Daily Writeups
3.3K subscribers
1 photo
115K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: HTB — Valentine (OSCP Prep)
════════════════════════
𐀪 Author: serkanbenol
════════════════════════
Time: Mon, 10 Feb 2025 21:17:30 GMT
════════════════════════
Tags: #hacking #hackthebox_writeup #cybersecurity #hackthebox #oscp
Title: Adapting to AI-Powered Cyber Threats with Advanced Defense Strategies
════════════════════════
𐀪 Author: Akshay Chauhan
════════════════════════
Time: Mon, 10 Feb 2025 22:57:04 GMT
════════════════════════
Tags: #cyber_threats_2025 #ai_cyber_security #safaeoen #cybersecurity
Title: Making Tornado Web Server more secure for hosting webapps
════════════════════════
𐀪 Author: Walter Filho
════════════════════════
Time: Mon, 10 Feb 2025 22:44:06 GMT
════════════════════════
Tags: #cybersecurity #devsecops #appsec #web_server #information_security
Title: 10 IOT project ideas
════════════════════════
𐀪 Author: Martin Onyisi
════════════════════════
Time: Mon, 10 Feb 2025 22:17:01 GMT
════════════════════════
Tags: #data_engineering #data_science #cybersecurity #programming #deep_learning
Title: Malware Analyst: Role, Responsibilities, and Essential Skills
════════════════════════
𐀪 Author: Karthikeyan Nagaraj
════════════════════════
Time: Mon, 10 Feb 2025 22:16:57 GMT
════════════════════════
Tags: #cybersecurity #malware_analysis #careers #programming #jobs
Title: ECIH: Handling and Responding to Email Security Incidents
════════════════════════
𐀪 Author: Damian Villarreal
════════════════════════
Time: Mon, 10 Feb 2025 21:57:28 GMT
════════════════════════
Tags: #email #information_security #cybersecurity #information_technology #phishing
Title: NIS-2: Risikomanagement als strategischer Erfolgsfaktor
════════════════════════
𐀪 Author: Gereon Neuhaus
════════════════════════
Time: Mon, 10 Feb 2025 21:52:51 GMT
════════════════════════
Tags: #nis2 #risk_management #business_resilience #nis2_compliance #cybersecurity
Title: Why KALI Linux?
════════════════════════
𐀪 Author: Martin Onyisi
════════════════════════
Time: Mon, 10 Feb 2025 21:47:09 GMT
════════════════════════
Tags: #cybersecurity #data_science #programming #technology #data_engineering
Title: Inherent Vulnerabilities in AI Systems:
════════════════════════
𐀪 Author: Kai Aizen
════════════════════════
Time: Mon, 10 Feb 2025 22:08:34 GMT
════════════════════════
Tags: #llm #social_engineering #chatgpt #ai #penetration_testing
Title: TryHackMe — Smol (Writeup)
════════════════════════
𐀪 Author: ruruuu
════════════════════════
Time: Mon, 10 Feb 2025 21:25:24 GMT
════════════════════════
Tags: #ctf_writeup #tryhackme #tryhackme_walkthrough #cybersecurity #ctf
Title: The Hidden Business Logic Error That Exists On Most E-Commerce Web Application
════════════════════════
𐀪 Author: makarov
════════════════════════
Time: Tue, 11 Feb 2025 00:40:28 GMT
════════════════════════
Tags: #bug_bounty_writeup #business_logic #bug_bounty #web_security
Title: The Hunt for the Xbox Hackers
════════════════════════
𐀪 Author: Friedrich R.
════════════════════════
Time: Mon, 10 Feb 2025 23:52:00 GMT
════════════════════════
Tags: #coding #data_science #programming #crime #hacking
Title: Are CSP Nonces Really Secure? A Deep Dive on .NET
════════════════════════
𐀪 Author: Stanislav Babenko
════════════════════════
Time: Tue, 11 Feb 2025 00:53:10 GMT
════════════════════════
Tags: #dot_net_training #dot_net_framework #dot_net_core #cybersecurity #dot_net_developers
Title: Networking Secure Protocols
════════════════════════
𐀪 Author: Demegorash
════════════════════════
Time: Tue, 11 Feb 2025 00:34:20 GMT
════════════════════════
Tags: #cybersecurity #vpn #ssh #https
Title: Cybersecurity Roadmap 2025 For Navigating the Future of Digital Protection
════════════════════════
𐀪 Author: UniNets
════════════════════════
Time: Tue, 11 Feb 2025 00:29:05 GMT
════════════════════════
Tags: #cybersecurity #cybersecurity_training #cyber_security_awareness #cybersecurity_course
Title: Technical capability notice
════════════════════════
𐀪 Author: renaissance chambara
════════════════════════
Time: Tue, 11 Feb 2025 00:24:31 GMT
════════════════════════
Tags: #uk_politics #apple #cybersecurity
Title: AI vs. Child Online Predators: How ROOST Is Creating An Online Safe Haven For Kids
════════════════════════
𐀪 Author: Kelly Reeves
════════════════════════
Time: Mon, 10 Feb 2025 23:51:34 GMT
════════════════════════
Tags: #ai #technology #parenting #child_online_safety #cybersecurity
Title: Hackers Use Google Tag Manager to Plant Skimmers on Magento Stores
════════════════════════
𐀪 Author: KBS
════════════════════════
Time: Mon, 10 Feb 2025 23:23:44 GMT
════════════════════════
Tags: #google_analytics #sql_injection #cybersecurity #vulnerability
Title: Why Threat Modeling is a Must for Every Developer
════════════════════════
𐀪 Author: Fahad Ali Shaikh
════════════════════════
Time: Mon, 10 Feb 2025 23:21:54 GMT
════════════════════════
Tags: #cybersecurity #cyber_security_awareness #threat_modeling
Title: Shortcuts
════════════════════════
𐀪 Author: phonescaler
════════════════════════
Time: Mon, 10 Feb 2025 11:21:01 GMT
════════════════════════
Tags: #tinder #python #frida #penetration_testing
Title: airgorah: A WiFi auditing software that can perform deauth attacks and passwords cracking
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Tue, 11 Feb 2025 02:10:03 +0000
════════════════════════
Tags: #Ethical Hacking #Network Attacks #WiFi auditing