hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Experiment #7 (Under Lock & Key)
Medium
Experiment #7 (Under Lock & Key)
Previously in Experiment #6, we had a chance to explore API Keys and how to hide them the native way. We got to see how Google’s…
hack and bug bounty
My Journey to PNPT
Medium
My Journey to PNPT
I recently obtained the Practical Network Penetration Tester certification offered by TCM Security and I’m writing this post to tell you…
hack and bug bounty
DEF CON 31 WebSploit Labs Challenge Walkthrough
Medium
DEF CON 31 WebSploit Labs Challenge Walkthrough
I co-founded and one of the leads of the DEF CON Red Team Village. At DEF CON 31’s Red Team Village, I conducted two workshops:
hack and bug bounty
Cracking the Code:Implementing Secure Design Principles for Effective Software Development
Medium
Cracking the Code:Implementing Secure Design Principles for Effective Software Development
Part Two On A Series on Shifting Security Left In The Software Development Lifecycle
hack and bug bounty
Proving Grounds: Heist PenTest Report
Medium
Proving Grounds: Heist PenTest Report
A report on Heist, a hard rated machine from OffSec’s Proving Grounds
hack and bug bounty
Can Someone Hack Your Phone Through Text Messages?
Medium
Can Someone Hack Your Phone Through Text Messages?
Introduction
hack and bug bounty
Can Someone Hack Your Phone Through Text Messages?
Medium
Can Someone Hack Your Phone Through Text Messages?
Introduction
hack and bug bounty
Web Uygulama Güvenliği | OWASP | Bug Bounty
Medium
Web Uygulama Güvenliği | OWASP | Bug Bounty
hack and bug bounty
Solidity Cheat Sheet (Updated for ^0.8.0)
Medium
Solidity Cheat Sheet (Updated for ^0.8.0)
Quick review to the most relevant global variables used in Solidity smart contracts
hack and bug bounty
HTB: Omni
Medium
HTB: Omni
Hello everyone! This box is an “easy” Windows IoT based machine that involves finding a publicly available exploit, which uses a buffer
hack and bug bounty
Security Operations Center (SOC): A Step-by-Step Start to the Cyber Security Journey
Medium
Security Operations Center (SOC): A Step-by-Step Start to the Cyber Security Journey
What is a Security Operations Center (SOC)?
hack and bug bounty
DOM-Based XSS — Simple Guide
Medium
DOM-Based XSS — Simple Guide
The DOM
hack and bug bounty
Top 25 Linux Tools for Penetration Testing: Unveiling the Arsenal of Ethical Hackers
Medium
Top 25 Linux Tools for Penetration Testing: Unveiling the Arsenal of Ethical Hackers
Introduction
hack and bug bounty
Penetration Testing Top 50 MCQs
Medium
Penetration Testing Top 50 MCQs
Penetration Testing MCQ Questions
hack and bug bounty
Exploring Professions in the Digital World | Cybersecurity Analysts/Engineers
Medium
Exploring Professions in the Digital World | Cybersecurity Analysts/Engineers
EIPW03-Guardians of the Digital Realm: A Glimpse into Cybersecurity Analysts/Engineers
hack and bug bounty
Unveiling the Power of the Nmap Framework in Linux: A Comprehensive Guide
Medium
Unveiling the Power of the Nmap Framework in Linux: A Comprehensive Guide
Introduction
hack and bug bounty
Unveiling the Power of the Metasploit Framework in Linux: A Comprehensive Guide
Medium
Unveiling the Power of the Metasploit Framework in Linux: A Comprehensive Guide
Introduction
hack and bug bounty
Value of automating the build of AppSec tooling
Medium
Value of automating the build of AppSec tooling
In the rapidly evolving world of software development, automation has become a key player in enhancing efficiency, reducing errors, and…
hack and bug bounty
Safeguarding Digital Frontiers: The Power of VAPT Security Audit Services
Medium
Safeguarding Digital Frontiers: The Power of VAPT Security Audit Services
In an era where digital transformation is reshaping industries, ensuring the security of your digital assets is paramount. Vulnerability…
hack and bug bounty
5 Skills To Learn Before Ethical Hacking!
Medium
5 Skills To Learn Before Ethical Hacking!
How You’ll Start To Be an “Ethical Hacking”?
hack and bug bounty
Top 10 Websites for Hacking Practice!
Medium
Top 10 Websites for Hacking Practice!
Hey there, future cybersecurity extraordinaires!
🕵️♂️
Ready to dive into the world of hacking practice? Don’t worry, we’re not talking…