hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Protect Your Business from Cyber Threats: A Guide to Crafting an Effective Cyber Risk Management…
Medium
Protect Your Business from Cyber Threats: A Guide to Crafting an Effective Cyber Risk Management Plan
With the increasing reliance on technology in today’s world, it is crucial for businesses to have a plan in place to protect their assets…
hack and bug bounty
LazyPusher — An Automation Tool for GitHub Push
Medium
LazyPusher — An Automation Tool for GitHub Push
The Story behind the LazyPusher Tool :
hack and bug bounty
Intro to Android app structure | mobile pentesting | part 3 | demo time
Medium
Intro to Android app structure | mobile pentesting | part 3 | demo time
بِسْمِ اللَّـهِ الرَّحْمَـٰنِ الرَّحِيم
hack and bug bounty
How to get started with CTF Hacking challenges
Medium
How to get started with CTF Hacking challenges
Welcome back everyone! Today I want to share with you my notes on how to approach the majority of CTF challenge you participate in. I will…
hack and bug bounty
Unmasking Diva.apk: Exploiting Input Validation
Medium
Unmasking Diva.apk: Exploiting Input Validation
Greetings, my infosec folks!
hack and bug bounty
Secret Bug bounty Extension all Hackers Forget To Add. Part-2 (Not Common!)
Medium
Secret Bug bounty Extension all Hackers Forget To Add. Part-2 (Not Common!)
🧑🏻💻
Hi, Ajak Amico’s welcome back to another blog today. I will show you the Secret Extensions I use For my Bug Bounty journey that make the…
hack and bug bounty
ISO27001 Lead Implementer training
Medium
ISO27001 Lead Implementer training
Are you looking to enhance your knowledge and skills in information security management? Look no further than ISO27001 Lead Implementer…
hack and bug bounty
Ethical Hacking Demystified: Unveiling the Secrets of Responsible Cybersecurity
Medium
Ethical Hacking Demystified: Unveiling the Secrets of Responsible Cybersecurity
Introduction: In today’s digital landscape, where cybersecurity threats are rampant, ethical hacking emerges as a powerful tool to…
hack and bug bounty
Il nuovo logo di Twitter
Medium
Il nuovo logo di Twitter
Non finiscono le polemiche che avvolgono Elon Musk e il suo social Twitter. Questa novità ha lasciato tutti senza parole. Scompare lo storico uccellino blu che ha fatta la storia del social network…
hack and bug bounty
Threads vs. X: Which Social Media App is Right for You?
Medium
Threads vs. X: Which Social Media App is Right for You?
Introduction:
hack and bug bounty
TryHackMe: Smag Grotto
Medium
TryHackMe: Smag Grotto
Room: https://tryhackme.com/room/smaggrotto
THM Rating: Easy
Actual Rating: Easy
hack and bug bounty
Penetration Testing: The Art of Reconnaissance
Medium
Penetration Testing: The Art of Reconnaissance
Introduction
hack and bug bounty
The Art of SQL Injection: A Dive into Database Exploitation
Medium
The Art of SQL Injection: A Dive into Database Exploitation
In the vast realm of offensive security, SQL injection (often abbreviated as SQLi) stands out as one of the most notorious and prevalent…
hack and bug bounty
Cross-Site Scripting (XSS) : Unmasking the Web’s Silent Threat
Medium
Cross-Site Scripting (XSS) : Unmasking the Web’s Silent Threat
Introduction
hack and bug bounty
InfoSecSherpa’s News Roundup for Tuesday, August 8, 2023
Medium
InfoSecSherpa’s News Roundup for Tuesday, August 8, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Acoustic Cyberattacks: When Sound Manipulates Systems
Medium
Acoustic Cyberattacks: When Sound Manipulates Systems
Introduction
hack and bug bounty
Ch3cklist3r
Medium
Ch3cklist3r
I have created an incomplete checklist (ch3cklist3r) that has been very helpful in my recent bug finding efforts. I gathered ideas and…
hack and bug bounty
Red Team Member — Let’s explain the Privilege Escalation with examples / Part 1
Medium
Red Team Member — Let’s explain the Privilege Escalation with examples / Part 1
Hello folks, I hope your week is going well. I’m getting hot and I got my drink again and I wanted to sit in front of the computer and…
hack and bug bounty
Mastering Web Application Pentesting with Burp Suite: A Comprehensive Guide — 0 | 2023
Medium
Mastering Web Application Pentesting with Burp Suite: A Comprehensive Guide — 0 | 2023
Unveiling the Basics of Burp Suite for Effective Web Application Penetration Testing
hack and bug bounty
Mastering .NET Framework 4.0 Security: Best Practices & Automation
Medium
Mastering .NET Framework 4.0 Security: Best Practices & Automation
“Mastering .NET Framework 4.0 Security: Best Practices & Automation” is published by SimeonOnSecurity.
hack and bug bounty
Enhancing Oracle JRE 8 Security: Best Practices, STIGs, and Configuration Examples
Medium
Enhancing Oracle JRE 8 Security: Best Practices, STIGs, and Configuration Examples
“Enhancing Oracle JRE 8 Security: Best Practices, STIGs, and Configuration Examples” is published by SimeonOnSecurity.