hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
CTF Communiy Challenge VI by Pato Academy
Medium
CTF Communiy Challenge VI by Pato Academy
Salve! No mês de Agosto a Staff da Pato Academy fizeram mais um CTF para a Comunidade. Esse foi um Desafio mais tranquilo, envolvendo 3 Tasks, sendo elas Bypass na WAF, Broken Acess Controll e SSRF…
hack and bug bounty
InfoSecSherpa’s News Roundup for Wednesday, August 9, 2023
Medium
InfoSecSherpa’s News Roundup for Wednesday, August 9, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Excessive trust in client-side controls
Medium
Excessive trust in client-side controls
Today we will be covering the “Excessive trust in client-side controls” lab on PortSwigger Academy
hack and bug bounty
What to Do When You Fall Victim To a Crypto Scam | What Is The Best Company to Recover Stolen…
Medium
What to Do When You Fall Victim To a Crypto Scam | What Is The Best Company to Recover Stolen…
What to Do When You Fall Victim To a Crypto Scam | What Is The Best Company to Recover Stolen Crypto? Best Practices in Attempting to Recover Funds from Crypto Scams Scams involving Bitcoin or other…
hack and bug bounty
Finding and Exploiting Citrix NetScaler Buffer Overflow (CVE-2023-3519) (Part 3)
hack and bug bounty
New era in VAPT… Make your website secure.
Medium
New era in VAPT… Make your website secure.
Contact me at Fiverr: https://www.fiverr.com/s/YB96RN
hack and bug bounty
.NET developers alert: Moq NuGET package exfiltrates user emails from git
Medium
.NET developers alert: Moq NuGET package exfiltrates user emails from git
On August 8, 2023, the .NET community was informed that the testing library called Moq exfiltrates developer’s emails from their development machine and sends them off to third-party remote servers…
hack and bug bounty
How I got Two RCE at BBP Program @0xbartita
Medium
How I got Two RCE at BBP Program @0xbartita
Hi all.. 0xbartita
hack and bug bounty
Bypassing XSS Filters: Techniques and Solutions
Medium
Bypassing XSS Filters: Techniques and Solutions
In the ever-evolving landscape of web security, Cross-Site Scripting (XSS) stands as one of the most pernicious vulnerabilities. XSS allows…
hack and bug bounty
What is Bash Shell Scripting?
Medium
What is Bash Shell Scripting?
Shell scripting is a versatile tool.
hack and bug bounty
New techniques and tools for web race conditions
PortSwigger Blog
New techniques and tools for web race conditions
For too long, web race-condition attacks have focused on a tiny handful of scenarios. Testing for them is inherently unreliable, compounded by known challenges relating to time constraints and network
hack and bug bounty
How to Setup Windows 10 VM Lab for Hacking
Medium
How to Setup Windows 10 VM Lab for Hacking
I always love the saying:
hack and bug bounty
Understanding the Benefits of Using BlackArch Linux for Penetration Testing: This blog post…
Medium
Understanding the Benefits of Using BlackArch Linux for Penetration Testing: This blog post…
Introduction
hack and bug bounty
How to Setup (Vulnerable) Windows 10 VM Lab for Hacking
Medium
How to Setup Windows 10 VM Lab for Hacking
I always love the saying:
hack and bug bounty
De Twitter a Mastodon
Medium
De Twitter a Mastodon
De las personas que me leéis aquí, ¿estáis alguna en Mastodon?
hack and bug bounty
Power of One-Liners: Master Bug Bounty Automation:
Medium
🔍
Power of One-Liners: Master Bug Bounty Automation:
🔍
🚀
Supercharge Your Bug Hunting with Brilliant One-Liners and Crush Vulnerabilities!
🚀
hack and bug bounty
Safeguarding the Digital Present: The Vital Importance of Cybersecurity
Medium
Safeguarding the Digital Present: The Vital Importance of Cybersecurity
In the ever-evolving landscape of the modern Internet age, the importance of cybersecurity cannot be overstated. As our lives become…
hack and bug bounty
Zero to OSCP 2023: it isn’t as tough as you think
Medium
Zero to OSCP 2023: it isn’t as tough as you think
Introduction
hack and bug bounty
Finding vulnerable systems on the Internet with Netlas.io
Medium
Finding vulnerable systems on the Internet with Netlas.io
Often, as cyber warriors, we need to check whether our systems or the systems of others are vulnerable to various known vulnerabilities and…
hack and bug bounty
Find parameters silently with ParamSpider
Medium
Find parameters silently with ParamSpider
When trying to hack a website, it can be extremely useful to get the parameters of various pages. These may include php, woff, css, js, png, svg, php, jpg and more. Each of these parameters can…
hack and bug bounty
Find hidden directories with Dirb
Medium
Find hidden directories with Dirb
Often, in order to hack a website, we need to connect and exploit an object. This can be an administrative panel or a subdirectory that is vulnerable to attacks. The key, of course, is to find these…