hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
SQL Injection — Introduction for Beginners!
Medium
SQL Injection — Introduction for Beginners!
hack and bug bounty
The 7 human vulnerabilities exploited by Social Engineering
Medium
The 7 human vulnerabilities exploited by Social Engineering
Many of the successful attacks on computer systems include, to a lesser or greater extent, attacks with Social Engineering. Today we will…
hack and bug bounty
Easily discover security vulnerabilities using Nmap
Medium
Easily discover security vulnerabilities using Nmap
hack and bug bounty
Find security holes in a Website or Web application with OWASP ZAP
Medium
Find security holes in a Website or Web application with OWASP ZAP
hack and bug bounty
Metasploit Guide for Beginners
Medium
Metasploit Guide for Beginners
hack and bug bounty
Wireshark Guide: Eavesdropping Network Data and Codes
Medium
Wireshark Guide: Eavesdropping Network Data and Codes
hack and bug bounty
Find out who is stealing the internet and kick people out!
Medium
Find out who is stealing the internet and kick people out!
“Who’s connected to my network and who’s stealing internet” was a question a friend asked me recently and I’m sure you’ve heard it several…
hack and bug bounty
How Is Cybersecurity Analytics Revolutionizing the Industry
Medium
How Is Cybersecurity Analytics Revolutionizing the Industry
Did you know?
hack and bug bounty
How could we hack all organizations within a web app
Medium
How could we hack all organizations within a web app
Assalaamu’alaikum wa rahmatullah wabarakatuhu
hack and bug bounty
New 0-day vulnerabilities caught up
Medium
New 0-day vulnerabilities caught up
Two 0-day vulnerabilities (Bitforge) have been detected recently. They allow hackers to drain cryptocurrency from popular wallets in mere…
hack and bug bounty
PCI DSS: Pros and Cons of Outsourcing
Medium
PCI DSS: Pros and Cons of Outsourcing
Whether to Outsource the Storage, Processing, and Transmission of Cardholder Data
hack and bug bounty
Twitter’s Logo Transformation: Exploring the ‘X’ and Fond Memories of the Bird
Medium
Twitter’s Logo Transformation: Exploring the ‘X’ and Fond Memories of the Bird
In a bold move earlier this year, precisely in April, Twitter unveiled a significant transformation of its logo — bidding farewell to the…
hack and bug bounty
Basic of SSRF
Medium
Basic of SSRF
Hello There,
hack and bug bounty
Hacking Active Directory: Forest
Medium
Hacking Active Directory: Forest
Step into the HTB Forest Write-Up! Within this article, we delve into the conquest of an approachable Windows box graded as…
hack and bug bounty
Exploring Remote Code Execution (RCE): Unveiling Vulnerabilities and Defenses — 5 | 2023
Medium
Exploring Remote Code Execution (RCE): Unveiling Vulnerabilities and Defenses — 5 | 2023
Unveiling the Threat Landscape of Remote Code Execution | Karthikeyan Nagaraj
hack and bug bounty
HTB — Monteverde | 51/100
Medium
HTB — Monteverde | 51/100
Hi! Another day, another CTF writeup. Today I’ll be working on Monteverde, a Medium rated box from HackTheBox. This was a really cool…
hack and bug bounty
Navigating the Evolving API Landscape: Insights From the New Stack and the API Context Maturity…
Medium
Navigating the Evolving API Landscape: Insights From the New Stack and the API Context Maturity Model
In a recent article published by The New Stack, Eric Newcomer poses an intriguing question: “API Management Is a Commodity: What’s Next?”…
hack and bug bounty
Xamarin — Reversing de aplicaciones Android
Medium
Xamarin — Reversing de aplicaciones Android
Xamarin es un framework de desarrollo de aplicaciones móviles que permite crear apps nativas para iOS y Android utilizando un lenguaje de…
hack and bug bounty
What can freelancers learn from the rebranding of twitter to X and how can these learnings help to…
Medium
What can freelancers learn from the rebranding of twitter to X and how can these learnings help to…
Rebranding is a significant step for any company, and there are several key takeaways that freelancers can learn from such initiatives to…
hack and bug bounty
PEN-300 OSEP Review — Offensive Security Experienced Penetration Tester
Medium
PEN-300 OSEP Review — Offensive Security Experienced Penetration Tester
Earlier this year, I passed the Offensive Security Experienced Penetration Tester (OSEP) certification exam. As with other 300-level courses from OffSec, this was a practical 48-hour exam following…
hack and bug bounty
Hacker’s Preference: Python!
Medium
Hacker’s Preference: Python!
Compelling factors propelling Python’s remarkable rise in popularity within the hacker community