hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
RXSS leading to DOS
Medium
RXSS leading to DOS
Hello everyone I just recently started my hacking journey and I wanted to make a blog, about some interesting hacking I did lately. In the…
hack and bug bounty
OWASP WrongSecrets writeup
Medium
OWASP WrongSecrets writeup
Hello reader! In this article, I have written down my learnings and a walkthrough of the OWASP WrongSecrets challenges. The challenges are…
hack and bug bounty
Bypass Mobile Phone verification using Mobile website
Medium
Bypass Mobile Phone verification using Mobile website
I was invited to security test an e-commerce website. Mobile phone number verification is mandatory on the website and customers are not…
hack and bug bounty
“CompTIA PenTest+: Your Gateway to Ethical Hacking Excellence”
Medium
“CompTIA PenTest+: Your Gateway to Ethical Hacking Excellence”
Are you ready to embark on an exhilarating journey into the world of ethical hacking? The CompTIA PenTest+ certification might just be your…
hack and bug bounty
The Importance of Application Security Testing | Komodo Consulting
Medium
The Importance of Application Security Testing | Komodo Consulting
In the digital age, where technology is an integral part of our lives, the security of applications and software has become paramount. Over…
hack and bug bounty
Wifi Soft Unibox Administration 3.0 Login Page Exploit
Medium
Wifi Soft Unibox Administration 3.0 Login Page Exploit
Introduction
hack and bug bounty
Unveiling RCE on Dutch Government Website
Medium
Unveiling RCE on Dutch Government Website
My story of bypassing File upload to achieve Remote Code Execution (RCE) vulnerability on a Dutch government website.
hack and bug bounty
Single XSS with Earn $600
Medium
Single XSS with Earn $600
my name is ye yint htet i’m bug bounty hunter from myanmar today i’m sharing how i’m found xss vuln and this bug with i’m earned $600
hack and bug bounty
CVE-2023-38831 - WinRAR Zero-Day Vulnerability manually Exploit
Medium
CVE-2023-38831 - WinRAR Zero-Day Vulnerability manually Exploit
Hi Friends!!!
This is Rahad Chowdhury. I am a cyber security researcher from Bangladesh.
hack and bug bounty
Leaked Database and SMTP credentials through .env file
Medium
Leaked Database and SMTP credentials through .env file
Introduction
hack and bug bounty
Windows Security — SRM (Security Reference Monitor)
Medium
Windows Security — SRM (Security Reference Monitor)
SRM (Security Reference Monitor) is a component that is part of the Windows executive (stored in %systemroot%\System32\ntoskrnl.exe). SRM…
hack and bug bounty
CAPTCHA BYPASS like a PRO
Medium
CAPTCHA BYPASS like a PRO
Consider these techniques for bypassing captchas during penetration testing or bug bounty.
hack and bug bounty
Online Ethical Hacking Course in Hindi, Bengali, Telugu: Unleash Your Digital Superpowers
Medium
Online Ethical Hacking Course in Hindi, Bengali, Telugu: Unleash Your Digital Superpowers
1. Introduction to Ethical Hacking
hack and bug bounty
Programming languages for ethical hacking
Medium
PROGRAMMING LANGUAGES FOR ETHICAL HACKING
Photo by GuerrillaBuzz on Unsplash
hack and bug bounty
Developers Have a Problem With Security Tickets
Medium
Developers Have a Problem With Security Tickets
Lackluster info is to blame
hack and bug bounty
Cyber Briefing: 2023.09.08
Medium
Cyber Briefing: 2023.09.08
👉
What are the latest cybersecurity alerts, incidents, and news? Apple, NSO Group, Spyware, APT, Zoho, Fortinet, North Korea, Crypto…
hack and bug bounty
Time to Make X an Ex?
Medium
Time to Make X an Ex?
hack and bug bounty
A Close Look at vRx: A Different Approach to Vulnerability Management
Medium
A Close Look at vRx: A Different Approach to Vulnerability Management
The other day, I had the opportunity to attend a webinar titled “Visualize Vulnerabilities Differently,” which was organized by the Cyber…
hack and bug bounty
5.4 Lab: Flawed enforcement of business rules | 2023
Medium
5.4 Lab: Flawed enforcement of business rules | 2023
To solve the lab, exploit this flaw to buy a “Lightweight l33t leather jacket”, You can log in to your own account using the following…
hack and bug bounty
How i got back my scammed crypto investment funds with (MYSTERIOUSHACK)
Medium
How i got back my scammed crypto investment funds with (MYSTERIOUSHACK)
Mysterious Hack is one of the most reliable crypto scam-funds recovery on the web, that’s if there is another, I can not vote for any other…
hack and bug bounty
BEGINNER BUG BOUNTY TOOLS PART-1
Medium
BEGINNER BUG BOUNTY TOOLS PART-1
Subdomain enumeration, also known as subdomain discovery or subdomain reconnaissance, is the process of finding subdomains associated with…