hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Mastering Web Application Pentesting with Burp Suite: A Comprehensive Guide — 0 | 2023
Medium
Mastering Web Application Pentesting with Burp Suite: A Comprehensive Guide — 0 | 2023
Unveiling the Basics of Burp Suite for Effective Web Application Penetration Testing
hack and bug bounty
Mastering .NET Framework 4.0 Security: Best Practices & Automation
Medium
Mastering .NET Framework 4.0 Security: Best Practices & Automation
“Mastering .NET Framework 4.0 Security: Best Practices & Automation” is published by SimeonOnSecurity.
hack and bug bounty
Enhancing Oracle JRE 8 Security: Best Practices, STIGs, and Configuration Examples
Medium
Enhancing Oracle JRE 8 Security: Best Practices, STIGs, and Configuration Examples
“Enhancing Oracle JRE 8 Security: Best Practices, STIGs, and Configuration Examples” is published by SimeonOnSecurity.
hack and bug bounty
Mozilla FireFox STIG and Hardening: Complete Guide for Configuring Safe Browsing
Medium
Mozilla FireFox STIG and Hardening: Complete Guide for Configuring Safe Browsing
“Mozilla FireFox STIG and Hardening: Complete Guide for Configuring Safe Browsing” is published by SimeonOnSecurity.
hack and bug bounty
WEMIX Bug Bounty Program Kicks Off
Medium
WEMIX Bug Bounty Program Kicks Off
To further enhance the security of the WEMIX ecosystem, CertiK, the key security partner of WEMIX, has launched the WEMIX Bug Bounty…
hack and bug bounty
CEWL vs. Common Password Lists: Which One Is More Effective for Password Cracking?
Medium
CEWL vs. Common Password Lists: Which One Is More Effective for Password Cracking?
CEWL stands for Custom Wordlist Generator, a tool used for creating custom wordlists or dictionaries that can be used for password…
hack and bug bounty
Burp Suite vs. Other Web Application Security Tools: A Comparative Analysis
Medium
Burp Suite vs. Other Web Application Security Tools: A Comparative Analysis
In today’s interconnected world, web application security has become more critical than ever before. As businesses rely heavily on web…
hack and bug bounty
From Self XSS to Account Take Over(ATO)
Medium
From Self XSS to Account Take Over(ATO)
Hello there ,
hack and bug bounty
How to Get Paid on Twitter (Now X)
Medium
How to Get Paid on Twitter (Now X)
Twitter Blue is a subscription service that offers enhanced features, and meeting certain criteria can enable users to earn money.
hack and bug bounty
Deep Dive into iOS Security: Protecting Your Privacy and Data
Medium
Deep Dive into iOS Security: Protecting Your Privacy and Data
Explore the robust iOS security features safeguarding your privacy & data. Learn about encryption, biometrics, and iOS penetration testing.
hack and bug bounty
Learning Security Testing from Scratch: A Comprehensive Guide
Medium
Learning Security Testing from Scratch: A Comprehensive Guide
Introduction
hack and bug bounty
What You Will Learn In Ethical Hacking Course In Singapore
Medium
What You Will Learn In Ethical Hacking Course In Singapore
In the modern era, cyber threats loom large, making the role of ethical hackers more critical than ever. If you’re based in Singapore or…
hack and bug bounty
Hacker’s Delight: Your Path to Becoming a Stealthy Cyber Hero Step by Step
Medium
Hacker’s Delight: Your Path to Becoming a Stealthy Cyber Hero Step by Step
hack and bug bounty
Bulls Kick-Off Session Strong as PEPE Dominates
Medium
Bulls Kick-Off Session Strong as PEPE Dominates
Markets have started with bullish sentiment, with the global market cap recording a 1.46% increase in a day to take the total cap to $1.18T…
hack and bug bounty
BEEF Unleashed: Manipulating Browsers for Strategic Exploits
Medium
BEEF Unleashed: Manipulating Browsers for Strategic Exploits
Welcome back, intrepid cyber voyagers, to the riveting continuation of our “Unleashing Kali Linux” saga at Cyber Tsunami! Brace yourselves…
hack and bug bounty
Millionaire in Minutes: Uncovering the Race Condition Exploit
Medium
Millionaire in Minutes: Uncovering the Race Condition Exploit
Today, we’ll delve into one such critical issue that poses a substantial risk to digital platforms, and explore a vulnerability that…
hack and bug bounty
Malicious package detection in PyPI
Medium
Malicious package detection in PyPI
Malicious packet detection on P&IP: Malicious packet at P&IP uses techniques Phishing to hide his malicious intent
hack and bug bounty
Tips for protecting students’ personal data
Medium
Tips for protecting students’ personal data
With the amount of personal information shared online, it’s easy for sensitive information to fall into the wrong hands. From social media accounts to online coursework, there are many ways students…
hack and bug bounty
Shell uploading to a website with BurpSuite and DVWA
Medium
Shell uploading to a website with BurpSuite and DVWA
In general, we can say that the solution to many injection attacks on web applications are done with “Login Validation”. Input validation…
hack and bug bounty
Reconnaissance: Port scanning with Hping3
Medium
Reconnaissance: Port scanning with Hping3
One of the most time-consuming, but necessary procedures in hacking is the recognition, commonly target recognition. Before trying to hack…
hack and bug bounty
My Exciting Two Month Journey as a Security Analyst at Appsecco
Medium
My Exciting Two Month Journey as a Security Analyst at Appsecco
A quick post about the beginning of my exciting journey as a full time Security Analyst at Appsecco.