hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
From Idor to Account takeover(ATO)
Medium
من Idor إلى حساب تولي المسؤولية (ATO)
أهلا بالجميع ،
hack and bug bounty
Block surveys stats worth $$$$ Bounty
Medium
Block surveys stats worth $$$$ Bounty
Hi All
My Name Abdelkader Mouaz People know me as(Hamzadzworm -.-)
hack and bug bounty
From IDOR to Account takeover(ATO)
Medium
From IDOR to Account takeover(ATO)
Hello everyone ,
I’m Hossam Hamada, Today I would like to share with you one of my discoveries in HackerOne ’s program
hack and bug bounty
Blind OS command injection vulnerabilities
Medium
Blind OS command injection vulnerabilities
Details here https://shorturl.at/uBV29
hack and bug bounty
From Revealing Emails to Taking Over Accounts (Hacking Telecom)
Medium
From Revealing Emails to Taking Over Accounts (Hacking Telecom)
Hacking Telecom — Revealing user’s emails then taking over their accounts.
hack and bug bounty
Red Team Ops I (CRTO) Review — Adversary Simulation & Red Team Operations
Medium
Red Team Ops I (CRTO) Review — Adversary Simulation & Red Team Operations
Review of the Certified Red Team Operator (CRTO) Certification & Red Team Ops I course from Zero Point Security
hack and bug bounty
SHADOWS OF DECEPTION PART 3
Medium
SHADOWS OF DECEPTION PART 3
Title: Cyber Convergence: Uniting Legends - A New York Times Best Seller
hack and bug bounty
Getting Started with Burp Suite: A Comprehensive Guide
Medium
Getting Started with Burp Suite: A Comprehensive Guide
Burp Suite is a powerful toolkit widely used by cybersecurity professionals for web application security testing and analysis. Whether you…
hack and bug bounty
Proving Grounds: Hutch PenTest Report
Medium
Proving Grounds: Hutch PenTest Report
An Active Directory penetration test on Hutch from Proving Grounds
hack and bug bounty
Hacking WiFi: One Of The Fundamental Skills Of The Master Hacker in the 21st Century
Medium
Hacking WiFi: One Of The Fundamental Skills Of The Master Hacker in the 21st Century
Are you still struggling with finding the best, simplest, and easiest way to hack wifi? So was I a year ago when I set a goal to transition…
hack and bug bounty
Hackers’ Limbo: When the Bug Bounty Trail Goes Cold
Medium
Hackers’ Limbo: When the Bug Bounty Trail Goes Cold
Navigating the Abyss of Hacking
hack and bug bounty
Navigating Phishing Trends: Protecting Against Evolving Cyber Threats
Medium
Navigating Phishing Trends: Protecting Against Evolving Cyber Threats
The magnitude of the phishing threat is staggering. In 2022 alone, there were over 4.7 million phishing attacks, marking a substantial increase from previous years. This surge indicates that…
hack and bug bounty
How I Discovered Content Spoofing in PayPal in Just 15 Minutes.
Medium
How I Discovered Content Spoofing in PayPal in Just 15 Minutes.
While I was reading a write-up about a bug hunter who explained how he found CSRF in PayPal, it ended up inspiring me to search for…
hack and bug bounty
GoPhish On-Demand Ethical Phishing Campaigns Using Kasm Workspaces
Medium
GoPhish On-Demand Ethical Phishing Campaigns Using Kasm Workspaces
A recap of the GoPhish phishing framework launched from on-demand ephemeral Kasm Workspaces demonstrated on the Tech Raj YouTube channel.
hack and bug bounty
HACKING!!!
Medium
HACKING!!!
ఈ కాలం లో ఎక్కడ చుసిన ఒకటే మాట… మా ఫోన్ హాక్ అయింది,.. మా సోషల్ మీడియా అకౌంట్ హాక్ అయింది, మా బ్యాంకు అకౌంట్ హాక్ అయింది అని ఒకటే ఆందోళన .
hack and bug bounty
Mine Verus on Android: Easy Guide to Smartphone Mining
Medium
Mine Verus on Android: Easy Guide to Smartphone Mining
When mining Verus we typically like packs of high quality USB A to USB C charging cables. Here are a few suggestions In conclusion, the realm of cryptocurrency mining has expanded to embrace the…
hack and bug bounty
China’s Tech Giants Spend $5 Billion Buying Crippled Nvidia GPUs : TechNewsTalks
Medium
China’s Tech Giants Spend $5 Billion Buying Crippled Nvidia GPUs : TechNewsTalks
Despite the company’s recent success, its stock price has been subjected to high growth assumptions, including the expected doubling of sales in the coming quarters and an almost fourfold increase in…
hack and bug bounty
Introduction to Software Security
Medium
Introduction to Software Security
Overview of this blog?
hack and bug bounty
Quackerjack write-up — Proving Grounds, Get To Work
Medium
Quackerjack write-up — Proving Grounds, Get To Work
Write up for Quackerjack, an intermediate level machine from Proving Grounds (PG) by OffSec.
hack and bug bounty
How I Discovered Over 40+ Impactful Vulnerabilities Within 1 Hour, Just for Fun!
Medium
How I Discovered Over 40+ Impactful Vulnerabilities Within 1 Hour, Just for Fun!
Hello, I’m Takshal, aka tojojo. I hope you all are doing well. Today, I’m excited to share my journey of finding more than 40+ impactful…
hack and bug bounty
Improper Neutralization of Input During Web Page Generation, Stored XSS in KiwiTCMS…
Medium
Improper Neutralization of Input During Web Page Generation, Stored XSS in KiwiTCMS…
Hi everyone
👋🏻
, Today I would like to share a vulnerability I found in KiwiTCMS. also my first CVE (CVE-2023–36809)