hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
5 Ways to Reduce Your PCI DSS Scope
Medium
5 Ways to Reduce Your PCI DSS Scope
The applicability of the Payment Card Industry Data Security Standard (PCI DSS) poses challenges for most organizations that implement it…
hack and bug bounty
CVE-2022–2346 — Understanding and Mitigating the Threat
Medium
CVE-2022–2346 — Understanding and Mitigating the Threat
Outline:
hack and bug bounty
Post Exploitation of a Rundeck Server reverse shell running in ec2 instance leading to AWS account…
Medium
Post Exploitation of a Rundeck Server reverse shell running in ec2 instance-
Hi everyone, in this blog we will be going through the steps for post-exploitation of a reverse shell we got from a rundeck server(ec2).
hack and bug bounty
Twitter is now X. Here’s what that means.
Medium
Twitter is now X. Here’s what that means.
The internet is abuzz as the app formerly known as Twitter announced a name change last week. X.com now sends to Twitter.com; The company’s…
hack and bug bounty
Cyber Briefing: 2023.08.02
Medium
Cyber Briefing: 2023.08.02
👉
What’s trending in cybersecurity today? Stremio Vulnerability, Phyton, NodeStealer, Facebook, SpyNote, Android Trojan, Google AMP…
hack and bug bounty
Unlocking the World of Ethical Hacking: A Beginner’s Guide to Mastering the Basics
Medium
Unlocking the World of Ethical Hacking: A Beginner’s Guide to Mastering the Basics
If you’re interested in learning hacking skills or pursuing a career in ethical hacking, the field of ethical hacking, also known as…
hack and bug bounty
PROVING GROUNDS — FUNBOX
Medium
PROVING GROUNDS — FUNBOX
Nmap scan:
hack and bug bounty
Disruption, disruption, disruption
Medium
Disruption, disruption, disruption
A future spearheaded by Meta & X
hack and bug bounty
Capturing User Data in Web Pentesting Applications — 10 | 2023
Medium
Capturing User Data in Web Pentesting Applications — 10 | 2023
Unveiling the World of Browser Extension Technologies and Their Impact on Web Security | Karthikeyan Nagaraj
hack and bug bounty
TryHackMe — Simple CTF
Medium
TryHackMe — Simple CTF
This will be a walk-through on the Simple CTF from TryHackMe. This is a beginner CTF designed to start getting you thinking about your…
hack and bug bounty
Elon Musk’s Transformation of Twitter
Medium
Elon Musk’s Transformation of Twitter
Revolutionizing Social Media for the Better.
hack and bug bounty
Twitter’s New “X” Logo — First one-letter iPhone app
Medium
Twitter’s New “X” Logo — First one-letter iPhone app
Let’s Talk This Out
hack and bug bounty
Unexpected $300 for a Clikjacking Bug
Medium
Unexpected $300 for a Clikjacking Bug
Summary
hack and bug bounty
TryHackMe- Red Walkthrough
Medium
TryHackMe- Red Walkthrough
Hey everyone. Recently I attempted the Red machine from Tryhackme. In this box, the initial foothold was achieved through a LFI…
hack and bug bounty
The Ultimate Guide to AhMyth Android Rat: Unleash Remote Access Tool Power!
Medium
The Ultimate Guide to AhMyth Android Rat: Unleash Remote Access Tool Power!
Welcome to “The Ultimate Guide to AhMyth Android Rat: Unleashing the Power of Remote Access Tools!” This comprehensive video tutorial…
hack and bug bounty
TWITTER is now X.
Medium
TWITTER is now X.
A few days ago, Elon Musk announced that Twitter would now be ‘X’. The iconic bird logo has been replaced with X and the official twitter…
hack and bug bounty
AWS Pentest — Cloudgoat: Scenario 1 (vulnerable_lambda)
Medium
AWS Pentest — Cloudgoat: Scenario 1 (vulnerable_lambda)
Let’s talk about the AWS Penetration Testing today. This will be a series of scenarios provided by the CloudGoat vulnerable AWS…
hack and bug bounty
HTB — Tally | 37/100
Medium
HTB — Tally | 37/100
Hi! Here is a technical writeup of the machine Tally from HackTheBox. This a Hard rated machine that took several twists and turns along…
hack and bug bounty
How to Create a Simple Fork Bomb Virus and the Impact It Has on Your System
Medium
How to Create a Simple Fork Bomb Virus and the Impact It Has on Your System
Welcome to my new article! In this write-up, I will show you how I created a fork bomb using a batch file and executed it within a Windows machine on my network to observe its impact on the system…
hack and bug bounty
TCM — Practical Ethical Hacking Course — Introduction to Python — 1
Medium
TCM — Practical Ethical Hacking Course — Introduction to Python — 1
Shebang
hack and bug bounty
Writing your own Nuclei templates
Medium
Writing your own Nuclei templates
In this (first) post, i am gonna show you how to write your own Nuclei templates. If you need to detect vulnerabilities using Nuclei you…