hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Car Hacking: The ultimate guide! — Part I
Medium
Car Hacking: The ultimate guide! — Part I
Car safety is really exciting and is an interesting topic of study for many safety researchers. With the arrival of Self Driving cars like…
hack and bug bounty
Kioptrix Level 1 from Vulnhub Walkthrough (for absolute beginners)
Medium
Kioptrix Level 1 from Vulnhub Walkthrough (for absolute beginners)
Kioptrix Level 1 from Vulnhub Walkthrough (for absolute beginners)
I am doing the TCM security’s Practical Certified Ethical Hacking…
hack and bug bounty
What’s in it?
Medium
What’s in it?
Swisstronik Testnet 1.0 enhances the way developers build and deploy encrypted, privacy-preserving smart contracts. With a focus on…
hack and bug bounty
Cybersecurity & Information Security — What’s the difference?
Medium
Cybersecurity & Information Security — What’s the difference?
Data vs information
hack and bug bounty
Twitter Rebrands to X Twitter — Elon Musk’s Bold Move for the Future
Medium
Twitter Rebrands to X Twitter — Elon Musk’s Bold Move for the Future
In a surprising move, Twitter has embarked on a rebranding journey, transforming itself into Elon Musk’s favorite letter, X. Welcome to…
hack and bug bounty
Bypass Admin Panel Without Hacking Tool
Medium
Bypass Admin Panel Without Hacking Tool
How does the story go?
hack and bug bounty
Handling Client-Side Data Securely in Web Pentesting Applications — 11 | 2023
Medium
Handling Client-Side Data Securely in Web Pentesting Applications — 11 | 2023
Safeguarding Data Transmitted via the Client, Validating Client-Generated Data, and Implementing Robust Logging and Alerting Mechanisms |…
hack and bug bounty
Cyber Briefing: 2023.08.03
Medium
Cyber Briefing: 2023.08.03
👉
What’s going on in the cyber world today? AWS, Trojans, Salesforce, AI, Meow Attack, Mitel, Burger King, LockBit Ransomware, Italian…
hack and bug bounty
SOAP vs REST: Overview
Medium
SOAP vs REST: Overview
Before we start into this, let us get a basic definition of SOAP and REST-based interactions.
hack and bug bounty
Time-based SQL Injection
Medium
Time-based SQL Injection
Eu escrevi dois artigos relacionados ao SQL Injection, um sobre o error-based e o outro sobre o blind-based, agora chegou a vez do…
hack and bug bounty
Persistence in Active Directory Structures — 1
Medium
Persistence in Active Directory Structures
Attackers try to ensure persistence in a system after they have taken over a system and successfully escalated authorization. The main…
hack and bug bounty
X Corp’s Attack On Anti-Hate Researchers Is .. Concerning
Medium
X Corp’s Attack On Anti-Hate Researchers Is .. Concerning
I really didn’t want to write about Twitter/X any more. I felt I was sort of done with the platform. But here we are again: A few days ago…
hack and bug bounty
Don’t Use a VPN…it’s not the ultimate security fix you’ve been told
Medium
Don’t Use a VPN…it’s not the ultimate security fix you’ve been told
“A VPN can help protect your personal data from hackers trying to steal it. However, it’s essential to know the legitimate reasons for…
hack and bug bounty
Google Pays Apple $15,000 for Bug Find
Medium
Google Pays Apple $15,000 for Bug Find
According to Forbes, Google has verified that Apple's Security Engineering and Architecture team discovered a high-severity security…
hack and bug bounty
The role of AI in Cybersecurity
Medium
The role of AI in Cybersecurity
AI, or Artificial Intelligence, plays a crucial role in enhancing cybersecurity defenses and mitigating cyber threats. Here are the various ways in which AI revolutionizes cybersecurity: 1. Threat…
hack and bug bounty
Top 5 Cyber Security Certification 2023
Medium
Top 5 Cyber Security Certification 2023
Cybersecurity is a popular career option in the IT industry, but it’s not easy to land a job in this field. To increase your chances, you…
hack and bug bounty
Cybersecurity incidents like this can be concerning.
Medium
Cybersecurity incidents like this can be concerning.
Citrix vpn vulnerability
hack and bug bounty
THM — Corridor | 38/100
Medium
THM — Corridor | 38/100
Hi! Today I’m working on the Easy rated box Corridor from TryHackMe. This was a very simple and quick box highlighting IDOR…
hack and bug bounty
from shodan to interesting django misconfiguration
Medium
from shodan to interesting django misconfiguration
hi guys i hope you catching some bugs and earning some cash
hack and bug bounty
Ransomware Rampage: A Digital Heist Odyssey
Medium
Ransomware Rampage: A Digital Heist Odyssey
hack and bug bounty
Hacker Within: Master the Art of Penetration Testing and Earn Big Bucks!
Medium
Hacker Within: Master the Art of Penetration Testing and Earn Big Bucks!
Discover the Thrilling World of Ethical Hacking — Turn Your Skills into Lucrative Opportunities!