How Search Engines Help Us In Bug Bounty
Passive reconnaissance plays an important role in the approach of a target. In comparison to active reconnaissance, passive reconnaissance is the silent, stealthy one, where the attacker doesnโt interact with the target. Instead, they obtain information about the target from other external, third-party sources.
Read Full Article: https://bit.ly/Search_engine_For_Bug_Bounty
@crackcodes
Passive reconnaissance plays an important role in the approach of a target. In comparison to active reconnaissance, passive reconnaissance is the silent, stealthy one, where the attacker doesnโt interact with the target. Instead, they obtain information about the target from other external, third-party sources.
Read Full Article: https://bit.ly/Search_engine_For_Bug_Bounty
@crackcodes
โค3
Forwarded from Tสษชแดแดส Pแดษดษขแดษชษด ( trickypenguin.ink )
[ cPanel CVE-2023-29489 ]
==========================
Finding XSS in a million websites (cPanel CVE-2023-29489)
READ ARTICLE
==========================
[ Telegram Channel : @trickypenguin ]
[ Website : trickypenguin.ink ]
[ Share & Support ]
==========================
==========================
Finding XSS in a million websites (cPanel CVE-2023-29489)
READ ARTICLE
==========================
[ Telegram Channel : @trickypenguin ]
[ Website : trickypenguin.ink ]
[ Share & Support ]
==========================
โคโ๐ฅ5โค2
Forwarded from INDIAN CYBER MAFIA
Forensic Science Laboratory KP Police Govt. Of Pakistan Hacked
https://rfslswat.gov.pk
https://mail.rfslswat.gov.pk
https://school.rfslswat.gov.pk
Jai Hind
https://rfslswat.gov.pk
https://mail.rfslswat.gov.pk
https://school.rfslswat.gov.pk
Jai Hind
๐ฅ6๐1๐1
Opportunity Update :
We are in search of Talented Guys who have skillset of
: Making Crypters
: Making FUD Trojans
: Doing Reverse Engineering
: Making Decompilers
Dm or send your Resume to Infosecpawan@gmail.com asap .
________
INDIANS ONLY...
We are in search of Talented Guys who have skillset of
: Making Crypters
: Making FUD Trojans
: Doing Reverse Engineering
: Making Decompilers
Dm or send your Resume to Infosecpawan@gmail.com asap .
________
INDIANS ONLY...
๐2๐1
๐คฉ10 Best FREE Ethical Hacking Courses๐คฉ
With the increasing demand for skilled professionals to protect against cyber threats, taking a hacking course can be a valuable investment.
This blog will provide a list of the 10 best hacking courses for individuals interested in cybersecurity and improving their hacking skills.
Download: bit.ly/BestHackingCourses
Share & Support โค๏ธ
With the increasing demand for skilled professionals to protect against cyber threats, taking a hacking course can be a valuable investment.
This blog will provide a list of the 10 best hacking courses for individuals interested in cybersecurity and improving their hacking skills.
Download: bit.ly/BestHackingCourses
Share & Support โค๏ธ
Forwarded from LegionLeaker๐ดโโ ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from LegionLeaker๐ดโโ ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
https://medium.com/@lonewarriorco/mastering-osint-the-ultimate-guide-to-investigating-and-analyzing-publicly-available-information-370f265699da
In this blog I have mentioned:-
1.What truly osint stands for
2. Difference between Digital Forensics and OSint
3. The correct approach for osint
4. Place to learn the techniques of OSint
5. Jobs where osint is used as a skill
This may be helpful for both intermediate and beginners.
also suggest me for any edits.
In this blog I have mentioned:-
1.What truly osint stands for
2. Difference between Digital Forensics and OSint
3. The correct approach for osint
4. Place to learn the techniques of OSint
5. Jobs where osint is used as a skill
This may be helpful for both intermediate and beginners.
also suggest me for any edits.
Medium
Mastering OSINT: The Ultimate Guide to Investigating and Analyzing Publicly Available Information
Welcome to my blog! Today, weโll discuss OSINT, sometimes known as open-source intelligence. People frequently link employing various toolsโฆ
๐1
Forwarded from Tสษชแดแดส Pแดษดษขแดษชษด ( trickypenguin.ink )
5 Common Web Application Vulnerabilities and How to Test for Them
READ full Article
bit.ly/3oQ4RsT
@trickypenguin
Share & Support ๐
READ full Article
bit.ly/3oQ4RsT
@trickypenguin
Share & Support ๐
โค4
๐ค How to Write Bug Bounty Report ๐ค
Writing a clear and concise bug bounty report is crucial for helping developers identify and fix vulnerabilities.
In this article, we'll explore the key steps involved in writing a successful bug bounty report. We'll cover everything from providing a clear summary and detailed instructions to including supporting evidence and maintaining a professional tone.
By the end of this article, you'll have the knowledge you need to write a bug bounty report that helps keep software secure and reliable.
โ Link: bit.ly/BugBountyReport
Share & Support โค๏ธ
Writing a clear and concise bug bounty report is crucial for helping developers identify and fix vulnerabilities.
In this article, we'll explore the key steps involved in writing a successful bug bounty report. We'll cover everything from providing a clear summary and detailed instructions to including supporting evidence and maintaining a professional tone.
By the end of this article, you'll have the knowledge you need to write a bug bounty report that helps keep software secure and reliable.
โ Link: bit.ly/BugBountyReport
Share & Support โค๏ธ
๐4
What To Do If Your PC Got Infected With Malware?
Malware, short for malicious software, is a type of software designed to harm computer
systems and networks. Malware can cause various degrees of damage, from minor inconvenience
to severe system failure.
Read Full Article: https://system32.ink/what-to-do-if-your-pc-got-infected-with-malware/
Malware, short for malicious software, is a type of software designed to harm computer
systems and networks. Malware can cause various degrees of damage, from minor inconvenience
to severe system failure.
Read Full Article: https://system32.ink/what-to-do-if-your-pc-got-infected-with-malware/
Watch latest movies and Get Free Courses on https://neplix.stream
Features of Neplix
1. Free Movies
2. Less Ads
3. Free Courses
4. Request for Movies
https://neplix.stream/courses
Features of Neplix
1. Free Movies
2. Less Ads
3. Free Courses
4. Request for Movies
https://neplix.stream/courses
Forwarded from CrackCodes ๐ฎ๐ณ (Prapatti ็ชใๅ า)
GraphQL For Pentesters
Iโll showcase several GraphQL vulnerabilities and attacks, how they work and how to exploit them as well as illustrations with POCs.
Read Full Article: https://bit.ly/GraphQLForPentesters
@crackcodes @Mynk0x00
Iโll showcase several GraphQL vulnerabilities and attacks, how they work and how to exploit them as well as illustrations with POCs.
Read Full Article: https://bit.ly/GraphQLForPentesters
@crackcodes @Mynk0x00
๐ด Don't Miss These Tutorials! (FREE)
๐ CTF for Beginners: Get Started
๐ bit.ly/CTFforBeginners
๐ Best CTF Challenges for Beginners
๐ bit.ly/CTFChallenges
๐ How to Prepare for CTF to Succeed
๐ bit.ly/PrepareForCTF
(Note: Click on First Website)
Just React & Make us Happy โบ๏ธ
๐ CTF for Beginners: Get Started
๐ bit.ly/CTFforBeginners
๐ Best CTF Challenges for Beginners
๐ bit.ly/CTFChallenges
๐ How to Prepare for CTF to Succeed
๐ bit.ly/PrepareForCTF
(Note: Click on First Website)
Just React & Make us Happy โบ๏ธ
๐2โคโ๐ฅ1๐ป1
๐จ๐ปโ๐ปPenetration Tester Full Roadmap๐จ๐ปโ๐ป
If you want to become a penetration tester or an ethical hacker then you should not miss this post!
What you'll know?
โ How to become ethical hacker
โ Salary of ethical hacker
โ Certifications required to become hacker
โ Skills required to become hacker
โ Do you need a degree or not
๐Link: bit.ly/PentesterRoadmap
Share and Support usโฅ๏ธ
If you want to become a penetration tester or an ethical hacker then you should not miss this post!
What you'll know?
โ How to become ethical hacker
โ Salary of ethical hacker
โ Certifications required to become hacker
โ Skills required to become hacker
โ Do you need a degree or not
๐Link: bit.ly/PentesterRoadmap
Share and Support usโฅ๏ธ