hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
TWITTER is now X.
Medium
TWITTER is now X.
A few days ago, Elon Musk announced that Twitter would now be ‘X’. The iconic bird logo has been replaced with X and the official twitter…
hack and bug bounty
AWS Pentest — Cloudgoat: Scenario 1 (vulnerable_lambda)
Medium
AWS Pentest — Cloudgoat: Scenario 1 (vulnerable_lambda)
Let’s talk about the AWS Penetration Testing today. This will be a series of scenarios provided by the CloudGoat vulnerable AWS…
hack and bug bounty
HTB — Tally | 37/100
Medium
HTB — Tally | 37/100
Hi! Here is a technical writeup of the machine Tally from HackTheBox. This a Hard rated machine that took several twists and turns along…
hack and bug bounty
How to Create a Simple Fork Bomb Virus and the Impact It Has on Your System
Medium
How to Create a Simple Fork Bomb Virus and the Impact It Has on Your System
Welcome to my new article! In this write-up, I will show you how I created a fork bomb using a batch file and executed it within a Windows machine on my network to observe its impact on the system…
hack and bug bounty
TCM — Practical Ethical Hacking Course — Introduction to Python — 1
Medium
TCM — Practical Ethical Hacking Course — Introduction to Python — 1
Shebang
hack and bug bounty
Writing your own Nuclei templates
Medium
Writing your own Nuclei templates
In this (first) post, i am gonna show you how to write your own Nuclei templates. If you need to detect vulnerabilities using Nuclei you…
hack and bug bounty
Top 3 AppSec Container vulnerabilities
Medium
Top 3 AppSec Container vulnerabilities
3 of the top application security vulnerabilities in containerised workloads are image, registry and runtime risks.
hack and bug bounty
When Nothing Goes My Way
Medium
When Nothing Goes My Way
I let the gods decide my fate
hack and bug bounty
Extensions I Use For My Bug Bounty Hunting.
Medium
Extensions I Use For My Bug Bounty Hunting.
🧑🏻💻
Hi, Ajak Amico’s welcome back to another blog today. I will show you the Top 10 Extensions I use For my Bug Bounty journey that makes the…
hack and bug bounty
API Authentication Attack
Medium
API Authentication Attack
An authentication attack refers to a malicious attempt to gain unauthorized access to a system, application, or network by exploiting…
hack and bug bounty
Talking like a hacker: Ethical hacking terminology
Medium
Talking like a hacker: Ethical hacking terminology
Starting into ethical hacking can be difficult, and maybe you will read or hear many words for which you do not know the meaning or their…
hack and bug bounty
Fortify Your Home Network: Top Hardware Recommendations for Ultimate Security
Medium
Fortify Your Home Network: Top Hardware Recommendations for Ultimate Security
Secure and reliable access points are essential for seamless connectivity across your home network. For extended coverage and enhanced security, consider the following option: Network monitoring…
hack and bug bounty
Enhancing Data Privacy: USB Hardware Locks and Encryption Devices
Medium
Enhancing Data Privacy: USB Hardware Locks and Encryption Devices
For those seeking reliable solutions to bolster their data security, Amazon offers an array of USB hardware locks and encrypted USB drives that cater to various needs. In an era where data breaches…
hack and bug bounty
Ultimate Guide to Mobile Security: Laptop Privacy, Webcam Covers & More
Medium
Ultimate Guide to Mobile Security: Laptop Privacy, Webcam Covers & More
“Ultimate Guide to Mobile Security: Laptop Privacy, Webcam Covers & More” is published by SimeonOnSecurity.
hack and bug bounty
Secure Your Transactions: Top Hardware Tokens for Enhanced Security
Medium
Secure Your Transactions: Top Hardware Tokens for Enhanced Security
Ideal for those embracing FIDO (Fast Identity Online) authentication, the Feitian MultiPass FIDO Security Key”> Feitian MultiPass FIDO Security Key offers seamless integration with FIDO-supported…
hack and bug bounty
Secure Your Future: Essential Emergency Tech Gadgets
Medium
Secure Your Future: Essential Emergency Tech Gadgets
“Secure Your Future: Essential Emergency Tech Gadgets” is published by SimeonOnSecurity.
hack and bug bounty
Secure Smart Home Hubs: Best for Home Automation and Security
Medium
Secure Smart Home Hubs: Best for Home Automation and Security
Samsung SmartThings”> Samsung SmartThings emerges as an ecosystem enabler, knitting together a diverse array of smart devices. Its commitment to security is demonstrated through its multifaceted…
hack and bug bounty
Unlocking Biometric Security: Fingerprint & Facial Recognition Devices
Medium
Unlocking Biometric Security: Fingerprint & Facial Recognition Devices
For those interested in enhancing security with fingerprint recognition, the following products are available for purchase: The realm of biometric access control extends its reach to facial…
hack and bug bounty
Synology vs Terramaster vs Qnap: Unveiling the Ultimate NAS Showdown
Medium
Synology vs Terramaster vs Qnap: Unveiling the Ultimate NAS Showdown
“Synology vs Terramaster vs Qnap: Unveiling the Ultimate NAS Showdown” is published by SimeonOnSecurity.
hack and bug bounty
Power Up Your Life: The Best UPS Models for Uninterrupted Connectivity
Medium
Power Up Your Life: The Best UPS Models for Uninterrupted Connectivity
The CyberPower CP1500PFCLCD”> CyberPower CP1500PFCLCD stands out with its remarkable pure sine wave output, tailor-made for delicate electronics such as computers and gaming consoles. Boasting an…
hack and bug bounty
Secure Code Review (SCR) : A5 — Security Misconfiguration
Medium
Secure Code Review (SCR) : A5 — Security Misconfiguration
Security misconfiguration is a prevalent issue that can occur at any level of an application stack, including the network, platform, web…