hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Wifi Soft Unibox Administration 3.0 Login Page Exploit
Medium
Wifi Soft Unibox Administration 3.0 Login Page Exploit
Introduction
hack and bug bounty
Unveiling RCE on Dutch Government Website
Medium
Unveiling RCE on Dutch Government Website
My story of bypassing File upload to achieve Remote Code Execution (RCE) vulnerability on a Dutch government website.
hack and bug bounty
Single XSS with Earn $600
Medium
Single XSS with Earn $600
my name is ye yint htet i’m bug bounty hunter from myanmar today i’m sharing how i’m found xss vuln and this bug with i’m earned $600
hack and bug bounty
CVE-2023-38831 - WinRAR Zero-Day Vulnerability manually Exploit
Medium
CVE-2023-38831 - WinRAR Zero-Day Vulnerability manually Exploit
Hi Friends!!!
This is Rahad Chowdhury. I am a cyber security researcher from Bangladesh.
hack and bug bounty
Leaked Database and SMTP credentials through .env file
Medium
Leaked Database and SMTP credentials through .env file
Introduction
hack and bug bounty
Windows Security — SRM (Security Reference Monitor)
Medium
Windows Security — SRM (Security Reference Monitor)
SRM (Security Reference Monitor) is a component that is part of the Windows executive (stored in %systemroot%\System32\ntoskrnl.exe). SRM…
hack and bug bounty
CAPTCHA BYPASS like a PRO
Medium
CAPTCHA BYPASS like a PRO
Consider these techniques for bypassing captchas during penetration testing or bug bounty.
hack and bug bounty
Online Ethical Hacking Course in Hindi, Bengali, Telugu: Unleash Your Digital Superpowers
Medium
Online Ethical Hacking Course in Hindi, Bengali, Telugu: Unleash Your Digital Superpowers
1. Introduction to Ethical Hacking
hack and bug bounty
Programming languages for ethical hacking
Medium
PROGRAMMING LANGUAGES FOR ETHICAL HACKING
Photo by GuerrillaBuzz on Unsplash
hack and bug bounty
Developers Have a Problem With Security Tickets
Medium
Developers Have a Problem With Security Tickets
Lackluster info is to blame
hack and bug bounty
Cyber Briefing: 2023.09.08
Medium
Cyber Briefing: 2023.09.08
👉
What are the latest cybersecurity alerts, incidents, and news? Apple, NSO Group, Spyware, APT, Zoho, Fortinet, North Korea, Crypto…
hack and bug bounty
Time to Make X an Ex?
Medium
Time to Make X an Ex?
hack and bug bounty
A Close Look at vRx: A Different Approach to Vulnerability Management
Medium
A Close Look at vRx: A Different Approach to Vulnerability Management
The other day, I had the opportunity to attend a webinar titled “Visualize Vulnerabilities Differently,” which was organized by the Cyber…
hack and bug bounty
5.4 Lab: Flawed enforcement of business rules | 2023
Medium
5.4 Lab: Flawed enforcement of business rules | 2023
To solve the lab, exploit this flaw to buy a “Lightweight l33t leather jacket”, You can log in to your own account using the following…
hack and bug bounty
How i got back my scammed crypto investment funds with (MYSTERIOUSHACK)
Medium
How i got back my scammed crypto investment funds with (MYSTERIOUSHACK)
Mysterious Hack is one of the most reliable crypto scam-funds recovery on the web, that’s if there is another, I can not vote for any other…
hack and bug bounty
BEGINNER BUG BOUNTY TOOLS PART-1
Medium
BEGINNER BUG BOUNTY TOOLS PART-1
Subdomain enumeration, also known as subdomain discovery or subdomain reconnaissance, is the process of finding subdomains associated with…
hack and bug bounty
Windows Security — Impersonation Access Token
Medium
Windows Security — Impersonation Access Token
Overall, there are two types of access tokens (https://medium.com/@boutnaru/windows-security-access-token-81cd00000c64) — as stated in the…
hack and bug bounty
Navigating the Cybersecurity Labyrinth: Common Interview Questions for Penetration Testing
Medium
Navigating the Cybersecurity Labyrinth: Common Interview Questions for Penetration Testing
In the ever-evolving landscape of cybersecurity, one of the most critical and dynamic roles is that of a penetration tester. These…
hack and bug bounty
Hacking a large company in MINUTES by reading docs
Medium
Hacking a Large Company in MINUTES by Reading Docs
This is the story of how I hacked a company with over 500,000 users in just a few minutes by simply reading the docs.
hack and bug bounty
Scam Chronicles — Episode 2
Medium
Scam Chronicles — Episode 2
Welcome to another episode of scam chronicles where I expose another scam operation in play and hack the site that is being used to gather…
hack and bug bounty
PG Play — OnSystemShellDredd | 78/100
Medium
PG Play — OnSystemShellDredd | 78/100
Hi! Back with another CTF writeup, this time featuring OnSystemShellDredd from Proving Grounds Play / VulnHub. This was a really…