hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Agent-Server Authentication Design Pattern
Medium
Agent-Server Authentication Design Pattern
I have come across many agent based distributed systems like OEM, AV solutions and Splunk which need to communicate with a centralized server. This communication is often sensitive, carrying data…
hack and bug bounty
The Next Generation of App Development
Medium
The Next Generation of App Development
“ Robots are not going to replace humans, they are going to make their jobs much more humane. Difficult, demeaning, demanding, dangerous…
hack and bug bounty
How I Discovered My First CVE and How You Can Find Yours Too!
Medium
How I Discovered My First CVE and How You Can Find Yours Too!
Hey folks!!, Rajdip here, and I’ve got an exciting write-up for you today. We’ll be delving into the intriguing world of cybersecurity…
hack and bug bounty
Hosted vs SaaS AppSec tools
Medium
Hosted vs SaaS AppSec tools
Hosted application security tools offer several advantages:
hack and bug bounty
Cracking the Code: AppSec Adventures on HTB | Toxic | Web Challenge
Medium
Cracking the Code: AppSec Adventures on HTB | Toxic | Web Challenge
Welcome back and how do you do fellow hackers? I’m Hachiko, and that little guy next to me is my trusty hacker-cat, Babycat.
hack and bug bounty
Machine Learning Vulnerabilities
Medium
Machine Learning Vulnerabilities
An overview of some vulnerabilities found in ML Libraries
hack and bug bounty
Revolutionizing Bug Bounty Hunting: Unleashing the AI Advantage with Chat GPT
Medium
Revolutionizing Bug Bounty Hunting: Unleashing the AI Advantage with Chat GPT
With Chat GPT+, unlock the next phase of bug bounty hunting. Explore the cutting-edge field of AI-driven cybersecurity as we look at how…
hack and bug bounty
How to perform dynamic analysis of a smart contract with Myth
Medium
How to perform dynamic analysis of a smart contract with Myth
Myth is a powerful tool to find vulnerabilities in smart contracts, learn how to use it.
hack and bug bounty
4.1 Lab: OS command injection, simple case | 2023
Medium
4.1 Lab: OS command injection, simple case | 2023
To solve the lab, execute the whoami command to determine the name of the current user | Karthikeyan Nagaraj
hack and bug bounty
Host Header Injection / Redirect on Spotify — Bounty $200
Medium
Host Header Injection / Redirect on Spotify — Bounty $200
In the realm of cybersecurity, uncovering vulnerabilities is a vital step in fortifying digital landscapes. My journey led me to the…
hack and bug bounty
Ability to delete other user’s companies
Medium
Ability to delete other user’s companies
hack and bug bounty
click jacking email report
Medium
click jacking email report
Subject: Important Security Notice
hack and bug bounty
Getting Started with Bug Bounty in 2023
Medium
Getting Started with Bug Bounty in 2023
In today’s digital age, cybersecurity has never been more critical. As technology evolves, so do the threats that target it. Bug bounty…
hack and bug bounty
InfoSecSherpa’s News Roundup for Friday, September 1, 2023
Medium
InfoSecSherpa’s News Roundup for Friday, September 1, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Cyber Briefing: 2023.09.01
Medium
Cyber Briefing: 2023.09.01
👉
What are the latest cybersecurity alerts, incidents, and news? SapphireStealer Malware, SuperBear, Phishing, South Korea, Classiscam’…
hack and bug bounty
Automated Incident Response with SOAR and Splunk SIEM
Medium
Automated Incident Response with SOAR and Splunk SIEM
Connecting SIEM with other security tools is a scenario SOAR (security orchestration, automation, and response) tools handle often. By…
hack and bug bounty
InfoSecSherpa’s News Roundup for Thursday, August 31, 2023
Medium
InfoSecSherpa’s News Roundup for Thursday, August 31, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Cyber Briefing: 2023.08.31
Medium
Cyber Briefing: 2023.08.31
👉
What’s going on in the cyber world today? BadBazaar Android Spyware, Telegram, Signal, China, WordPress, Large Language Models, npm…
hack and bug bounty
Linux Security — ASLR in Statically Linked ELFs
Medium
Linux Security — ASLR in Statically Linked ELFs
When compiling code to a statically linked ELF we bake all the code our binary needs from shared libraries inside our own executable…
hack and bug bounty
Watch & Control Anyone — Shadow RDP Sessions Continued…
Medium
Watch & Control Anyone — Shadow RDP Sessions Continued…
Getting a Shadowed RDP session with control isn’t easy. If the last lesson didn’t work, here are the steps that will get you in…
hack and bug bounty
Top utilities to keep your applications well developed in terms of cybersecurity
Medium
Top utilities to keep your applications well developed in terms of cybersecurity
These days, we’re all concerned about the safety of our developments. As things get more complex and we use a lot of “off the shelf parts”…