Daily Writeups
3.3K subscribers
1 photo
116K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Breaking Stored XSS Through Filter Bypass
════════════════════════
𐀪 Author: Abhishek Kumar
════════════════════════
Time: Sun, 09 Nov 2025 08:20:56 GMT
════════════════════════
Tags: #xss_attack #xss_bypass #cybersecurity #pentesting #web_application_security
Title: How I found SSTI into an AI model due to unsafe argument
════════════════════════
𐀪 Author: JEETPAL
════════════════════════
Time: Sun, 09 Nov 2025 10:51:54 GMT
════════════════════════
Tags: #ai_model #bug_bounty #ssti #bug_bounty_writeup #cybersecurity
Title: JAuth picoCTF
════════════════════════
𐀪 Author: Aderogbarufai
════════════════════════
Time: Sun, 09 Nov 2025 09:57:37 GMT
════════════════════════
Tags: #picoctf #bug_bounty #ctf_writeup #jwt_authentication
Title: Security researchers have identified two sophisticated Android malware strains — BankBot-YNRK and…
════════════════════════
𐀪 Author: SCtoCS
════════════════════════
Time: Sun, 09 Nov 2025 11:43:41 GMT
════════════════════════
Tags: #malware #bankbot #android #cybersecurity
Title: Chaos and Logistic Map Encryption
════════════════════════
𐀪 Author: Prof Bill Buchanan OBE FRSE
════════════════════════
Time: Sun, 09 Nov 2025 11:42:00 GMT
════════════════════════
Tags: #cybersecurity
Title: Cybercriminals Abuse Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
════════════════════════
𐀪 Author: SCtoCS
════════════════════════
Time: Sun, 09 Nov 2025 11:39:48 GMT
════════════════════════
Tags: #remote #cybercriminals #cybersecurity #monitoring_tools
Title: CyberDefenders — Black Basta Lab (Writeup)
════════════════════════
𐀪 Author: Muhammed Alaa
════════════════════════
Time: Sun, 09 Nov 2025 11:39:25 GMT
════════════════════════
Tags: #cyber_kill_chain #cyberdefenders_writeup #splunk #threat_hunting #cybersecurity
Title: Day 1: Rules of engagement
════════════════════════
𐀪 Author: Chloe Bridgens
════════════════════════
Time: Sun, 09 Nov 2025 11:39:16 GMT
════════════════════════
Tags: #cybersecurity
Title: From Phishing to Persistent Malware: Breaking Down the Tax Violation MSI Attack
════════════════════════
𐀪 Author: CipherX9F Security
════════════════════════
Time: Sun, 09 Nov 2025 11:36:58 GMT
════════════════════════
Tags: #cybersecurity #phishing #cipherx9f_security #threat_intelligence #malware_analysis
Title: Digital Landlords
════════════════════════
𐀪 Author: Diogo Vicente Mendes
════════════════════════
Time: Sun, 09 Nov 2025 11:36:47 GMT
════════════════════════
Tags: #artificial_intelligence #cybersecurity #society #technology #startup
Title: HttpTroy Backdoor Poses as VPN Invoice to Infiltrate South Korean Targets
════════════════════════
𐀪 Author: SCtoCS
════════════════════════
Time: Sun, 09 Nov 2025 11:36:03 GMT
════════════════════════
Tags: #httptroy #vpn #backdoor #cybersecurity
Title: Darkhole 1: Full Compromise
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
Time: Sun, 09 Nov 2025 11:35:39 GMT
════════════════════════
Tags: #vulnerable_vm #vulnhub_writeup #vulnhub_walkthrough #cybersecurity
Title: Becoming Nyells: The Girl Who Chose Code, Creativity & Cybersecurity
════════════════════════
𐀪 Author: Nyelliembu
════════════════════════
Time: Sun, 09 Nov 2025 11:32:33 GMT
════════════════════════
Tags: #web_development #cybersecurity #self_improvement #web_design #learning
Title: AD Labs: From Domain-Joined Linux to Compromised DC(AD CS)
════════════════════════
𐀪 Author: Hishamrazak
════════════════════════
Time: Sun, 09 Nov 2025 11:22:30 GMT
════════════════════════
Tags: #cybersecurity #active_directory #red_team #penetration_testing
Title: A Case Study in Digital Forensics | TryHackMe CRM Snatch
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
Time: Sun, 09 Nov 2025 11:48:35 GMT
════════════════════════
Tags: #digital_forensics #tryhackme_writeup #tryhackme_walkthrough #forensics #tryhackme
Title: Unlocking the Hacker’s Arsenal: A Deep Dive into the IHA089 Cybersecurity Toolkit (2025)
════════════════════════
𐀪 Author: Nktechinfo
════════════════════════
Time: Sun, 09 Nov 2025 12:32:00 GMT
════════════════════════
Tags: #ethical_hacking #information_security #technology #cybersecurity #bug_bounty
Title: OWASP Top 10 2025 in a Nutshell
════════════════════════
𐀪 Author: PARADOX
════════════════════════
Time: Sun, 09 Nov 2025 12:05:04 GMT
════════════════════════
Tags: #hacking #penetration_testing #cybersecurity #software_development #bug_bounty
Title: Full Attack Chain: How Chained IDORs on Thrive Global Exposed Confidential Employee Wellness data
════════════════════════
𐀪 Author: Mayur Pandya
════════════════════════
Time: Sun, 09 Nov 2025 12:03:33 GMT
════════════════════════
Tags: #idor #api_security #bug_bounty_tips #bug_bounty #graphql
Title: Self Proccess Injection With CPP
════════════════════════
𐀪 Author: 0xc4t
════════════════════════
Time: Sun, 09 Nov 2025 13:44:31 GMT
════════════════════════
Tags: #process_injection #malware #red_team #hacking #code_injection
Title: How To Detect When Cellphone/Smartphone is Hacked | Professional Hacking Services
════════════════════════
𐀪 Author: BlackHat
════════════════════════
Time: Sun, 09 Nov 2025 13:17:47 GMT
════════════════════════
Tags: #hacking #android #apple #ios #technology
Title: I Got A Phishing Email From ‘Substack’ And I Totally Fell For It
════════════════════════
𐀪 Author: MianAbdul Manan
════════════════════════
Time: Sun, 09 Nov 2025 13:01:33 GMT
════════════════════════
Tags: #substack #phishing #this_happened_to_me #hacking #writing