hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Malicious package detection in PyPI
Medium
Malicious package detection in PyPI
Malicious packet detection on P&IP: Malicious packet at P&IP uses techniques Phishing to hide his malicious intent
hack and bug bounty
Tips for protecting students’ personal data
Medium
Tips for protecting students’ personal data
With the amount of personal information shared online, it’s easy for sensitive information to fall into the wrong hands. From social media accounts to online coursework, there are many ways students…
hack and bug bounty
Shell uploading to a website with BurpSuite and DVWA
Medium
Shell uploading to a website with BurpSuite and DVWA
In general, we can say that the solution to many injection attacks on web applications are done with “Login Validation”. Input validation…
hack and bug bounty
Reconnaissance: Port scanning with Hping3
Medium
Reconnaissance: Port scanning with Hping3
One of the most time-consuming, but necessary procedures in hacking is the recognition, commonly target recognition. Before trying to hack…
hack and bug bounty
My Exciting Two Month Journey as a Security Analyst at Appsecco
Medium
My Exciting Two Month Journey as a Security Analyst at Appsecco
A quick post about the beginning of my exciting journey as a full time Security Analyst at Appsecco.
hack and bug bounty
HOW I FIND IDOR LEAD TO ACOUNT TAKE OVER
Medium
HOW I FIND IDOR LEAD TO ACOUNT TAKE OVER
Hello gaisss welcome to my blok, now i want to share my bug bounty POC.At first, when I was scrolling through Instagram and I found the…
hack and bug bounty
Reconnaissance: Scanning and DoSing with Scapy
Medium
Reconnaissance: Scanning and DoSing with Scapy
In this article, we will study an open source tool called Scapy. Scapy is one packet manipulation tool similar to nmap and hping, but…
hack and bug bounty
Wi-Fi Hacking with Bettercap
Medium
Wi-Fi Hacking with Bettercap
Bluetooth devices are everywhere and are used in mobile phones, watches, headphones, computers, etc. They are also a target for malicious…
hack and bug bounty
Create Wordlist with Crunch
Medium
Create Wordlist with Crunch
In this guide, I try to develop my skills in the age-old art of password cracking. Although it may seem like a simple and straightforward…
hack and bug bounty
Scan the entire web in 45 minutes with Zmap!
Medium
Scan the entire web in 45 minutes with Zmap!
Most of you know the power of nmap and nmap scripts to identify a target and networks in general. These tools can be used for numerous…
hack and bug bounty
Fuzzing Guide to Finding Security Vulnerabilities with BurpSuite
Medium
Fuzzing Guide to Finding Security Vulnerabilities with BurpSuite
In previous guides on iguru, we have used the Burp Suite for various purposes. To test, evaluate and hack online applications. BurpSuite is…
hack and bug bounty
Building a Honeypot to Catch Zero-Day Exploits (Part 2)
Medium
Building a Honeypot to Catch Zero-Day Exploits (Part 2)
In the first part of the “Building a Honeypot to Catch Zero-Day Exploits” series, we downloaded and configured the Dionaea honeypot. What…
hack and bug bounty
Embracing the Future with SaaS: Revolutionizing Cybersecurity at XPOSE Security
Medium
Embracing the Future with SaaS: Revolutionizing Cybersecurity at XPOSE Security
Joining the Revolution: Exploring SaaS — Software as a Service
hack and bug bounty
Unprotected Swap() Function: A ERC777 Reentrancy Vulnerability
Medium
Unprotected Swap() Function: A ERC777 Reentrancy Vulnerability
This article sheds light on a critical vulnerability associated with the swap() function in a bridge/DEX. This vulnerability exposes a…
hack and bug bounty
Pizza, first bug bounty reward
Medium
Pizza, first bug bounty reward
🍕
👨🏼💻
I found an bug at fueler.io? where anyone can inject any number of kudos (Likes)!
hack and bug bounty
Finding “BAC - IDOR -PE” Within a Minute using Autorize Tool
Medium
Finding “BAC - IDOR -PE” Within a Minute using Autorize Tool
Hello People,
hack and bug bounty
XSS (Cross Site Scripting)
Medium
XSS (Cross Site Scripting)
Well i think this topic was covered numerous times but also i want to give it a shot. Seccond of all welcome to my seccond article on the…
hack and bug bounty
Building an Application Security Program at VTS
Medium
Building an Application Security Program at VTS
At VTS, security is of utmost importance. For example, our tenant experience products, VTS Rise and VTS Activate, have functionalities that…
hack and bug bounty
World of LFI
Medium
World of LFI
Introduction:
In the vast realm of web application security, it is essential to be acquainted with common vulnerabilities and understand…
hack and bug bounty
Unleashing the Power of Google Dorks for Web App Reconnaissance
Medium
Unleashing the Power of Google Dorks for Web App Reconnaissance
When it comes to web application reconnaissance, having the right tools and techniques at your disposal is vital. Among the arsenal of reconnaissance methods, Google Dorks stand out as a powerful and…
hack and bug bounty
How to deal with shitposters on X
Medium
How to deal with shitposters on X
Dealing with shitposters on X can be frustrating, but there are a few steps you can take to manage and mitigate their impact on your…