hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Series of Web Exploits: From Discovery to Disclosure — XSS fun
Medium
Series of Web Exploits: From Discovery to Disclosure — XSS fun
(No Bounty PAID :@, no thanks, and over 10 XSS)
hack and bug bounty
Bluetooth: Sniffing and Cracking Bluetooth with the UbertoothOne
Medium
Bluetooth: Sniffing and Cracking Bluetooth with the UbertoothOne
One of my favourite TV shows is Person of interest. I was just finishing up my Computer science degree when the show first started airing I…
hack and bug bounty
How a Shodan search led to Gold Mine :)
Medium
How a Shodan search led to Gold Mine :)
Hi Amazing readers, hope y’all are doing well
😊
. This is my 1st ever blog so please let me know any spelling or grammatical mistakes in…
hack and bug bounty
The Legal and Ethical Aspects of Ethical Hacking: Navigating Gray Areas
Medium
The Legal and Ethical Aspects of Ethical Hacking: Navigating Gray Areas
In the rapidly evolving landscape of technology and cybersecurity, the concept of ethical hacking occupies a unique space. While ethical…
hack and bug bounty
NMap Essentials: How to get started
Medium
NMap Essentials: How to get started
Hi everyone. Getting started with cyber security can be overwhelming. There are so many tools, techniques and theory to get you started…
hack and bug bounty
What is TCP/IP Model
Medium
What is TCP/IP Model
The TCP/IP model serves as a framework for visualizing the organization and transmission of data across a network.
hack and bug bounty
The Dark Side of AI: How Growing Applications Could Fuel Cybersecurity Threats
Medium
The Dark Side of AI: How Growing Applications Could Fuel Cybersecurity Threats
PamC
hack and bug bounty
How DevSecOps Teams Should Approach API Security
Medium
How DevSecOps Teams Should Approach API Security
A recommended setup that addresses the unique concerns of developers, security and DevOps teams.
hack and bug bounty
Hands-On Exploitation: Safely Testing System Vulnerabilities
Medium
Hands-On Exploitation: Safely Testing System Vulnerabilities
Welcome to a thrilling voyage into the realm of ethical hacking, where we roll up our sleeves and explore the intricate art of hands-on…
hack and bug bounty
Cracking the Code: An Introduction to Password Cracking and Security
Medium
Cracking the Code: An Introduction to Password Cracking and Security
In the digital age, passwords stand as the first line of defense protecting our personal information, sensitive data, and online…
hack and bug bounty
Vulnerability Scanning for Beginners: Identifying Weak Points Before Malicious Actors Do
Medium
Vulnerability Scanning for Beginners: Identifying Weak Points Before Malicious Actors Do
In today’s interconnected world, where data breaches and cyberattacks are a constant threat, organizations and individuals alike need to…
hack and bug bounty
Understanding Different Types of Hackers: From Black Hats to White Hats
Medium
Understanding Different Types of Hackers: From Black Hats to White Hats
The term “hacker” can evoke a variety of images and connotations. From the shadows of cybercrime to the defenders of digital fortresses…
hack and bug bounty
Cybersecurity Chronicles: Penetration Testing Modes
Medium
Cybersecurity Chronicles: Penetration Testing Modes
Hello there! In the huge digital world, we’ve been exploring tricky networks and decoding complex systems, all to protect our online turf…
hack and bug bounty
Cyber Briefing: 2023.08.28
Medium
Cyber Briefing: 2023.08.28
👉
What’s happening in cybersecurity today? MSI BSOD, Windows, China, Flax Typhoon, Taiwan, Data Scraping, Microsoft Power Platform…
hack and bug bounty
Watch & Control Anyone — Shadow RDP Sessions
Medium
Watch & Control Anyone — Shadow RDP Sessions
It’s possible to not only gain RDP access, with control and without approval but also have it stay a secret. This will show you how…
hack and bug bounty
Why Not To Automate Security in SDLC with SAST?
Medium
Why not to automate security in SDLC?
Presenting arguments that security can be easily integrated with SDLC process with example tools configured.
hack and bug bounty
Stay Ahead of the Game: The Essential Role of Regular Vulnerability Assessments in Cyber Risk…
Medium
Stay Ahead of the Game: The Essential Role of Regular Vulnerability Assessments in Cyber Risk Management
In today’s increasingly connected world, cyber threats are a constant reality for businesses of all sizes. These threats can come in many…
hack and bug bounty
Directory Traversal in Web App Penetration Testing | 2023
Medium
Directory Traversal in Web App Penetration Testing | 2023
Unveiling Vulnerabilities and Ensuring Robust Security Measures | Karthikeyan Nagaraj
hack and bug bounty
Navigating the Depths of API Penetration Testing: A Comprehensive Guide
Medium
Unveiling the Stages of API Penetration Testing
A dive into the relm of API Pentesting
hack and bug bounty
BeEF (The Browser Exploitation Framework)
Medium
BeEF (The Browser Exploitation Framework)
Let’s Exploit the Browsers of Your internal Network
hack and bug bounty
Twitter(X) Ad Revenue: Learn How to Get Paid!
Medium
Twitter(X) Ad Revenue: Learn How to Get Paid!
Twitter’s ad revenue sharing is a scheme in which Twitter shares a portion of its advertising revenue with content creators and publishers…