hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
How i escalate P5 to P3
Medium
How i escalate P5 to P3
self-xss to exploitable-xss
hack and bug bounty
Master and Find XSS Easily
Medium
Master and Find XSS Easily
Hi , I’m shellreaper again and today I’m gonna explain to you RXSS(Reflected XSS) and SXSS(Stored XSS ) in a simple way.
hack and bug bounty
An IDOR leads join any group makes me $2,500
Medium
An IDOR leads join any group makes me $2,500
Simple IDOR rewards $2,500
💰
hack and bug bounty
The Linux Kernel Macro Journey — “__randomize_layout”
Medium
The Linux Kernel Macro Journey — “__randomize_layout”
Overall, “__randomize_layout” is macro which defined in the Linux source code as part of the “compiler_type.h” file…
hack and bug bounty
MISSION OSCP: Step 1 — Base Camp
Medium
MISSION OSCP: Step 1 — Base Camp
Hi all,
hack and bug bounty
DEF CON 31: A Journey From Top To Bottom
Medium
DEF CON 31: A Journey From Top To Bottom
After the end of the DEF CON 31: Hacker Conference 2023 | #1 Hacker Event, I started writing this «capture the event» forensics report at…
hack and bug bounty
API Security — Authentication & Authorization
Medium
API Security — Authentication & Authorization
Problem Statement: In the era of digital transformation, monoliths are broken into stateless APIs. For any organization, the externally…
hack and bug bounty
Lab 1: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data — 1 | 2023
Medium
Lab 1: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data — 1 | 2023
To solve the lab, perform a SQL injection attack that causes the application to display one or more unreleased products | Karthikeyan…
hack and bug bounty
Linux : Mengenal Sistem Operasi Sumber Terbuka dan 5 Contoh Distro Linux
Medium
Linux : Mengenal Sistem Operasi Sumber Terbuka dan 5 Contoh Distro Linux
Linux merupakan salah satu sistem operasi yang telah mewarnai dunia komputasi sejak pertengahan 1990-an. Disebut juga sebagai “kernel”…
hack and bug bounty
Is It Beneficial To Eliminate The Block Feature on Twitter/X?
Medium
Is It Beneficial To Eliminate The Block Feature on Twitter/X?
The decision to remove a blocked feature on Twitter or any platform depends on the specific context and reasons behind the blocking. Here…
hack and bug bounty
Cross-Site Scripting (XSS) vulnerability report on Aquarium Restaurants with Dalfox
Medium
Cross-Site Scripting (XSS) vulnerability report on Aquarium Restaurants with Dalfox
Saya seorang peneliti keamanan siber yang berdedikasi tengah menjelajahi internet untuk mengidentifikasi kerentanan dalam berbagai situs…
hack and bug bounty
Kioptix Level-1 (Walkthrough)
Medium
Kioptix Level-1 (Walkthrough)
Download VM from the link
hack and bug bounty
Is Kali Linux good for hacking?
Medium
Is Kali Linux good for hacking?
Click Here https://lnkd.in/gM3k5Pff
hack and bug bounty
iOS Pentesting Series Part 3- The Ceasefire
Medium
iOS Pentesting Series Part 3- The Ceasefire
Hola mates,
hack and bug bounty
Kioptrix Level — 2 (walkthrough)
Medium
Kioptrix Level — 2 (walkthrough)
Setup:
hack and bug bounty
Source Code Analysis using Semgrep
Medium
Source Code Analysis using Semgrep
Hello folks, I would like to introduce to semgrep that analyzes source code locally. Semgrep registry have enormous security rules which…
hack and bug bounty
Sau Machine Hack The Box
Medium
Sau Machine Hack The Box
Network Enumeration
hack and bug bounty
Escaping Input Sanitization By Using Bulk Import Features
Medium
Escaping Input Sanitization By Using Bulk Import Features
Hi everyone ! Today I will try to explain another implementation based flaw and how to abuse it by showing a scenario that I faced. Lets…
hack and bug bounty
Unveiling the Vulnerabilities in Wireless Mobile Data Exchange
Medium
Unveiling the Vulnerabilities in Wireless Mobile Data Exchange
Uncover risks in wireless data exchange: encryption, public Wi-Fi threats & safeguards for secure communication. Stay informed for safer…
hack and bug bounty
CompTIA Network+ Exam: Navigating the Networking Landscape
Medium
CompTIA Network+ Exam: Navigating the Networking Landscape
A reputable certification programme to verify the networking expertise and skills of IT professionals is the CompTIA Network+ test. The…
hack and bug bounty
Unveiling the Power of Burp Suite’s Proxy: A Deep Dive into Ethical Hacking’s Heartbeat
Medium
Unveiling the Power of Burp Suite’s Proxy: A Deep Dive into Ethical Hacking’s Heartbeat
In the ever-evolving realm of cybersecurity, where the clash between hackers and guardians rages on, a captivating dimension unveils itself…