hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Is it worth paying for X Premium?
Medium
Is it worth paying for X Premium?
TL;DR
It is worth paying the $8/month for small power users.
It is not worth it for organizations and companies.
hack and bug bounty
Elon Musk’s X Obtains License to Store, Transfer, and Trade Crypto: What Does This Mean for the…
Medium
Elon Musk’s X Obtains License to Store, Transfer, and Trade Crypto: What Does This Mean for the…
Discover the impact of Elon Musk’s X obtaining a license to trade cryptocurrencies
hack and bug bounty
X-Coin: The Future Unfolds
Medium
X-Coin: The Future Unfolds
In the heart of innovation, where ideas dare to eclipse the mundane, we, the custodians of imagination, draw back the veil of mystery to…
hack and bug bounty
Building a POC for CVE-2021-40438
hack and bug bounty
The Devil’s in the Details: How I Accidentally Hacked a Website
Medium
The Devil’s in the Details: How I Accidentally Hacked a Website
It all started as a simple journey to practice finding vulnerabilities… but then I got carried away with curiosity.
hack and bug bounty
Dipping into windows kernel exploitation with HEVD
hack and bug bounty
Git Rekt #2 – Steghide
hack and bug bounty
Git Rekt #1 – Siim/ftp
hack and bug bounty
ICTF baby_shop Writeup
hack and bug bounty
Find Security Vulnerabilities in 99% of iOS/macOS apps on AppStore
Medium
Find Security Vulnerabilities in 99% of iOS/macOS apps on AppStore
Discover the eye-opening truth about iOS and macOS app security with our powerful risk analysis and threat assessment tool. Uncover the…
hack and bug bounty
Are You A Twitter (X) User?
Medium
Are You A Twitter (X) User?
— — — — — -****** — — — — — — —
hack and bug bounty
Bug Bounty Hunter — Recon is everything / Part 1
Medium
Bug Bounty Hunter — Recon is everything / Part 1
Hello folks, I’m thrilled to be back after a long hiatus. I’m back, and today I’ll be sharing some valuable insights about Reconnaissance…
hack and bug bounty
Using ChatGPT as a Penetration Testing Assistant
Medium
Using ChatGPT as a Penetration Testing Assistant
Unless you have been living in a cave for the past few years, chances are high that you would have heard about Generative AI Platforms…
hack and bug bounty
HackTheBox Sauna Walkthrough
Medium
HackTheBox Sauna Walkthrough
Explore ‘Sauna,’ a challenging AD-based machine, in this HTB walkthrough. Learn user enumeration, ASREProasting, Kerberoasting, and…
hack and bug bounty
I made the worst SQL mistake…
Medium
I made the worst SQL mistake…
😶
Hello cybersecurity and coding enthusiasts!
👋
Today I will descibe one of my biggest mistakes that I made as a beginner full stack web…
hack and bug bounty
Leveraging Search Queries for Bug Bounty: A Guide to Finding Vulnerabilities
Medium
Leveraging Search Queries for Bug Bounty: A Guide to Finding Vulnerabilities
In the realm of cybersecurity, bug bounty programs have become a popular way for companies to identify vulnerabilities in their systems…
hack and bug bounty
How I could view any Facebook Groups Notes media, and they paid me a $10,000
Medium
How I could view any Facebook Groups Notes media, and they paid me a $10,000
Hi, This is Raja Sudhakar from Coimbatore, Tamil Nadu. I am freedom security researcher. This post is about a vulnerability I discovered on Facebook which I could view any Facebook Groups Notes…
hack and bug bounty
CLICKJACKING PORTSWIGGER Lab-01: Basic clickjacking with CSRF token protection
Medium
CLICKJACKING PORTSWIGGER Lab-01: Basic clickjacking with CSRF token protection
Open and login to the portswigger website and then go to Clickjacking section and open the first lab
hack and bug bounty
Exploring Server-Side Request Forgery (SSRF) within WordPress
Medium
Exploring Server-Side Request Forgery (SSRF) within WordPress
Today is an era, where software and systems form the backbone of businesses and interactions, and security vulnerabilities pose a…
hack and bug bounty
Exposing Critical Vulnerabilities in Grafana
Medium
Exposing Critical Vulnerabilities in Grafana
A Story of Control and Data Breach
hack and bug bounty
CLICKJCKING
Medium
CLICKJCKING
Clickjacking is a attack when the attacker creates his own website but hides the official website in his website using irame tags of html…