hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
DNS Spoofing Attack Using Python
Medium
DNS Spoofing Attack Using Python
In this article, I will demonstrate how you can execute a DNS Spoofing Attack using the Python Language. First, we will implement an ARP…
hack and bug bounty
Windows — Securable Objects
Medium
Windows — Securable Objects
Overall, “securable objects” are Windows objects (https://medium.com/@boutnaru/windows-objects-2c289da600bf) that can have a “security…
hack and bug bounty
Unveiling Vulnerabilities: Host-header injection in OAuth Functionality
Medium
Unveiling Vulnerabilities: Host-header injection in OAuth Functionality
Introduction
hack and bug bounty
Critical XSS Vulnerability in Workflowy
Medium
Critical XSS Vulnerability in Workflowy
Exposes Users to Unauthorized Code Execution and Information Disclosure: Immediate Caution Advised
hack and bug bounty
Exploiting URL-Based Access Control: A Lab Analysis
Medium
Exploiting URL-Based Access Control: A Lab Analysis
Introduction: Greetings, infosec researchers!
hack and bug bounty
A Journey Close to RCE in Nokia
Medium
A Journey Close to RCE in Nokia
Hello everyone. In this article, I will share the story of how I came very close to discovering an RCE (Remote Code Execution)…
hack and bug bounty
Top 10 Subdomain Finders for Great Website Reconnaissance in Bug Bounty
Medium
Top 10 Subdomain Finders for Great Website Reconnaissance in Bug Bounty
Subdomain enumeration is the process of finding #subdomains of a particular domain. Subdomain Finder is a useful tool to help discover…
hack and bug bounty
Zuckerberg Dismisses Musk’s Cage Fight Proposal as a Mere Spectacle
Medium
Zuckerberg Dismisses Musk’s Cage Fight Proposal as a Mere Spectacle
Mark Zuckerberg has publicly stated that Elon Musk’s proposal for a cage fight is not a serious endeavor and suggests it’s time to move on…
hack and bug bounty
This is Leonidas, he is deploying an application online and needs to be sure that application…
Medium
This is Leonidas, he is deploying an application online and needs to be sure that application…
He does not look like an application administrator. Don’t judge!
hack and bug bounty
Benefits of PCI DSS Compliance
Medium
Benefits of PCI DSS Compliance
Every organization that handles credit card information, whether they store, process, or transmit it, is required to comply with the PCI…
hack and bug bounty
X (Formerly Twitter) To Roll Out Video And Audio Calling Features.
Medium
X (Formerly Twitter) To Roll Out Video And Audio Calling Features.
In its ongoing evolution into X, Twitter’s CEO, Linda Yaccarino, has confirmed that a forthcoming feature will allow platform users to…
hack and bug bounty
Cyber Briefing: 2023.08.15
Medium
Cyber Briefing: 2023.08.15
👉
What’s the latest in the cyber world today? QwixxRAT, RAT, Telegram, Discord, Linux, Monti Ransomware, Cryptocurrency Scams, FBI…
hack and bug bounty
Exploring Authentication Mechanisms and Their Role in API Security
Medium
Exploring Authentication Mechanisms and Their Role in API Security
In the rapidly evolving landscape of modern software development, securing data and resources has become paramount. Authentication…
hack and bug bounty
VEnum — Subdomain Enumeration Tool
Medium
VEnum — Subdomain Enumeration Tool
The first step in any Pentesting engagement or Bug Hunting is to mapping and enumerate all target’s assets specially if you will go…
hack and bug bounty
How to Find and Exploit Remote Code Execution (RCE) Vulnerabilities: Unveiling the Pathways to…
Medium
How to Find and Exploit Remote Code Execution (RCE) Vulnerabilities: Unveiling the Pathways to Digital Security | 2023
Unlocking the Secrets of Remote Code Execution (RCE) Vulnerabilities: A Definitive Guide | Karthikeyan Nagaraj
hack and bug bounty
Journey to 5 Million Impressions: Adapting & Evolving as a Creator on ‘X’
Medium
Journey to 5 Million Impressions: Adapting & Evolving as a Creator on ‘X’
Welcome to a glimpse of my x-creator challenge as I strive to hit 5 million impressions on ‘X’!
hack and bug bounty
Commix — Command Injection Exploiter
Medium
Commix — Command Injection Exploiter
Introduction:
hack and bug bounty
Insecure Direct Object Reference (IDOR) Vulnerability
Medium
Insecure Direct Object Reference (IDOR) Vulnerability
Click Here https://www.fiverr.com/s/D73yRa
hack and bug bounty
Exploring XSS Attack: My Approaches, Techniques, and Mitigation for Identifying in Web Applications
Medium
Exploring XSS Attack: My Approaches, Techniques, and Mitigation for Identifying in Web Applications
Hi Readers!
hack and bug bounty
How i earned my first 1000$ in Bug Bounty
Medium
How i earned my first 1000$ in Bug Bounty
Hey there, tech enthusiasts and bug-hunting buddies!
hack and bug bounty
Busting the Myth: Data Breaches Don’t Necessarily Mean Business Loss
Medium
Busting the Myth: Data Breaches Don’t Necessarily Mean Business Loss
Cyber attacks have become an increasingly common threat to businesses in recent years, with data breaches being one of the most talked…