hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
AppSec Tales XVII | SSRF
Medium
AppSec Tales XVII | SSRF
Application Security Testing for the Server Side Request Forgery.
hack and bug bounty
Security For Everyone - 2023 Update
ZephrSec - Adventures In Information Security
Security For Everyone - 2023 Update
This post will go through some of the steps you can take as an individual to secure the accounts that mean the most to you.
hack and bug bounty
My first Bounty Worth $$$$
Medium
My first Bounty Worth $$$$
Hello everyone, I’m Lavesh Verma, and I recently received my first bounty on HackerOne, after initially having most of my bug reports…
hack and bug bounty
Why Switch to Cyber ?
Medium
Why Switch to Cyber ?
Empowering Your Journey into Cybersecurity Excellence
hack and bug bounty
The Ticket Hack: Free travel by hacking the Chennai Metro Rail.
Medium
The Ticket Hack: Free travel by hacking the Chennai Metro Rail.
Hello Amazing readers, This writeup is all about how, during my internship in Chennai , I stumbled upon a critical vulnerability in the…
hack and bug bounty
Reversing WordPress CVEs: Baby Steps
Medium
Reversing WordPress CVEs: Baby Steps
Hey all! My first post in a long time. While this isn’t a super brainy one, reproducing it was surely fun.
hack and bug bounty
My top 5 bookmarks that I consistently use for bug bounty and penetration testing.
Medium
My top 5 bookmarks that I consistently use for bug bounty and penetration testing.
I am going to share my 5 personal bookmarks that I mostly use during penetration testing. Let’s jump into the topic.
hack and bug bounty
Hijacking Broken Links for $$$
Medium
Hijacking Broken Links for $$$
What is Broken Link Hijacking?
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, August 20, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, August 20, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
5 must need bookmark for bug bounty hunters/penetration testers
Medium
5 must need bookmark for bug bounty hunters/penetration testers
I am going to share my 5 personal bookmarks that I mostly use during penetration testing. Let’s jump into the topic.
hack and bug bounty
Experiment #6 (Hide & Seek)
Medium
Experiment #6 (Hide & Seek)
You are probably familiar with the concept of hiding API Keys in your Android application. It’s rather logical, isn’t it? I mean, who would…
hack and bug bounty
Course Review: SEC660 Advanced Penetration Testing, Exploit Writing, and Ethical Hacking (GXPN)
Medium
Course Review: SEC660 Advanced Penetration Testing, Exploit Writing, and Ethical Hacking (GXPN)
Disclaimer
hack and bug bounty
Web Sunucularını Hacklemek
Medium
Web Sunucularını Hacklemek
İstemcilerin isteklerini işleyerek web sayfalarını veya web uygulamalarını sunan yazılım ya da hizmet web sunucusu olarak adlandırılır…
hack and bug bounty
Stealing $100,000 at DEF CON with this one neat trick.
Medium
Stealing $100,000 at DEF CON with this one neat trick.
At Defcon 31 I stumbled across the payment village. Knowing nothing about the space, I decided to give the workshop and CTF a try.
The…
hack and bug bounty
HackTheBox “Doctor” Walkthrough
Medium
HackTheBox “Doctor” Walkthrough
Doctor, an easy-level Linux OS machine on HackTheBox, a platform resembling a digital message board. The challenge involves seeking out a…
hack and bug bounty
Proving Grounds: Vault PenTest Report
Medium
Proving Grounds: Vault PenTest Report
A report on Vault, a hard rated machine from OffSec’s Proving Grounds.
hack and bug bounty
Pivoting for Newbies with Ligolo-ng
Medium
Pivoting for Newbies with Ligolo-ng
Introduction
hack and bug bounty
Scalable Defense: Application Security Architecture for Growing Businesses
Medium
Scalable Defense: Application Security Architecture for Growing Businesses
In today’s digital landscape, businesses are increasingly reliant on software applications to drive their operations, serve customers, and…
hack and bug bounty
-
Medium
𝐏𝐂𝐈 𝐃𝐒𝐒 𝐌𝐨𝐧𝐢𝐭𝐨𝐫𝐢𝐧𝐠 𝐇𝐨𝐦𝐞-𝐋𝐚𝐛
😱
💥
[ 𝐏𝐂𝐈 𝐃𝐒𝐒 𝐌𝐨𝐧𝐢𝐭𝐨𝐫𝐢𝐧𝐠 𝐇𝐨𝐦𝐞-𝐋𝐚𝐛]
💥
👩💻
This home-lab is focused on building continuous PCI DSS Monitoring using…
hack and bug bounty
Effective Strategies for Implementing Application Security
Medium
Effective Strategies for Implementing Application Security
In simplest terms, application security, regardless of the field, scale, or business flows, will either make or break you.
hack and bug bounty
VAPT Services: Safeguarding SaaS from the Frontlines of Cybersecurity
Medium
VAPT Services: Safeguarding SaaS from the Frontlines of Cybersecurity
In today’s digitally connected world, Software as a Service (SaaS) has emerged as a game-changer for businesses. It offers unparalleled…