════
Tags: #cybersecurity #dos_attack #cloud_security #ddos
Title: Simple & Cheap Ways to Schedule Tweets
════════════════════════
𐀪 Author: Chris Craft
════════════════════════
Time: Mon, 10 Feb 2025 15:46:54 GMT
════════════════════════
Tags: #xs #marketing #productivity #automation #twitter
Title: How Bug Bounty Programs Work: The Ultimate Guide
════════════════════════
𐀪 Author: Levente Molnar
════════════════════════
Time: Mon, 10 Feb 2025 18:03:50 GMT
════════════════════════
Tags: #bug_bounty_tips #cybersecurity #ethical_hacking #hacking #bug_bounty
Title: XML-RPC Vulnerability: Easy Exploit, Easy Bounty!
════════════════════════
𐀪 Author: Kerolos Ayman
════════════════════════
Time: Mon, 10 Feb 2025 17:44:26 GMT
════════════════════════
Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips
Title: Exposed API Keys & Config Files in js file! || Bug Bounty
════════════════════════
𐀪 Author: Kerolos Ayman
════════════════════════
Time: Mon, 10 Feb 2025 17:43:42 GMT
════════════════════════
Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty