hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
What is application blacklisting?
Medium
What is application blacklisting?
Application security breaches are one of the most common cyber threats companies face. Malicious actors can use vulnerabilities in one of…
hack and bug bounty
RCE via example DAG in Apache Airflow (CVE-2022–40127) — Exploit
Medium
RCE via example DAG in Apache Airflow (CVE-2022–40127) — Exploit
The provided Python code is an exploit script targeting CVE-2022–40127, a Remote Code Execution (RCE)
hack and bug bounty
How to Hack Android Phones?
Medium
How to Hack Android Phones?
Hii Amigos in today's article we were going to learn how we can hack Android phones
hack and bug bounty
What is DoS/DDoS?
Medium
What is DoS/DDoS?
In this article, we will cover one of the world’s most known cyber attacks: Denial of Service. Before we start boring definitions and…
hack and bug bounty
1st ATO | How I exploited security issue to take over admin account
Medium
1st ATO | How I exploited security issue to take over admin account
Few days ago I came across one bug bounty program of an booking website lets call https://redacted.com which was interesting website with…
hack and bug bounty
Nmap part 1 : Live Host Discovery
Medium
Nmap part 1 : Live Host Discovery
Hello everyone, I hope you all are doing great!
hack and bug bounty
My First Bug: How I Was Able to Bypass the WAF and Uncover a Reflected XSS
Medium
My First Bug: How I Was Able to Bypass the WAF and Uncover a Reflected XSS
Hello everyone, I’m Fares. Today, I’ll share the story of how I successfully identified a reflected XSS vulnerability within a public bug…
hack and bug bounty
Joomla Security: Insights & RCE
Medium
Joomla Security: Insights & RCE
Introduction:
hack and bug bounty
Intermediate Nmap — TryHackMe WriteUp
Medium
Intermediate Nmap — TryHackMe WriteUp
Can you combine your great nmap skills with other tools to log in to this machine?
hack and bug bounty
Cyber Briefing: 2023.08.22
Medium
Cyber Briefing: 2023.08.22
👉
What’s the latest in the cyber world today? Google Bots, Malware, Carderbee Supply Chain Attack, Hong Kong, HiatusRAT, Space, Tesla Data…
hack and bug bounty
THM — Fowsniff CTF | 59/100
Medium
THM — Fowsniff CTF | 59/100
Hi! Today I’m working on the Easy rated machine Fowsniff CTF from TryHackMe. This was a really creative CTF that revolved around…
hack and bug bounty
Critical WinRAR Security Flaw Opens Door to PC Takeover by Hackers:-
Medium
Critical WinRAR Security Flaw Opens Door to PC Takeover by Hackers:-
Introduction
hack and bug bounty
What is the role of open-source intelligence?
Medium
What is the role of open-source intelligence?
hack and bug bounty
XSS Rat bug bounty bootcamp #9 review. Is it worth the money and time??
Medium
XSS Rat bug bounty bootcamp #9 review. Is it worth the money and time??
Absoultly **cki** NOOOOOOO…
hack and bug bounty
InfoSecSherpa’s News Roundup for Tuesday, August 22, 2023
Medium
InfoSecSherpa’s News Roundup for Tuesday, August 22, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Playing Admin With Signed Cookies — A Hands-on Example
Medium
Playing Admin With Signed Cookies — A Hands-on Example
An introduction to forging signed cookies using the Most Cookies ctf as an example
hack and bug bounty
VulnHub: Kioptrix Level 2
Medium
VulnHub: Kioptrix Level 2
Daha öncəki məqaləmdə Kioptrix Level 1-i üç müxtəlif üsul ilə həll etmişdik . Həmin məqalələrə aşağıdaı link vasitəsi ilə daxil ola…
hack and bug bounty
You could become an ethical hacker in 1 month.
Medium
You could become an ethical hacker in 1 month.
These are the 5 simple steps you need to take.
hack and bug bounty
OverTheWire-Bandit(Part-2)(WriteUp)
Medium
OverTheWire-Bandit(Part-2)(WriteUp)
Hey Everyone! Welcome back. Last time within part-1, I finished off upto Level 11–>12. So, for the introduction and basic information refer…
hack and bug bounty
How to expand your attack surface and avoid duplicates
Medium
How to expand your attack surface and avoid duplicates
we’re gonna talk in this blog about JS files, how to get easy wins from it
hack and bug bounty
The Power of Guest: Account Takeover
Medium
The Power of Guest: Account Takeover
Hello All, this a write up about an account takeover using guest access (which is kinda dumb)