hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Pivoting for Newbies with Ligolo-ng
Medium
Pivoting for Newbies with Ligolo-ng
Introduction
hack and bug bounty
Scalable Defense: Application Security Architecture for Growing Businesses
Medium
Scalable Defense: Application Security Architecture for Growing Businesses
In today’s digital landscape, businesses are increasingly reliant on software applications to drive their operations, serve customers, and…
hack and bug bounty
-
Medium
𝐏𝐂𝐈 𝐃𝐒𝐒 𝐌𝐨𝐧𝐢𝐭𝐨𝐫𝐢𝐧𝐠 𝐇𝐨𝐦𝐞-𝐋𝐚𝐛
😱
💥
[ 𝐏𝐂𝐈 𝐃𝐒𝐒 𝐌𝐨𝐧𝐢𝐭𝐨𝐫𝐢𝐧𝐠 𝐇𝐨𝐦𝐞-𝐋𝐚𝐛]
💥
👩💻
This home-lab is focused on building continuous PCI DSS Monitoring using…
hack and bug bounty
Effective Strategies for Implementing Application Security
Medium
Effective Strategies for Implementing Application Security
In simplest terms, application security, regardless of the field, scale, or business flows, will either make or break you.
hack and bug bounty
VAPT Services: Safeguarding SaaS from the Frontlines of Cybersecurity
Medium
VAPT Services: Safeguarding SaaS from the Frontlines of Cybersecurity
In today’s digitally connected world, Software as a Service (SaaS) has emerged as a game-changer for businesses. It offers unparalleled…
hack and bug bounty
Ethical Hacking Training in Chennai | CEH Course in Chennai
Medium
Ethical Hacking Training in Chennai | CEH Course in Chennai
Learn CEH Training from Professional Hackers in 50+ hours. Join Ethical Hacking Training in Chennai @ Bitaacademy
hack and bug bounty
“X-Forwarded-Host” helped me find my first bug.
Medium
“X-Forwarded-Host” helped me find my first bug.
Hi guys, i hope your well. Today i will tell you how i made 500 dollars with host header injection.
hack and bug bounty
Anthem — TryHackMe WriteUp
Medium
Anthem — TryHackMe WriteUp
We embark on a beginner-friendly challenge presented by TryHackMe, where the room Anthem Windows machine awaits our exploration.
hack and bug bounty
Don’t Get Lost in the Clouds: Strategies for Securing Sensitive Information in the Cloud
Medium
Don’t Get Lost in the Clouds: Strategies for Securing Sensitive Information in the Cloud
The cloud has revolutionized the way that organizations store, manage, and access sensitive information. By leveraging the cloud…
hack and bug bounty
RCE via example DAG in Apache Airflow (CVE-2022–40127)
Medium
RCE via example DAG in Apache Airflow (CVE-2022–40127)
In this writeup, we delve into the analysis of command injection vulnerability (known as CVE-2022–40127)
hack and bug bounty
Ctrl+C, Ctrl+V, and a $500 Surprise: My Reddit CSRF Tale
Medium
Ctrl+C, Ctrl+V, and a $500 Surprise: My Reddit CSRF Tale
Hey there, Brace yourselves for a tale of code capers, bounty hunting, and a surprisingly sweet $500 reward, all set in the enchanting…
hack and bug bounty
7 essential tips that helped me to get into Offensive Security
Medium
7 essential tips that helped me to get into Offensive Security
“Olá a todos”. That’s “Hello everybody” in Portuguese (Brazil) haha. Hi, I am André Ricardo, and I am a Senior Cyber Security Analyst —…
hack and bug bounty
The Programmer “Heartbug”
Medium
The Programmer “Heartbug”
💙
In the realm of algorithms and syntax, lived two programmers named Suriya and Nikki. They were part of the ingenious team at ByteBlitz, a…
hack and bug bounty
A Little Bit Of History
Medium
A Little Bit Of History
Assemblyline Blog Entry #2
hack and bug bounty
Basic Understanding of Authentication in Web Applications | 2023
Medium
Basic Understanding of Authentication in Web Applications | 2023
Demystifying the Key Concepts and Methods for Secure User Authentication by Karthikeyan Nagaraj
hack and bug bounty
I hacked the Dutch government and all I got was this lousy t-shirt
Medium
I hacked the Dutch government and all I got was this lousy t-shirt
بسم الله الرحمن الرحيم
In the name of Allah, the Compassionate, the Merciful
hack and bug bounty
PG Play — Shakabrah | 57/100
Medium
PG Play — Shakabrah | 57/100
Hi! Today I’m working on the machine Shakabrah from Proving Grounds Play/ VulnHub. This box featured getting code execution on a…
hack and bug bounty
eJPTv2 Exam Unwrapped: What to Expect and How to Excel
Medium
eJPTv2 Exam Unwrapped: What to Expect and How to Excel
Greetings fellow Readers !! While my previous blog posts have revolved around learning new techniques to exploit common Active Directory…
hack and bug bounty
ChatGPT in Offensive Security
Medium
ChatGPT in Offensive Security
ChatGPT (generative pre-trained transformer) is an artificial intelligence model that has gained much popularity since its’ launch in 2022…
hack and bug bounty
Bypass Two-Factor Authentication of Facebook Accounts ($25,300)
Medium
Bypass Two-Factor Authentication of Facebook Accounts ($25,300)
In this writeup, I will explain how I discovered a Two-Factor Authentication bypass in Facebook during Meta bug bounty Researchers…
hack and bug bounty
Kioptrix: Level 1.2 (#3) Walkthrough (Vulnhub)
Medium
Kioptrix: Level 1.2 (#3) Walkthrough (Vulnhub)
Intro: