hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Best Way to Learn Ethical Hacking: A Comprehensive Guide
Medium
Best Way to Learn Ethical Hacking: A Comprehensive Guide
Mastering Ethical Hacking: The Ultimate Learning Guide
hack and bug bounty
InfoSecSherpa’s News Roundup for Tuesday, September 5, 2023
Medium
InfoSecSherpa’s News Roundup for Tuesday, September 5, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Cyber Briefing: 2023.09.05
Medium
Cyber Briefing: 2023.09.05
👉
What’s the latest in the cyber world today? Andariel, Lazarus Group, Malware, North Korea, MinIO, Smishing Campaign, China, South Korea…
hack and bug bounty
Elon Musk’s Safety Standards at X Are Helping to Spread Russian Propaganda, New Study Finds
Medium
Elon Musk’s Safety Standards at X Are Helping to Spread Russian Propaganda, New Study Finds
Key takeaways
hack and bug bounty
PG Play — DriftingBlues6 | 72/100
Medium
PG Play — DriftingBlues6 | 72/100
Hi! Today I’m working on DriftingBlues6 from Proving Grounds Play / VulnHub. This box featured discovering a zip file and cracking it’s…
hack and bug bounty
how to build a fully functional RESTful API using C# and ASP.NET Core.
Medium
how to build a fully functional RESTful API using C# and ASP.NET Core.
💻
👋
Hello there! Welcome to my programming guide on how to create a simple .NET REST API application!
🚀
In this guide, we will take a deep…
hack and bug bounty
Penetration Testing Lab: PAM Authentication
Medium
Penetration Testing Lab: PAM Authentication
If you teach Cyber or are interested in the field of penetration testing, here’s a lab you can use with your students or work through on…
hack and bug bounty
Demystifying the Difference Between Pentesting and Ethical Hacking
Medium
Demystifying the Difference Between Pentesting and Ethical Hacking
In the realm of cybersecurity, the terms “pentesting” and “ethical hacking” are often used interchangeably, leading to some confusion among…
hack and bug bounty
Musk On Mission To Buy Catholic Church
Medium
Musk On Mission To Buy Catholic Church
Mogul said to be seeking more followers
hack and bug bounty
How to strongly secure public APIs using HMAC
Medium
How to strongly secure public APIs using HMAC
There is no general authentication method for all types of API. It depends on the API purpose. The API might provide sensitive services…
hack and bug bounty
X-algo
Medium
X-algo
As we speak, X’s hidden algorithmic quirks are being unravelled by the community, and finally brought to daylight. It’s tragicomically…
hack and bug bounty
A Comprehensive approach for testing for SQL Injection Vulnerabilities
Medium
A Comprehensive Approach for Testing for SQL Injection Vulnerabilities
TL;DR
hack and bug bounty
The Ultimate Guide to Bug Bounty Hunting: Learn How to Find and Report Vulnerabilities
Medium
The Ultimate Guide to Bug Bounty Hunting: Learn How to Find and Report Vulnerabilities
Learn How to Find and Report Vulnerabilities in 2023
hack and bug bounty
For Newbies: Simple Examples of LDAP Injection Vulnerabilities
Medium
What is LDAP?
What is LDAP?
hack and bug bounty
Hacking a Windows Machine by Hiding a RAT Inside the File
Medium
Hacking a Windows Machine by Hiding a RAT Inside the File
In this article, I will show you how to hack Windows computers using a Remote Administration Tool (RAT) called Koadic.
hack and bug bounty
Exploring Narrowlink: Your Swiss Army Knife for Secure Networking
Medium
Exploring Narrowlink: Your Swiss Army Knife for Secure Networking
Hey there, tech enthusiasts! Today, we’re diving into the fascinating world of Narrowlink — a nifty tool that’s like a multi-purpose tool…
hack and bug bounty
Enhancing Bug Bounty Workflow with Advanced Google Dorks
Medium
Enhancing Bug Bounty Workflow with Advanced Google Dorks
Bug bounty hunting has become an essential part of cybersecurity, allowing skilled individuals to identify vulnerabilities in web…
hack and bug bounty
Story of Stored Blind XSS
Medium
Story of Stored Blind XSS
Cross Site Scripting
hack and bug bounty
Again? Subdomain takeover via ideanote.io
Medium
Again? Subdomain takeover via ideanote.io
Exploiting subdomain takeover Ideanote, Ideanote is a new way to work with ideas. It’s faster, more efficient, and lets you build a fully…
hack and bug bounty
The Difference Between Pentesting and Ethical Hacking
Medium
The Difference Between Pentesting and Ethical Hacking
In today’s interconnected digital world, security is paramount. With cyber threats on the rise, organisations and individuals are…
hack and bug bounty
What is a database vulnerability? What is a database attack?
Medium
What is a database vulnerability? What is a database attack?
A database vulnerability refers to a weakness or flaw in a database management system (DBMS) that could be exploited by malicious actors or…