hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Dive into Ethical Hacking — How Does It Work?
Medium
Dive into Ethical Hacking — How Does It Work?
Ethical Hacking: Demystified
hack and bug bounty
Private vs. Public Bug Bounty Programs: Which one’s right for you?
Medium
Private vs. Public Bug Bounty Programs: Which one’s right for you?
When setting up a bug bounty program, organizations have the choice between private and public programs. Which one’s right for you?
hack and bug bounty
Aircrack-ng: Unleashing the Power of Wireless Network Security on Linux
Medium
Aircrack-ng: Unleashing the Power of Wireless Network Security on Linux
Introduction
hack and bug bounty
Unveiling Network Secrets with Wireshark: A Comprehensive Guide to the Linux Tool
Medium
Unveiling Network Secrets with Wireshark: A Comprehensive Guide to the Linux Tool
Introduction
hack and bug bounty
“Bug bounty is our commitment to the hacking community”
Medium
“Bug bounty is our commitment to the hacking community”
Edited by Anne-Laure Civeyrac, Technical Content Writer
hack and bug bounty
Mastering Web Security with Burp Suite on Linux: A Comprehensive Guide
Medium
Mastering Web Security with Burp Suite on Linux: A Comprehensive Guide
Introduction
hack and bug bounty
Hydra Linux Tool: Unveiling the Power of Password Cracking and Security Testing
Medium
Hydra Linux Tool: Unveiling the Power of Password Cracking and Security Testing
Introduction
hack and bug bounty
Advisory: Flarum LFI - CVE-2023-40033
www.assetnote.io
Advisory: Flarum LFI - CVE-2023-40033
Security Advisory: Our security researchers identified a critical vulnerability inside Flarum (popular forum software) which allows attackers to read local files from the system.
hack and bug bounty
Scam Chronicles: Hacking the 5000 Rs Reward Points Scam — Episode 1
Medium
Scam Chronicles: Hacking the 5000 Rs Reward Points Scam — Episode 1
Introduction
hack and bug bounty
Why Security Testing Services Are Critical for Your Company?
Medium
Why Security Testing Services Are Critical for Your Company?
QASource, offers a range of testing services to help businesses protect their software and applications from potential security breaches.
hack and bug bounty
ِAccount takeover hidden in Javascript files plus some extra work? my type.
Medium
ِAccount takeover hidden in Javascript files plus some extra work? my type.
Hey guys, after my latest account takeover I decided to collaborate with one of my friends on the same program I got the first ATO on. Was…
hack and bug bounty
INTRO TO HTTP/HTTPS
Medium
INTRO TO HTTP/HTTPS
“
👋
Hey, this is Bharath! Welcome to the blog where you’ll learn all about the fundamental aspects of HTTP/HTTPS. These concepts are the…
hack and bug bounty
Pros and cons of clustering AppSec tooling
Medium
Pros and cons of clustering AppSec tooling
Clustering of Application Security tooling refers to the use of multiple tools and techniques to improve the security of an application…
hack and bug bounty
Agent-Server Authentication Design Pattern
Medium
Agent-Server Authentication Design Pattern
I have come across many agent based distributed systems like OEM, AV solutions and Splunk which need to communicate with a centralized server. This communication is often sensitive, carrying data…
hack and bug bounty
The Next Generation of App Development
Medium
The Next Generation of App Development
“ Robots are not going to replace humans, they are going to make their jobs much more humane. Difficult, demeaning, demanding, dangerous…
hack and bug bounty
How I Discovered My First CVE and How You Can Find Yours Too!
Medium
How I Discovered My First CVE and How You Can Find Yours Too!
Hey folks!!, Rajdip here, and I’ve got an exciting write-up for you today. We’ll be delving into the intriguing world of cybersecurity…
hack and bug bounty
Hosted vs SaaS AppSec tools
Medium
Hosted vs SaaS AppSec tools
Hosted application security tools offer several advantages:
hack and bug bounty
Cracking the Code: AppSec Adventures on HTB | Toxic | Web Challenge
Medium
Cracking the Code: AppSec Adventures on HTB | Toxic | Web Challenge
Welcome back and how do you do fellow hackers? I’m Hachiko, and that little guy next to me is my trusty hacker-cat, Babycat.
hack and bug bounty
Revolutionizing Bug Bounty Hunting: Unleashing the AI Advantage with Chat GPT
Medium
Revolutionizing Bug Bounty Hunting: Unleashing the AI Advantage with Chat GPT
With Chat GPT+, unlock the next phase of bug bounty hunting. Explore the cutting-edge field of AI-driven cybersecurity as we look at how…
hack and bug bounty
4.1 Lab: OS command injection, simple case | 2023
Medium
4.1 Lab: OS command injection, simple case | 2023
To solve the lab, execute the whoami command to determine the name of the current user | Karthikeyan Nagaraj
hack and bug bounty
Host Header Injection / Redirect on Spotify — Bounty $200
Medium
Host Header Injection / Redirect on Spotify — Bounty $200
In the realm of cybersecurity, uncovering vulnerabilities is a vital step in fortifying digital landscapes. My journey led me to the…