hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Man-in-the-Middle Attack using ARP Poisoning
Medium
Man-in-the-Middle Attack using ARP Poisoning
hack and bug bounty
Decoding The 79% Drop In Android Usage for Instagram Threads In One Month.
Medium
Decoding The 79% Drop In Android Usage for Instagram Threads In One Month.
Recent data reveals a significant decline in the daily active users of Instagram’s Threads app on Android, contrasting with the upward…
hack and bug bounty
Android Application Links and iOS Universal Links: A More Secure Way to Deep Link
Medium
Android Application Links and iOS Universal Links: A More Secure Way to Deep Link
Background
hack and bug bounty
SQL injection in Apache Airflow MySQL provider (CVE-2023–22884) — PoC + exploit
Medium
SQL injection in Apache Airflow MySQL provider (CVE-2023–22884) — PoC + exploit
Proof of Concept for CVE-2023–22884 that is an Apache Airflow SQL injection vulnerability.
hack and bug bounty
UNQUOTED SERVICE PATH vulnerability in Windows 10 Enterprise machine
Medium
UNQUOTED SERVICE PATH vulnerability in Windows 10 Enterprise machine
INTRODUCTION
hack and bug bounty
The Wisdom of the Crowd: Community Driven Security
Medium
The Wisdom of the Crowd: Community Driven Security
Acknowledgments: Special thanks to Sock and Samara LeMerle from Code4rena, Oliver Hörr from Hats Finance, Konstantin Andriotis from Hexens…
hack and bug bounty
Discover a machine’s open ports using Metasploit
Medium
Discover a machine’s open ports using Metasploit
One of the first steps in identifying a machine is to determine the open ports on the system we are checking for security. Nmap is of…
hack and bug bounty
SQL Injection — Introduction for Beginners!
Medium
SQL Injection — Introduction for Beginners!
hack and bug bounty
The 7 human vulnerabilities exploited by Social Engineering
Medium
The 7 human vulnerabilities exploited by Social Engineering
Many of the successful attacks on computer systems include, to a lesser or greater extent, attacks with Social Engineering. Today we will…
hack and bug bounty
Easily discover security vulnerabilities using Nmap
Medium
Easily discover security vulnerabilities using Nmap
hack and bug bounty
Find security holes in a Website or Web application with OWASP ZAP
Medium
Find security holes in a Website or Web application with OWASP ZAP
hack and bug bounty
Metasploit Guide for Beginners
Medium
Metasploit Guide for Beginners
hack and bug bounty
Wireshark Guide: Eavesdropping Network Data and Codes
Medium
Wireshark Guide: Eavesdropping Network Data and Codes
hack and bug bounty
Find out who is stealing the internet and kick people out!
Medium
Find out who is stealing the internet and kick people out!
“Who’s connected to my network and who’s stealing internet” was a question a friend asked me recently and I’m sure you’ve heard it several…
hack and bug bounty
How Is Cybersecurity Analytics Revolutionizing the Industry
Medium
How Is Cybersecurity Analytics Revolutionizing the Industry
Did you know?
hack and bug bounty
How could we hack all organizations within a web app
Medium
How could we hack all organizations within a web app
Assalaamu’alaikum wa rahmatullah wabarakatuhu
hack and bug bounty
New 0-day vulnerabilities caught up
Medium
New 0-day vulnerabilities caught up
Two 0-day vulnerabilities (Bitforge) have been detected recently. They allow hackers to drain cryptocurrency from popular wallets in mere…
hack and bug bounty
PCI DSS: Pros and Cons of Outsourcing
Medium
PCI DSS: Pros and Cons of Outsourcing
Whether to Outsource the Storage, Processing, and Transmission of Cardholder Data
hack and bug bounty
Twitter’s Logo Transformation: Exploring the ‘X’ and Fond Memories of the Bird
Medium
Twitter’s Logo Transformation: Exploring the ‘X’ and Fond Memories of the Bird
In a bold move earlier this year, precisely in April, Twitter unveiled a significant transformation of its logo — bidding farewell to the…
hack and bug bounty
Basic of SSRF
Medium
Basic of SSRF
Hello There,
hack and bug bounty
Hacking Active Directory: Forest
Medium
Hacking Active Directory: Forest
Step into the HTB Forest Write-Up! Within this article, we delve into the conquest of an approachable Windows box graded as…