hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Ethical Hacking Learning Path — A Complete Roadmap
Medium
Ethical Hacking Learning Path — A Complete Roadmap
1. Fundamentals:
hack and bug bounty
Fortify Your Digital Fortress: VAPT Security Testing Services
Medium
Fortify Your Digital Fortress: VAPT Security Testing Services
In an era where digital vulnerabilities lurk around every corner, safeguarding your digital assets has never been more critical. Welcome to…
hack and bug bounty
Secure code review process in 4 steps
Medium
Secure code review process in 4 steps
How it seen by an application security engineer
hack and bug bounty
The CJEU Declares the EU-US Privacy Shield Invalid and SCCs Valid
Medium
The CJEU Declares the EU-US Privacy Shield Invalid and SCCs Valid
On 16 July 2020, the Court of Justice of the European Union (CJEU) made a significant ruling concerning the adequacy of the EU-US Privacy…
hack and bug bounty
Upgrade with Confidence — Windows Server 2012 R2 End of Life
Medium
Upgrade with Confidence — Windows Server 2012 R2 End of Life
With every day that passes, the inescapable end draws closer: On October 10, 2023, the time has come, Windows Server 2012/R2 will finally…
hack and bug bounty
Hacking a Tapo TC60 Camera
Medium
Hacking a Tapo TC60 Camera
A little while ago, I spotted a Tapo TC60 “Smart Security Camera” on sale at Amazon UK. After my adventures with a smart lockbox and an old…
hack and bug bounty
Beginner’s Guide to Basic Linux Commands
Medium
Beginner’s Guide to Basic Linux Commands
Linux is a powerful and versatile operating system. For those new to Linux, understanding its commands is essential for effective…
hack and bug bounty
Cyber Briefing:2023.08.23
Medium
Cyber Briefing:2023.08.23
👉
What’s trending in cybersecurity today? Agniane Stealer, Malware, Cryptocurrencies, Spacecolon Toolset, Ransomware, OfficeNote, macOS…
hack and bug bounty
THM — RazorBlack | 60/100
Medium
THM — RazorBlack | 60/100
Howdy! Back at it today with CTF writeup 60 out of a planned 100. This time I’m working on RazorBlack from TryHackMe. This was a fun…
hack and bug bounty
Auto Nuclei Updater
Medium
Auto Nuclei Updater
NucleiUpdater is an Automation Tool that Update Nuclei with Single Command on terminal as nucleiupdate.
hack and bug bounty
Types of Authentication Vulnerability in Web Applications
Medium
Types of Authentication Vulnerability in Web Applications
Understanding Authentication Vulnerabilities | Karthike
hack and bug bounty
Adobe Announces Researcher Hall of Fame Initiative for Security Researchers
Medium
Adobe Announces Researcher Hall of Fame Initiative for Security Researchers
By Daniel Ventura, Manager of Product Security Incident Response Team (PSIRT)
hack and bug bounty
If You Can Read It, You Can Break It
Medium
If You Can Read It, You Can Break It
Deobfuscation In Action
hack and bug bounty
My Journey: From Aspiring Ethical Hacker to “Hacker of the Month” on TryHackMe
Medium
My Journey: From Aspiring Ethical Hacker to “Hacker of the Month” on TryHackMe
Hello readers, Welcome to my new blog! I’m Tahir Mujawar, a Certified Ethical Hacker, and I’m thrilled to have this opportunity to share my…
hack and bug bounty
Gaining Remote Server Access: Buffer Overflows — Part 1 / 2
Medium
Gaining Remote Server Access: Buffer Overflows — Part 1 / 2
Depending on how secure a remote server is, some of the simplest attacks could give you access, like a buffer overflow.
hack and bug bounty
Elon Musk to Delete “Block” Feature on Twitter/X
Medium
Elon Musk to Delete “Block” Feature on Twitter/X
Elon Musk, the new owner of Twitter/X, has said that he will delete the “block” feature on the platform. The block feature allows users to…
hack and bug bounty
Critical Alert: Unveiling WinRAR Vulnerability CVE-2023–40477
Medium
Critical Alert: Unveiling WinRAR Vulnerability CVE-2023–40477
Security researchers have discovered a high-severity security flaw in the widely used WinRAR application, possibly making Windows computers vulnerable to remote code execution. This security flaw…
hack and bug bounty
Securing Microservices: Application Architecture for Distributed Systems
Medium
Securing Microservices: Application Architecture for Distributed Systems
In today’s digital landscape, businesses are rapidly adopting microservices architecture to build scalable, flexible, and efficient…
hack and bug bounty
Robohelp not Help
Medium
Robohelp not Help
Hi, when I try to found a bug in different platform in Bug Bounty see in this web pages who use Robohelp but this has multiple…
hack and bug bounty
Should I Learn to Code: Meditations and Insights from Top Hackers
Medium
Should I Learn to Code: Meditations and Insights from Top Hackers
In my friend circles, coding can become a tumultuous subject. The immediate image that clouds the mind is techies crowding their favorite…
hack and bug bounty
Hash cracking with a cat! on Windows
Medium
Hash cracking with a cat! on Windows
NOTE: This is not an in-depth tutorial on how to use this tool. I completed this “mini lab” as a part of TCM’s Ethical Hacking course to…