hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Android Permission Bypass:
Medium
Android Permission Bypass:
Unauthorized Access through READ_EXTERNAL_STORAGE / WRITE_EXTERNAL_STORAGE
hack and bug bounty
Make Your Own Ransomware, (Part 1)
Medium
Make Your Own Ransomware, (Part 1)
Ransomware is fast becoming the most important form of malware affecting our digital systems. Companies around the world are being hit by…
hack and bug bounty
RPO, RTO and data protection in organizations
Medium
RPO, RTO and data protection in organizations
With the opportunity given to me, I wanted to write 2–3 things about data protection in companies and large organizations, because we…
hack and bug bounty
How to tell if your phone is being tracked
Medium
How to tell if your phone is being tracked
28/06/2023, 11:31
hack and bug bounty
Can a photo reveal your fingerprints?
Medium
Can a photo reveal your fingerprints?
Technology is constantly evolving and so are potential threats to personal digital security. There is growing concern about the possibility of collecting fingerprint data from digital photographs…
hack and bug bounty
Radio Hacking: Electromagnetic radiation, frequency & wavelength
Medium
Radio Hacking: Electromagnetic radiation, frequency & wavelength
As you already know, radio hacking is the spearhead of cyber security! So many things in our digital lives operate on radio signals such…
hack and bug bounty
How VPN encryption works
Medium
How VPN encryption works
A virtual private network is a service that allows you to connect to servers anywhere in the world, pretending to be somewhere else and…
hack and bug bounty
5 Browser Security Myths That Must Be Busted
Medium
5 Browser Security Myths That Must Be Busted
Misinformation or outdated advice about online safety can leave you and your personal data vulnerable. So let’s look at five common browser security myths so you can keep your understanding of…
hack and bug bounty
How to locate aircraft with SDR
Medium
How to locate aircraft with SDR
Almost every vehicle in the world emits a radio signal. This applies to cars, planes, ships and almost all vehicles. These radio signals…
hack and bug bounty
Social-Engineer Toolkit for Phishing Attacks
Medium
Social-Engineer Toolkit for Phishing Attacks
Did you know that some of the most destructive phishing campaigns are driven by very powerful cloud-based artificial intelligence…
hack and bug bounty
10 VPN Mistakes We Commonly Make
Medium
10 VPN Mistakes We Commonly Make
A virtual private network (VPN from virtual private network) allows you to browse the web privately and securely with a layer of encryption…
hack and bug bounty
A Comprehensive Guide to Secure Code Review
Medium
A Comprehensive Guide to Secure Code Review
How to conduct an effective code review? Where should you begin? This article aims to provide comprehensive answers to all the queries.
hack and bug bounty
Discovering Google Dorks
Medium
Discovering Google Dorks
Discover Hidden Treasures and Navigate Google’s Intriguing Search Tricks
hack and bug bounty
PERIGOS ENCONTRADOS NO JAVASCRIPT.
Medium
PERIGOS ENCONTRADOS NO JAVASCRIPT.
Os Perigos e Riscos do JavaScript em Aplicações Web
hack and bug bounty
A Hands-On Introduction to Nessus: Basic Network Scan on a Windows 10 Machine
Medium
A Hands-On Introduction to Nessus: Basic Network Scan on a Windows 10 Machine
Hello everyone, in this post, you’re going to learn how to use Nessus to do a basic network scan on a vulnerable Windows 10 machine. I’m…
hack and bug bounty
All That Node API Security is now updated!
Medium
All That Node API Security is now updated!
We are excited to announce a brand-new update for the All That Node API Security feature today!
🎉
Introducing a fresh addition to our…
hack and bug bounty
CEO claims X says the company is at break-even
Medium
CEO claims X says the company is at break-even
Linda Yaccarino, in her first broadcast interview since becoming CEO, disclosed that Twitter is on the cusp of breaking even. Yaccarino…
hack and bug bounty
What is GraphQL and How it Works — 2 | 2023
Medium
What is GraphQL and How it Works — 2 | 2023
Unveiling the Power of GraphQL: A Comprehensive Guide | Karthikeyan Nagaraj
hack and bug bounty
SQL injection in Apache Airflow MySQL provider (CVE-2023–22884)
Medium
SQL injection in Apache Airflow MySQL provider (CVE-2023–22884)
In this CVE analysis I try to investigate a critical security flaw identified within Apache Airflow as **CVE-2023–22884**.
hack and bug bounty
HTB — Tenten | 47/100
Medium
HTB — Tenten | 47/100
Howdy! Today I’m working on the Medium rated machine Tenten from HackTheBox. This was one of the more CTF-y, non-realistic machines I’ve…
hack and bug bounty
Grow and Earn Money on X. Here’s all you need to know.
Medium
Grow and Earn Money on X. Here’s all you need to know.
X is no longer Twitter. Something big is growing up.