Daily Writeups
3.3K subscribers
1 photo
116K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Creating a Code Obfuscation Program For C
════════════════════════
𐀪 Author: Aleksa Zatezalo
════════════════════════
Time: Tue, 11 Feb 2025 06:23:55 GMT
════════════════════════
Tags: #hacking #c #python #code_obfuscation
Title: Understanding XSS (Cross-Site Scripting) — A Complete Guide
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
Time: Tue, 11 Feb 2025 05:12:54 GMT
════════════════════════
Tags: #cross_site_scripting #bugbounty_writeup #xss_attack #hacking #bug_bounty_tips
Title: Do you want to ?
════════════════════════
𐀪 Author: Horizon Secured
════════════════════════
Time: Tue, 11 Feb 2025 06:41:05 GMT
════════════════════════
Tags: #windows_security #active_directory_security #cybersecurity #windows #active_directory
Title: Ransomware vs Malware: What’s the Difference?
════════════════════════
𐀪 Author: Hamza Hanif
════════════════════════
Time: Tue, 11 Feb 2025 06:36:30 GMT
════════════════════════
Tags: #cyberattack #cybercrime #ransomeware #malware #cybersecurity
Title: Nmap as an active reconnaissance technique
════════════════════════
𐀪 Author: Supun Pramuditha Jayawardhana
════════════════════════
Time: Tue, 11 Feb 2025 06:27:00 GMT
════════════════════════
Tags: #ubuntu #nmap #linux #cybersecurity
Title: Best Cyber Security Certifications for Beginners In 2025
════════════════════════
𐀪 Author: Craw Security
════════════════════════
Time: Tue, 11 Feb 2025 06:26:05 GMT
════════════════════════
Tags: #cybersecurity_training #cybersecurity #cybersecurity_course #ethical_hacking #cyber_security_services
Title: HACKER 4 HIRE IS LEGIT This is the best/top professionals hacker for all hacking related issues(…
════════════════════════
𐀪 Author: Madison Wright
════════════════════════
Time: Tue, 11 Feb 2025 06:22:55 GMT
════════════════════════
Tags: #technology #programming #data_science #true_crime #cybersecurity
Title: The “Exam: 312–50 CEHv12-Certified Ethical Hacker: +1000 Exam Practice Questions with Detailed…
════════════════════════
𐀪 Author: james William
════════════════════════
Time: Tue, 11 Feb 2025 06:17:10 GMT
════════════════════════
Tags: #education #cybersecurity
Title: How to Prevent HTTP Parameter Pollution in Laravel: Best Practices & Code Examples
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
Time: Tue, 11 Feb 2025 06:00:34 GMT
════════════════════════
Tags: #cybersecurity #laravel #http_parameter_pollution #penetration_testing #vulnerability
Title: HTTP in detail — TryHackMe
════════════════════════
𐀪 Author: Avinash Nirmalkar
════════════════════════
Time: Tue, 11 Feb 2025 05:23:30 GMT
════════════════════════
Tags: #networking #tryhackme #cybersecurity #tryhackme_walkthrough
Title: 8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Tue, 11 Feb 2025 12:33:00 +0530
════════════════════════
Tags: No_Tags
Title: Gcore Radar report reveals 56% year-on-year increase in DDoS attacks
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
Time: Tue, 11 Feb 2025 07:00:28 +0000
════════════════════════
Tags: #Press Release #Breach and Attack #Report #Research
Title: SAP Security Patch Day February 2025: Multi Vulnerabilities Addressed
════════════════════════
𐀪 Author: do son
════════════════════════
Time: Tue, 11 Feb 2025 07:33:52 +0000
════════════════════════
Tags: #Vulnerability #CVE_2024_38819 #CVE_2024_38820 #CVE_2024_38828 #CVE_2025_0064 #CVE_2025_24876 #CVE_2025_25243 #SAP Security Patch Day
Title: Robust Open Online Safety Tools (ROOST): Tech Giants Unite to Build AI-Era Security Infrastructure
════════════════════════
𐀪 Author: do son
════════════════════════
Time: Tue, 11 Feb 2025 07:23:38 +0000
════════════════════════
Tags: #Technology #Discord #google #OpenAI #Roblox #Robust Open Online Safety Tools #ROOST
Title: HTB: Preignition Walkthrough
════════════════════════
𐀪 Author: Araiz Naqvi
════════════════════════
Time: Tue, 11 Feb 2025 08:09:52 GMT
════════════════════════
Tags: #pentesting #cybersecurity #hackthebox #ethical_hacking #hacking
Title: Exploiting UART to Gain Shell Access on a Security Camera
════════════════════════
𐀪 Author: Horrow
════════════════════════
Time: Tue, 11 Feb 2025 07:16:32 GMT
════════════════════════
Tags: #hardware #cybersecurity #uart #hardware_hacking #hacking
Title: HackTheBox Spookifier Writeup | SSTI Exploit Explained
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
Time: Tue, 11 Feb 2025 07:16:08 GMT
════════════════════════
Tags: #hackthebox #cybersecurity #hackthebox_writeup #hacking #infosec
Title: Securing the Future: A&Q’s Hybrid Network Transition
════════════════════════
𐀪 Author: Joanorifha
════════════════════════
Time: Tue, 11 Feb 2025 08:27:51 GMT
════════════════════════
Tags: #network_security #cybersecurity #network
Title: Beware of IDN homograph attacks: A Deceptive trick that can trap you
════════════════════════
𐀪 Author: zen8labs
════════════════════════
Time: Tue, 11 Feb 2025 08:25:27 GMT
════════════════════════
Tags: #idn #cybersecurity #idn_homograph #it_consulting #zen8labs
Title: Simulation and Testing of Autonomous Cybersecurity Systems: Methodologies for Simulating…
════════════════════════
𐀪 Author: Anahita Tasdighi
════════════════════════
Time: Tue, 11 Feb 2025 08:16:35 GMT
════════════════════════
Tags: #cybersecurity #python #technology #space #javascript