hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Hello, my name is Jagat Singh and I'm a security researcher.
Medium
Hello, my name is Jagat Singh and I'm a security researcher.
## How I found the vulnerability I was browsing Indeed.com one day, looking for some job opportunities in the field of cybersecurity. I…
hack and bug bounty
If the only tool you have is a hammer… — Collaboration in Cybersecurity
Medium
If the only tool you have is a hammer… — Collaboration in Cybersecurity and bayond
If the hammer is the tool you are best with, I think you should use it as much as possible. I feel it would help collaboration
hack and bug bounty
Unleashing the Power of BlackMamba: The Ultimate C2 Post Exploitation Framework
Medium
Unleashing the Power of BlackMamba: The Ultimate C2 Post Exploitation Framework
Welcome to our YouTube video on “BlackMamba — C2 post exploitation Framework”! In this video, we dive deep into the incredible power and…
hack and bug bounty
Leaking Plaintext Credentials by Uploading an Image
Medium
Leaking Plaintext Credentials by Uploading an Image
Hi Everyone,
hack and bug bounty
TCM’s Practical Junior Penetration Tester (PJPT) Review
Medium
TCM’s Practical Junior Penetration Tester (PJPT) Review
Introduction
hack and bug bounty
Mastering Web Application Reconnaissance with WhatWeb
Medium
Mastering Web Application Reconnaissance with WhatWeb
Welcome to our YouTube video on mastering web application reconnaissance with WhatWeb! In this tutorial, we will guide you through the…
hack and bug bounty
Bug Bounty Hunter — Let’s Understand and Recognize IDOR Vulnerability / Part 2
Medium
Bug Bounty Hunter — Let’s Understand and Recognize IDOR Vulnerability / Part 2
Hello Folks, I hope you had a good week. A few health problems, a minor depression caused by the cancellation of my projects that lasted…
hack and bug bounty
Exploring Advanced Features of Tenable Nessus: Beyond the Basics
Medium
Exploring Advanced Features of Tenable Nessus: Beyond the Basics
Tenable Nessus is a powerful vulnerability assessment tool that has become an industry standard for identifying security weaknesses in…
hack and bug bounty
Network Enumeration with Nmap (HTB Academy)
Medium
Network Enumeration with Nmap (HTB Academy)
Write-up for the Network Enumeration with Nmap module on HTB Academy.
hack and bug bounty
2 Ways to Obtain NetNTLM Hashes and How to Defend Against Them
Medium
2 Ways to Obtain NetNTLM Hashes and How to Defend Against Them
By Danny Chung | Aug 4, 2023
hack and bug bounty
Elon Musk at the Helm: My Twitter Disdain Reaches Critical Mass
Medium
Elon Musk at the Helm: My Twitter Disdain Reaches Critical Mass
In the realm of social media, Twitter has always been a platform that I’ve struggled to embrace. My disdain for it began long before it was…
hack and bug bounty
X marks the spot
Medium
X marks the spot
Could X be a dystopian nightmare like WeChat
hack and bug bounty
From DNS to Domination: DNS Takeover Demystified with mitm6
Medium
From DNS to Domination: DNS Takeover Demystified with mitm6
In this blog post, we will be exploring the territory of DNS takeover, a strategic maneuver in the world of Network Penetration testing…
hack and bug bounty
Securing Data and API Credentials with Encryption and Cipher Keys in Android
Medium
Securing Data and API Credentials with Encryption and Cipher Keys in Android
In today’s digital world, data security is of utmost importance. With cyber threats constantly on the rise, it’s crucial to safeguard…
hack and bug bounty
Top Homelab Content Creators: Connect and Elevate Your Tech Journey
Medium
Top Homelab Content Creators: Connect and Elevate Your Tech Journey
“Top Homelab Content Creators: Connect and Elevate Your Tech Journey” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Windows Command Line: Your Gateway to Efficient System Management
Medium
Mastering Windows Command Line: Your Gateway to Efficient System Management
“Mastering Windows Command Line: Your Gateway to Efficient System Management” is published by SimeonOnSecurity.
hack and bug bounty
Windows Command Line: Master File Management for Efficiency
Medium
Windows Command Line: Master File Management for Efficiency
“Windows Command Line: Master File Management for Efficiency” is published by SimeonOnSecurity.
hack and bug bounty
Master Windows Text Analysis: Command Line Tips for Efficient Processing
Medium
Master Windows Text Analysis: Command Line Tips for Efficient Processing
“Master Windows Text Analysis: Command Line Tips for Efficient Processing” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Windows System Info & Management: Boost Efficiency & Control
Medium
Mastering Windows System Info & Management: Boost Efficiency & Control
“Mastering Windows System Info & Management: Boost Efficiency & Control” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Windows Networking: Boosting Connectivity and Collaboration
Medium
Mastering Windows Networking: Boosting Connectivity and Collaboration
“Mastering Windows Networking: Boosting Connectivity and Collaboration” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Windows Batch Scripting: Automate Tasks and Boost Efficiency
Medium
Mastering Windows Batch Scripting: Automate Tasks and Boost Efficiency
“Mastering Windows Batch Scripting: Automate Tasks and Boost Efficiency” is published by SimeonOnSecurity.