hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Cyber Briefing:2023.08.23
Medium
Cyber Briefing:2023.08.23
👉
What’s trending in cybersecurity today? Agniane Stealer, Malware, Cryptocurrencies, Spacecolon Toolset, Ransomware, OfficeNote, macOS…
hack and bug bounty
THM — RazorBlack | 60/100
Medium
THM — RazorBlack | 60/100
Howdy! Back at it today with CTF writeup 60 out of a planned 100. This time I’m working on RazorBlack from TryHackMe. This was a fun…
hack and bug bounty
Auto Nuclei Updater
Medium
Auto Nuclei Updater
NucleiUpdater is an Automation Tool that Update Nuclei with Single Command on terminal as nucleiupdate.
hack and bug bounty
Types of Authentication Vulnerability in Web Applications
Medium
Types of Authentication Vulnerability in Web Applications
Understanding Authentication Vulnerabilities | Karthike
hack and bug bounty
Adobe Announces Researcher Hall of Fame Initiative for Security Researchers
Medium
Adobe Announces Researcher Hall of Fame Initiative for Security Researchers
By Daniel Ventura, Manager of Product Security Incident Response Team (PSIRT)
hack and bug bounty
If You Can Read It, You Can Break It
Medium
If You Can Read It, You Can Break It
Deobfuscation In Action
hack and bug bounty
My Journey: From Aspiring Ethical Hacker to “Hacker of the Month” on TryHackMe
Medium
My Journey: From Aspiring Ethical Hacker to “Hacker of the Month” on TryHackMe
Hello readers, Welcome to my new blog! I’m Tahir Mujawar, a Certified Ethical Hacker, and I’m thrilled to have this opportunity to share my…
hack and bug bounty
Gaining Remote Server Access: Buffer Overflows — Part 1 / 2
Medium
Gaining Remote Server Access: Buffer Overflows — Part 1 / 2
Depending on how secure a remote server is, some of the simplest attacks could give you access, like a buffer overflow.
hack and bug bounty
Elon Musk to Delete “Block” Feature on Twitter/X
Medium
Elon Musk to Delete “Block” Feature on Twitter/X
Elon Musk, the new owner of Twitter/X, has said that he will delete the “block” feature on the platform. The block feature allows users to…
hack and bug bounty
Critical Alert: Unveiling WinRAR Vulnerability CVE-2023–40477
Medium
Critical Alert: Unveiling WinRAR Vulnerability CVE-2023–40477
Security researchers have discovered a high-severity security flaw in the widely used WinRAR application, possibly making Windows computers vulnerable to remote code execution. This security flaw…
hack and bug bounty
Securing Microservices: Application Architecture for Distributed Systems
Medium
Securing Microservices: Application Architecture for Distributed Systems
In today’s digital landscape, businesses are rapidly adopting microservices architecture to build scalable, flexible, and efficient…
hack and bug bounty
Robohelp not Help
Medium
Robohelp not Help
Hi, when I try to found a bug in different platform in Bug Bounty see in this web pages who use Robohelp but this has multiple…
hack and bug bounty
Should I Learn to Code: Meditations and Insights from Top Hackers
Medium
Should I Learn to Code: Meditations and Insights from Top Hackers
In my friend circles, coding can become a tumultuous subject. The immediate image that clouds the mind is techies crowding their favorite…
hack and bug bounty
Hash cracking with a cat! on Windows
Medium
Hash cracking with a cat! on Windows
NOTE: This is not an in-depth tutorial on how to use this tool. I completed this “mini lab” as a part of TCM’s Ethical Hacking course to…
hack and bug bounty
InfoSecSherpa’s News Roundup for Wednesday, August 23, 2023
Medium
InfoSecSherpa’s News Roundup for Wednesday, August 23, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Streamline dependency updates with Mergify and Snyk
Medium
Streamline dependency updates with Mergify and Snyk
Managing dependencies for a project is a task that requires consistent effort and attention. Surely, you’ve found yourself concerned about any of the following while maintaining a project: Luckily…
hack and bug bounty
Is AI Stupid?
Medium
Is AI Stupid?
In the realm of technological advancement, few goals are as captivating and elusive as achieving Artificial General Intelligence (AGI)…
hack and bug bounty
Penetration Testing: The Shield Against Cyber Threats
Medium
Penetration Testing: The Shield Against Cyber Threats
Learn why penetration tests are important and see popular tools in the industry that can help you finding possible threats in your security
hack and bug bounty
How To Know If A Hacker Is Watching Your Phone
Medium
How To Know If A Hacker Is Watching Your Phone
Introduction
hack and bug bounty
Implications of removing Administrator accounts from AppSec applications
Medium
Implications of removing Administrator accounts from AppSec applications
Administrator accounts in application security applications play a crucial role in managing and securing the application environment. They…
hack and bug bounty
Understanding Lapsus$ Group’s SIM-Swapping Attacks
Medium
Understanding Lapsus$ Group’s SIM-Swapping Attacks
In a striking revelation, the U.S. government has meticulously dissected the labyrinthine strategies employed by the Lapsus$ extortion group to infiltrate a multitude of organizations boasting robust…