hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Cracking the Code: AppSec Adventures on HTB | Templated | Web Challenge
Medium
Cracking the Code: AppSec Adventures on HTB | Templated | Web Challenge
How do you do fellow hackers? I’m Hachiko, and that little guy next to me is my trusty hacker-cat, Babycat. Join us for HTB Templated.
hack and bug bounty
Block Dojo’s Carby helps address climate challenges while CyberXChain looks to incentivize ethical…
Medium
Block Dojo’s Carby helps address climate challenges while CyberXChain looks to incentivize ethical hackers
Carby is the first marketplace for future carbon credits, solving liquidity, scalability and transparency issues of the market. Its CEO and…
hack and bug bounty
Building Trust Through Ethical Data Collection and Usage
Medium
Building Trust Through Ethical Data Collection and Usage
In the digital era, data is often referred to as the new oil, powering modern marketing strategies and business decisions. However, as…
hack and bug bounty
10K Site Affected? Subdomain Takeover via lemlist
Medium
10K Site Affected? Subdomain Takeover via lemlist
Before going into further discussion, why does subdomain takeover happen?
In general, when a developer wants to connect his…
hack and bug bounty
Windows Security — SAM (Security Account Manager)
Medium
Windows Security — SAM (Security Account Manager)
SRM (Security Account Manager) is the DB in Windows that stores the user names/passwords of the local user defined on the system. By…
hack and bug bounty
Website penetration testing
Medium
Website penetration testing
Website penetration testing is a way to test the security of a website by performing the same tasks that a malicious user would perform…
hack and bug bounty
The Importance of Application Security Testing: Best Practices
Medium
The Importance of Application Security Testing: Best Practices
In today’s digital world, software applications are essential for businesses of all sizes. They are used to store and process sensitive…
hack and bug bounty
Hyderabad Metro Ticket for 1 Rupee!
Medium
Hyderabad Metro Ticket for 1 Rupee!
Hey readers! I want to tell you about a cool thing I did — booking a metro ticket for just 1 rupee. Here’s how it happened:
hack and bug bounty
Understanding VAPT Services: A Comprehensive Guide
Medium
Understanding VAPT Services: A Comprehensive Guide
Amidst today’s rapidly evolving digital landscape, where technology underpins nearly every facet of our lives, cybersecurity has risen to…
hack and bug bounty
TryHackMe-Fowsniff CTF(WriteUp)
Medium
TryHackMe-Fowsniff CTF(WriteUp)
Hey Guys! Welcome to the 2nd CTF challenge writeup. Let’s Go.
hack and bug bounty
New Quick Write up -.- :
Medium
New Quick Write up -.- :
hack and bug bounty
Everything You Need To Know About Vulnerability Assessment
Medium
Everything You Need To Know About Vulnerability Assessment
In today’s rapidly evolving digital landscape, where technology advancements drive businesses and communication, ensuring the security of…
hack and bug bounty
Top 11 Strategies To Boost Followers Count On Platform Twitter In 2023
Medium
Top 11 Strategies To Boost Followers Count On Platform Twitter In 2023
Twitter’s name change to X has created a buzz among netizens. As per Elon Musk, Twitter was acquired by X Corp to ensure freedom of speech…
hack and bug bounty
RCE via Account Takeover
Medium
RCE via Account Takeover
In this blog, I am gonna share about a bug that I came across while performing VAPT for a private project.
This is a CMS website that I…
hack and bug bounty
Escalating XSS with CRLF to Account Takeover (without stealing the Session token)
Medium
Escalating XSS with CRLF to Account Takeover (without stealing the Session token)
Hi Everyone,
hack and bug bounty
Discovering ADHUBLLKA Ransomware Family: Tracing Roots of LOLKEK, BIT, OBZ, U2K TZW Variants
Medium
Discovering ADHUBLLKA Ransomware Family: Tracing Roots of LOLKEK, BIT, OBZ, U2K TZW Variants
NOTE: The original work is attributed to NETENRICH Corporation. Here, you can find the official version. This article is not an in-depth…
hack and bug bounty
Gaining Remote Server Access: Buffer Overflows — Part 2/ 2
Medium
Gaining Remote Server Access: Buffer Overflows — Part 2/ 2
Depending on how secure a remote server is, some of the simplest attacks could give you access, like a buffer overflow. Continued…
hack and bug bounty
MY first bug bounty via Parameter Mining
Medium
MY first bug bounty via Parameter Mining
$Whoami
hack and bug bounty
2.2 Lab: 2FA simple bypass using Burpsuite— 2023
Medium
2.2 Lab: 2FA simple bypass using Burpsuite— 2023
This lab’s two-factor authentication can be bypassed. To solve the lab, access Carlos’s account page | Karthikeyan Nagaraj
hack and bug bounty
API Recon ️♂️With Google Dorks
Medium
API Recon
🕵️♂️
With Google Dorks
Exploring Google Dorking Queries to Enhance API Security
🔒
hack and bug bounty
Basic Reconnaissance Techniques: Gathering Information Ethically
Medium
Basic Reconnaissance Techniques: Gathering Information Ethically
In the realm of ethical hacking, reconnaissance, often referred to as the “information gathering” phase, is the crucial first step. To…