hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Understanding Different Types of Hackers: From Black Hats to White Hats
Medium
Understanding Different Types of Hackers: From Black Hats to White Hats
The term “hacker” can evoke a variety of images and connotations. From the shadows of cybercrime to the defenders of digital fortresses…
hack and bug bounty
Cybersecurity Chronicles: Penetration Testing Modes
Medium
Cybersecurity Chronicles: Penetration Testing Modes
Hello there! In the huge digital world, we’ve been exploring tricky networks and decoding complex systems, all to protect our online turf…
hack and bug bounty
Cyber Briefing: 2023.08.28
Medium
Cyber Briefing: 2023.08.28
👉
What’s happening in cybersecurity today? MSI BSOD, Windows, China, Flax Typhoon, Taiwan, Data Scraping, Microsoft Power Platform…
hack and bug bounty
Watch & Control Anyone — Shadow RDP Sessions
Medium
Watch & Control Anyone — Shadow RDP Sessions
It’s possible to not only gain RDP access, with control and without approval but also have it stay a secret. This will show you how…
hack and bug bounty
Why Not To Automate Security in SDLC with SAST?
Medium
Why not to automate security in SDLC?
Presenting arguments that security can be easily integrated with SDLC process with example tools configured.
hack and bug bounty
Stay Ahead of the Game: The Essential Role of Regular Vulnerability Assessments in Cyber Risk…
Medium
Stay Ahead of the Game: The Essential Role of Regular Vulnerability Assessments in Cyber Risk Management
In today’s increasingly connected world, cyber threats are a constant reality for businesses of all sizes. These threats can come in many…
hack and bug bounty
Directory Traversal in Web App Penetration Testing | 2023
Medium
Directory Traversal in Web App Penetration Testing | 2023
Unveiling Vulnerabilities and Ensuring Robust Security Measures | Karthikeyan Nagaraj
hack and bug bounty
Navigating the Depths of API Penetration Testing: A Comprehensive Guide
Medium
Unveiling the Stages of API Penetration Testing
A dive into the relm of API Pentesting
hack and bug bounty
BeEF (The Browser Exploitation Framework)
Medium
BeEF (The Browser Exploitation Framework)
Let’s Exploit the Browsers of Your internal Network
hack and bug bounty
Twitter(X) Ad Revenue: Learn How to Get Paid!
Medium
Twitter(X) Ad Revenue: Learn How to Get Paid!
Twitter’s ad revenue sharing is a scheme in which Twitter shares a portion of its advertising revenue with content creators and publishers…
hack and bug bounty
How Certified Hackers Use Ethical Hacking Techniques to Recover Your Funds from Scammers
Medium
How Certified Hackers Use Ethical Hacking Techniques to Recover Your Funds from Scammers
Scammers are everywhere on the internet, trying to trick you into giving them your money, your personal information, or your access to your…
hack and bug bounty
From User Experience to Citizen Experience!
Medium
From User Experience to Citizen Experience!
How to apply UX/XD concepts at a national development level
hack and bug bounty
Introduction to OpenVAS — A Vulnerability Scanner
Medium
Introduction to OpenVAS — A Vulnerability Scanner
Kali Linux provides a tool named the Open Vulnerability Assessment System (OpenVAS) for vulnerability scanning of the system on a network…
hack and bug bounty
Can Someone Hack My Bank Account with My Phone Number?
Medium
Can Someone Hack My Bank Account with My Phone Number?
👉
In today’s digital age, concerns about the security of our personal information are paramount. With the increasing reliance on mobile…
hack and bug bounty
How to Fix a Hacked Android Phone
Medium
How to Fix a Hacked Android Phone
In today’s digital age, our smartphones are an integral part of our lives. We use them for communication, work, and even banking. But what…
hack and bug bounty
Enhancing AppSec with AI ML
Medium
Enhancing AppSec with AI ML
Application security is the practice of protecting software applications from malicious attacks and unauthorised access. It involves…
hack and bug bounty
MISSION OSCP: Step 2 — Beginning the Ascent
Medium
MISSION OSCP: Step 2 — Beginning the Ascent
Hello all,
hack and bug bounty
InfoSecSherpa’s News Roundup for Monday, August 28, 2023
Medium
InfoSecSherpa’s News Roundup for Monday, August 28, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
How I document web penetration testing engagements
Medium
How I document web penetration testing engagements
When performing a penetration testing engagement, it’s important to take effective notes whether it be just for yourself or also…
hack and bug bounty
Automação com ROBOS para Pentesters
Medium
Automação com ROBOS para Pentesters
Você já pensou seu Desktop, notebook, VPS interagirem sozinhas, enviando comandos uma para outra e vice-versa sem alguma interação humana?
hack and bug bounty
Leaking File Contents with a Blind File Oracle in Flarum
www.assetnote.io
Leaking File Contents with a Blind File Oracle in Flarum
Our security researchers identified a critical vulnerability inside Flarum (popular forum software) which allows attackers to read local files from the system.