hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Recovering access to an AWS EC2 instance using SSM
Medium
Recovering access to an AWS EC2 instance using SSM
Introduction
hack and bug bounty
ट्विटर X पर फॉलोवर्स कैसे बढ़ाएं? | Twitter Followers बढ़ाने के 33 तरीके
Medium
ट्विटर X पर फॉलोवर्स कैसे बढ़ाएं? | Twitter Followers बढ़ाने के 33 तरीके
ट्विटर पर फॉलोवर्स कैसे बढ़ाएं? | Twitter Followers बढ़ाने के 33 तरीके
hack and bug bounty
10 Reasons Why X Is Better than Threads
Medium
10 Reasons Why X Is Better than Threads
After the rebranding of Twitter, now popularly known as X, many users feared that this change would backfire, but once again, Elon has…
hack and bug bounty
How I ethically hacked one of the domains of the United Kingdom
Medium
How I ethically hacked one of the domains of the United Kingdom
Hey! This is Prince Roy, a cyber security researcher. Few months back I found a security issue on the one domain of [gov.uk]. That was…
hack and bug bounty
Salting Passwords: we are all guilty of using the same password because it’s just easier but is…
Medium
Salting Passwords: we are all guilty of using the same password because it’s just easier but is…
Is it time to add a bit of unique seasoning to our passwords?
hack and bug bounty
Unlocking the Secrets of Steganography: A Digital Adventure
Medium
Unlocking the Secrets of Steganography: A Digital Adventure
Introduction
hack and bug bounty
How I Got Free LinkedIn Premium Membership
Medium
How any Gitamite can get free Linkedin Premium Membership
🤣
Good day ppl! This is Anudeep Vysyaraju, with a new write-up on how I hacked LinkedIn Premium Membership for FREE (almost FREE
🤣
) and made…
hack and bug bounty
Request-Baskets 1.2.1 Server-Side Request Forgery (CVE-2023–27163)
Medium
Request-Baskets 1.2.1 Server-Side Request Forgery (CVE-2023–27163)
Released By : Imène ALLOUCHE
hack and bug bounty
A01 Broken Access Control | PART 1 | OWASP Top 10 | BugBounty 2023
Medium
A01 Broken Access Control | PART 1 | OWASP Top 10 | BugBounty 2023
Broken access control is a security vulnerability that occurs when a system or application fails to properly enforce access controls…
hack and bug bounty
5.1 Lab: Excessive trust in client-side controls | 2023
Medium
5.1 Lab: Excessive trust in client-side controls | 2023
To solve the lab, buy a “Lightweight l33t leather jacket”, You can log in to your own account using the following credentials…
hack and bug bounty
Legitimate Bitcoin Recovery Hacker!
Medium
Legitimate Bitcoin Recovery Hacker!
No matter what you are up against, remain persistent. Just remember that a lot of others confront the same troubles practically constantly…
hack and bug bounty
Best Way to Learn Ethical Hacking: A Comprehensive Guide
Medium
Best Way to Learn Ethical Hacking: A Comprehensive Guide
Mastering Ethical Hacking: The Ultimate Learning Guide
hack and bug bounty
InfoSecSherpa’s News Roundup for Tuesday, September 5, 2023
Medium
InfoSecSherpa’s News Roundup for Tuesday, September 5, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Cyber Briefing: 2023.09.05
Medium
Cyber Briefing: 2023.09.05
👉
What’s the latest in the cyber world today? Andariel, Lazarus Group, Malware, North Korea, MinIO, Smishing Campaign, China, South Korea…
hack and bug bounty
Elon Musk’s Safety Standards at X Are Helping to Spread Russian Propaganda, New Study Finds
Medium
Elon Musk’s Safety Standards at X Are Helping to Spread Russian Propaganda, New Study Finds
Key takeaways
hack and bug bounty
PG Play — DriftingBlues6 | 72/100
Medium
PG Play — DriftingBlues6 | 72/100
Hi! Today I’m working on DriftingBlues6 from Proving Grounds Play / VulnHub. This box featured discovering a zip file and cracking it’s…
hack and bug bounty
how to build a fully functional RESTful API using C# and ASP.NET Core.
Medium
how to build a fully functional RESTful API using C# and ASP.NET Core.
💻
👋
Hello there! Welcome to my programming guide on how to create a simple .NET REST API application!
🚀
In this guide, we will take a deep…
hack and bug bounty
Penetration Testing Lab: PAM Authentication
Medium
Penetration Testing Lab: PAM Authentication
If you teach Cyber or are interested in the field of penetration testing, here’s a lab you can use with your students or work through on…
hack and bug bounty
Demystifying the Difference Between Pentesting and Ethical Hacking
Medium
Demystifying the Difference Between Pentesting and Ethical Hacking
In the realm of cybersecurity, the terms “pentesting” and “ethical hacking” are often used interchangeably, leading to some confusion among…
hack and bug bounty
Musk On Mission To Buy Catholic Church
Medium
Musk On Mission To Buy Catholic Church
Mogul said to be seeking more followers
hack and bug bounty
How to strongly secure public APIs using HMAC
Medium
How to strongly secure public APIs using HMAC
There is no general authentication method for all types of API. It depends on the API purpose. The API might provide sensitive services…