Daily Writeups
3.3K subscribers
1 photo
116K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: AI-Powered Cyber threats: How Hackers are using AI for Cyber attacks
════════════════════════
𐀪 Author: Borderless CS
════════════════════════
Time: Tue, 11 Feb 2025 04:52:41 GMT
════════════════════════
Tags: #cyber_threat #cyberattack #cybersecurity #artificial_intelligence
Title: Unauthorized Access to the Uploads Directory in Web Applications
════════════════════════
𐀪 Author: Vikas Rai
════════════════════════
Time: Tue, 11 Feb 2025 04:52:03 GMT
════════════════════════
Tags: #security #web_development #penetration_testing #cybersecurity #ethical_hacking
Title: Apple and Google Remove 20 Malicious Apps Infecting Users with Data-Stealing Malware!
════════════════════════
𐀪 Author: Rutuja Desai
════════════════════════
Time: Tue, 11 Feb 2025 04:35:46 GMT
════════════════════════
Tags: #google_play #app_store #data_breach #malwarealert #cybersecurity
Title: Best Solution to Avoid Phishing attacks in Chicago
════════════════════════
𐀪 Author: Cyber Bark LLC
════════════════════════
Time: Tue, 11 Feb 2025 04:31:41 GMT
════════════════════════
Tags: #usa #cyber_bark_llc #b2b #cybersecurity #phishing
Title: HTB Sherlock Writeup “Loggy”
════════════════════════
𐀪 Author: Joanbrea
════════════════════════
Time: Tue, 11 Feb 2025 04:20:09 GMT
════════════════════════
Tags: #cybersecurity #malware_analysis #reverse_engineering #htb_writeup
Title: LFI to RCE, Web Exploitation - Watcher : TryHackMe Walkthrough
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
Time: Tue, 11 Feb 2025 04:13:49 GMT
════════════════════════
Tags: #web_development #penetration_testing #cybersecurity #tryhackme #tryhackme_walkthrough
Title: Elevating Security and Privacy with ServiceNow Vault
════════════════════════
𐀪 Author: Rachana Gupta
════════════════════════
Time: Tue, 11 Feb 2025 04:08:04 GMT
════════════════════════
Tags: #saas_security #servicenow #cybersecurity #saas #vault
Title: Evil Crow RF: A Portable Radio Frequency Device
════════════════════════
𐀪 Author: mh
════════════════════════
Time: Tue, 11 Feb 2025 06:52:34 +0000
════════════════════════
Tags: #Evil Crow RF #Flipper Zero #Radio Frequency #SDR #Sub_GHz
Title: Selecting A Program for Bug Bounty on HackerOne
════════════════════════
𐀪 Author: the_unlucky_guy
════════════════════════
Time: Tue, 11 Feb 2025 06:30:42 GMT
════════════════════════
Tags: #bug_bounty_tips #bug_bounty_writeup #cybersecurity #hackerone #bug_bounty
Title: Mastering Amass: The Ultimate Recon Toolkit
════════════════════════
𐀪 Author: Muhammad Abdullah Niazi
════════════════════════
Time: Tue, 11 Feb 2025 06:28:15 GMT
════════════════════════
Tags: #bug_bounty_tips #reconnaissance #enumeration #bug_bounty
Title: Finding subdomains that are hidden in the cloud.
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
Time: Tue, 11 Feb 2025 06:25:15 GMT
════════════════════════
Tags: #bug_bounty #hacking #penetration_testing #cybersecurity #cloud
Title: Stored XSS into Onclick Event: Bypassing Angle Brackets, Double Quotes, and Escaped Characters —…
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
Time: Tue, 11 Feb 2025 06:25:04 GMT
════════════════════════
Tags: #exploiting_onclick_xss #bug_bounty #portswigger_xss_lab #stored_xss_bypass #bypass_html_encoding
Title: How to Uncover Hidden Attack Surfaces? Recon part 6
════════════════════════
𐀪 Author: It4chis3c
════════════════════════
Time: Tue, 11 Feb 2025 06:23:17 GMT
════════════════════════
Tags: #bug_bounty #attack_surface #hidden #port_scanning #ip_scans
Title: Bug Bounty Target Selection: How Hackers Find the Most Profitable & Juicy Bugs Before Anyone Else!
════════════════════════
𐀪 Author: Akash Ghosh
════════════════════════
Time: Tue, 11 Feb 2025 06:18:51 GMT
════════════════════════
Tags: #technology #programming #cybersecurity #bug_bounty_writeup #bug_bounty
Title: Threat Hunting Techniques and Generative AI: A Practical Approach
════════════════════════
𐀪 Author: Paritosh
════════════════════════
Time: Tue, 11 Feb 2025 06:20:05 GMT
════════════════════════
Tags: #information_technology #cybersecurity #bug_bounty #threat_hunting #ai
Title: Notify Tutorial for Bug Hunters
════════════════════════
𐀪 Author: AbhirupKonwar
════════════════════════
Time: Tue, 11 Feb 2025 05:11:46 GMT
════════════════════════
Tags: #bug_bounty #cybersecurity #pentesting #hacking #bug_bounty_tips
Title: Unleashing the Power of Delta Executor APK: A Gamer’s Journey
════════════════════════
𐀪 Author: MalikHassan
════════════════════════
Time: Tue, 11 Feb 2025 06:17:22 GMT
════════════════════════
Tags: #application_security #application #application_development #applicant_tracking_system #apps
Title: Linux Privilege Escalation, some ideas from tryhackme machines — part 1
════════════════════════
𐀪 Author: Loaymorad
════════════════════════
Time: Tue, 11 Feb 2025 06:49:28 GMT
════════════════════════
Tags: #tryhackme #bugbounty_writeup #hacking #cybersecurity #penetration_testing
Title: Creating a Code Obfuscation Program For C
════════════════════════
𐀪 Author: Aleksa Zatezalo
════════════════════════
Time: Tue, 11 Feb 2025 06:23:55 GMT
════════════════════════
Tags: #hacking #c #python #code_obfuscation
Title: Understanding XSS (Cross-Site Scripting) — A Complete Guide
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
Time: Tue, 11 Feb 2025 05:12:54 GMT
════════════════════════
Tags: #cross_site_scripting #bugbounty_writeup #xss_attack #hacking #bug_bounty_tips
Title: Do you want to ?
════════════════════════
𐀪 Author: Horizon Secured
════════════════════════
Time: Tue, 11 Feb 2025 06:41:05 GMT
════════════════════════
Tags: #windows_security #active_directory_security #cybersecurity #windows #active_directory